Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1evAkYZpwDV0N4v.exe

Overview

General Information

Sample name:1evAkYZpwDV0N4v.exe
Analysis ID:1581290
MD5:01366b2e0ca4523828110da357d12653
SHA1:80a4c110832923d56d4b86a10adf357e1839c7b8
SHA256:f977974b2df2bece2382b3c31b24382b629d18144c1fd56901900b1d1aba6024
Tags:exeuser-TeamDreier
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • 1evAkYZpwDV0N4v.exe (PID: 7904 cmdline: "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe" MD5: 01366B2E0CA4523828110DA357D12653)
    • powershell.exe (PID: 8108 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 8120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 8132 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gorfVgTf.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 8176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 6948 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7176 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmpEDAD.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • 1evAkYZpwDV0N4v.exe (PID: 1704 cmdline: "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe" MD5: 01366B2E0CA4523828110DA357D12653)
      • iexplore.exe (PID: 2764 cmdline: "c:\program files (x86)\internet explorer\iexplore.exe" MD5: 6F0F06D6AB125A99E43335427066A4A1)
  • gorfVgTf.exe (PID: 6352 cmdline: C:\Users\user\AppData\Roaming\gorfVgTf.exe MD5: 01366B2E0CA4523828110DA357D12653)
    • schtasks.exe (PID: 7788 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmp403.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • gorfVgTf.exe (PID: 5804 cmdline: "C:\Users\user\AppData\Roaming\gorfVgTf.exe" MD5: 01366B2E0CA4523828110DA357D12653)
      • WerFault.exe (PID: 3520 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5804 -s 1196 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["192.3.64.152:2559:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-ZFXG9Y", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000F.00000002.3343140213.0000000001497000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000F.00000002.3343917986.0000000002F8F000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              Click to see the 31 entries
              SourceRuleDescriptionAuthorStrings
              9.2.1evAkYZpwDV0N4v.exe.400000.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                9.2.1evAkYZpwDV0N4v.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  9.2.1evAkYZpwDV0N4v.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    9.2.1evAkYZpwDV0N4v.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                    • 0x6c4b8:$a1: Remcos restarted by watchdog!
                    • 0x6ca30:$a3: %02i:%02i:%02i:%03i
                    9.2.1evAkYZpwDV0N4v.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
                    • 0x6650c:$str_a1: C:\Windows\System32\cmd.exe
                    • 0x66488:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x66488:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x66988:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                    • 0x671b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                    • 0x6657c:$str_b2: Executing file:
                    • 0x675fc:$str_b3: GetDirectListeningPort
                    • 0x66fa8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                    • 0x67128:$str_b7: \update.vbs
                    • 0x665a4:$str_b9: Downloaded file:
                    • 0x66590:$str_b10: Downloading file:
                    • 0x66634:$str_b12: Failed to upload file:
                    • 0x675c4:$str_b13: StartForward
                    • 0x675e4:$str_b14: StopForward
                    • 0x67080:$str_b15: fso.DeleteFile "
                    • 0x67014:$str_b16: On Error Resume Next
                    • 0x670b0:$str_b17: fso.DeleteFolder "
                    • 0x66624:$str_b18: Uploaded file:
                    • 0x665e4:$str_b19: Unable to delete:
                    • 0x67048:$str_b20: while fso.FileExists("
                    • 0x66ac1:$str_c0: [Firefox StoredLogins not found]
                    Click to see the 34 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe", ParentImage: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe, ParentProcessId: 7904, ParentProcessName: 1evAkYZpwDV0N4v.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe", ProcessId: 8108, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe", ParentImage: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe, ParentProcessId: 7904, ParentProcessName: 1evAkYZpwDV0N4v.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe", ProcessId: 8108, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmp403.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmp403.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\gorfVgTf.exe, ParentImage: C:\Users\user\AppData\Roaming\gorfVgTf.exe, ParentProcessId: 6352, ParentProcessName: gorfVgTf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmp403.tmp", ProcessId: 7788, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmpEDAD.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmpEDAD.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe", ParentImage: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe, ParentProcessId: 7904, ParentProcessName: 1evAkYZpwDV0N4v.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmpEDAD.tmp", ProcessId: 7176, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe", ParentImage: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe, ParentProcessId: 7904, ParentProcessName: 1evAkYZpwDV0N4v.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe", ProcessId: 8108, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmpEDAD.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmpEDAD.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe", ParentImage: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe, ParentProcessId: 7904, ParentProcessName: 1evAkYZpwDV0N4v.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmpEDAD.tmp", ProcessId: 7176, ProcessName: schtasks.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Registry Key setAuthor: Joe Security: Data: Details: 30 0F C2 2C CB 87 27 B5 73 01 29 00 61 48 5E 83 B9 4F 8E E5 B7 5F E9 7C 98 D8 20 42 4C 17 6F BF 6D A5 1F D4 78 96 99 F2 0D 1B 6D 44 44 9A 44 78 99 FC 54 0B 74 55 F4 8F 48 20 D8 5B EB 67 C8 ED 14 61 EF 6B 69 C7 5B BF 58 15 01 2E 89 35 C8 C1 47 2C 5A E7 , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe, ProcessId: 1704, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-ZFXG9Y\exepath
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-27T10:29:26.942230+010020365941Malware Command and Control Activity Detected192.168.2.1049735192.3.64.1522559TCP
                    2024-12-27T10:29:42.551155+010020365941Malware Command and Control Activity Detected192.168.2.1049774192.3.64.1522559TCP
                    2024-12-27T10:29:42.691758+010020365941Malware Command and Control Activity Detected192.168.2.1049775192.3.64.1522559TCP
                    2024-12-27T10:31:04.691832+010020365941Malware Command and Control Activity Detected192.168.2.1049957192.3.64.1522559TCP
                    2024-12-27T10:31:04.692020+010020365941Malware Command and Control Activity Detected192.168.2.1049959192.3.64.1522559TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-27T10:29:30.157480+010028033043Unknown Traffic192.168.2.1049741178.237.33.5080TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0000000F.00000002.3343140213.00000000014AA000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["192.3.64.152:2559:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-ZFXG9Y", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeReversingLabs: Detection: 31%
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeVirustotal: Detection: 46%Perma Link
                    Source: 1evAkYZpwDV0N4v.exeVirustotal: Detection: 46%Perma Link
                    Source: 1evAkYZpwDV0N4v.exeReversingLabs: Detection: 31%
                    Source: Yara matchFile source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.3343140213.0000000001497000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.3343917986.0000000002F8F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.3343140213.00000000014AA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1415947948.00000000035D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1469343600.00000000040F5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 1evAkYZpwDV0N4v.exe PID: 7904, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 1evAkYZpwDV0N4v.exe PID: 1704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: gorfVgTf.exe PID: 6352, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: gorfVgTf.exe PID: 5804, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeJoe Sandbox ML: detected
                    Source: 1evAkYZpwDV0N4v.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,9_2_004338C8
                    Source: 1evAkYZpwDV0N4v.exe, 00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_df3872f7-0

                    Exploits

                    barindex
                    Source: Yara matchFile source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1415947948.00000000035D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1469343600.00000000040F5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 1evAkYZpwDV0N4v.exe PID: 7904, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 1evAkYZpwDV0N4v.exe PID: 1704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: gorfVgTf.exe PID: 6352, type: MEMORYSTR

                    Privilege Escalation

                    barindex
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00407538 _wcslen,CoGetObject,9_2_00407538

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeUnpacked PE file: 1.2.1evAkYZpwDV0N4v.exe.240000.0.unpack
                    Source: 1evAkYZpwDV0N4v.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 1evAkYZpwDV0N4v.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_0040928E
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,9_2_0041C322
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,9_2_0040C388
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_004096A0
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,9_2_00408847
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00407877 FindFirstFileW,FindNextFileW,9_2_00407877
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0044E8F9 FindFirstFileExA,9_2_0044E8F9
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,9_2_0040BB6B
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,9_2_00419B86
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,9_2_0040BD72
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,9_2_00407CD2
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]1_2_0700D7C8
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]1_2_0700BCEC
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 4x nop then push dword ptr [ebp-20h]1_2_08056E48
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh1_2_08056E48
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 4x nop then xor edx, edx1_2_080570A0
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 4x nop then push dword ptr [ebp-24h]1_2_08057168
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh1_2_08057168
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h1_2_08056714
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h1_2_08056CCC
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 4x nop then push dword ptr [ebp-20h]1_2_08056E3C
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh1_2_08056E3C
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 4x nop then xor edx, edx1_2_08057094
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 4x nop then push dword ptr [ebp-24h]1_2_0805715C
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh1_2_0805715C
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 4x nop then jmp 096CB4A5h1_2_096CAC5A
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 4x nop then jmp 0972A745h11_2_09729EFA

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.10:49735 -> 192.3.64.152:2559
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.10:49774 -> 192.3.64.152:2559
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.10:49775 -> 192.3.64.152:2559
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.10:49959 -> 192.3.64.152:2559
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.10:49957 -> 192.3.64.152:2559
                    Source: Malware configuration extractorIPs: 192.3.64.152
                    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                    Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                    Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                    Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.10:49741 -> 178.237.33.50:80
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0041B411 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,9_2_0041B411
                    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                    Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                    Source: 1evAkYZpwDV0N4v.exe, gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                    Source: 1evAkYZpwDV0N4v.exe, 00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmp, 1evAkYZpwDV0N4v.exe, 00000001.00000002.1415947948.00000000035D1000.00000004.00000800.00020000.00000000.sdmp, 1evAkYZpwDV0N4v.exe, 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, gorfVgTf.exe, 0000000B.00000002.1469343600.00000000040F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                    Source: 1evAkYZpwDV0N4v.exe, 00000001.00000002.1413156115.0000000002638000.00000004.00000800.00020000.00000000.sdmp, gorfVgTf.exe, 0000000B.00000002.1464889990.00000000028BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,000000009_2_0040A2F3
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\gorfVgTf.exeJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,9_2_0040B749
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,9_2_004168FC
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,9_2_0040B749
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,9_2_0040A41B
                    Source: Yara matchFile source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1415947948.00000000035D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1469343600.00000000040F5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 1evAkYZpwDV0N4v.exe PID: 7904, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 1evAkYZpwDV0N4v.exe PID: 1704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: gorfVgTf.exe PID: 6352, type: MEMORYSTR

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.3343140213.0000000001497000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.3343917986.0000000002F8F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.3343140213.00000000014AA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1415947948.00000000035D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1469343600.00000000040F5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 1evAkYZpwDV0N4v.exe PID: 7904, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 1evAkYZpwDV0N4v.exe PID: 1704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: gorfVgTf.exe PID: 6352, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: gorfVgTf.exe PID: 5804, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0041CA73 SystemParametersInfoW,9_2_0041CA73

                    System Summary

                    barindex
                    Source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000001.00000002.1415947948.00000000035D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0000000B.00000002.1469343600.00000000040F5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: 1evAkYZpwDV0N4v.exe PID: 7904, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: 1evAkYZpwDV0N4v.exe PID: 1704, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: gorfVgTf.exe PID: 6352, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024707F4 NtQueryInformationProcess,1_2_024707F4
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024796B8 NtQueryInformationProcess,1_2_024796B8
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,9_2_0041812A
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B907F4 NtQueryInformationProcess,11_2_00B907F4
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B996B8 NtQueryInformationProcess,11_2_00B996B8
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,9_2_004167EF
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024726D71_2_024726D7
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024714101_2_02471410
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024784E71_2_024784E7
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_02471C971_2_02471C97
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024735D81_2_024735D8
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024713711_2_02471371
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_02475BC71_2_02475BC7
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_02475BC81_2_02475BC8
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024750781_2_02475078
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024708DF1_2_024708DF
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024750881_2_02475088
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_0247594F1_2_0247594F
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024759501_2_02475950
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_0247210F1_2_0247210F
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024757091_2_02475709
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024757181_2_02475718
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024797D71_2_024797D7
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024797D81_2_024797D8
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_0247878F1_2_0247878F
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024787901_2_02478790
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024714091_2_02471409
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024744C81_2_024744C8
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024744D81_2_024744D8
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024734E01_2_024734E0
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024735D71_2_024735D7
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_02475DB21_2_02475DB2
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_070015981_2_07001598
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_070003641_2_07000364
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_070015971_2_07001597
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_0700AB581_2_0700AB58
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_0700AB681_2_0700AB68
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_07008B741_2_07008B74
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_070018081_2_07001808
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_0805AF381_2_0805AF38
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_0805A0701_2_0805A070
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_0805783B1_2_0805783B
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_080578481_2_08057848
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_08055B581_2_08055B58
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_08055B681_2_08055B68
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_08057DE81_2_08057DE8
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_08057DF81_2_08057DF8
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_0805351B1_2_0805351B
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_080535281_2_08053528
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_0968A1B01_2_0968A1B0
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_09681BCC1_2_09681BCC
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_096820C91_2_096820C9
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_096C18A01_2_096C18A0
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_096CC5701_2_096CC570
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_096C51581_2_096C5158
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_096C51521_2_096C5152
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_096C48E81_2_096C48E8
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_096C4D201_2_096C4D20
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_096C55801_2_096C5580
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_096C6D801_2_096C6D80
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_096C55901_2_096C5590
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_096C6D901_2_096C6D90
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0043706A9_2_0043706A
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_004140059_2_00414005
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0043E11C9_2_0043E11C
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_004541D99_2_004541D9
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_004381E89_2_004381E8
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0041F18B9_2_0041F18B
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_004462709_2_00446270
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0043E34B9_2_0043E34B
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_004533AB9_2_004533AB
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0042742E9_2_0042742E
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_004375669_2_00437566
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0043E5A89_2_0043E5A8
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_004387F09_2_004387F0
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0043797E9_2_0043797E
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_004339D79_2_004339D7
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0044DA499_2_0044DA49
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00427AD79_2_00427AD7
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0041DBF39_2_0041DBF3
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00427C409_2_00427C40
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00437DB39_2_00437DB3
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00435EEB9_2_00435EEB
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0043DEED9_2_0043DEED
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00426E9F9_2_00426E9F
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B91C8811_2_00B91C88
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B984E711_2_00B984E7
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B9141011_2_00B91410
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B935D811_2_00B935D8
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B926CA11_2_00B926CA
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B9508811_2_00B95088
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B934E011_2_00B934E0
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B944D811_2_00B944D8
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B908D011_2_00B908D0
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B944C811_2_00B944C8
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B9507811_2_00B95078
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B95DB211_2_00B95DB2
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B9210011_2_00B92100
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B9595011_2_00B95950
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B9594011_2_00B95940
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B95BB911_2_00B95BB9
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B9879011_2_00B98790
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B9878111_2_00B98781
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B997D811_2_00B997D8
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B95BC811_2_00B95BC8
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B997C711_2_00B997C7
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B9571811_2_00B95718
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B9570911_2_00B95709
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_00B9137111_2_00B91371
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_0950A1B011_2_0950A1B0
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_09501BCC11_2_09501BCC
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_095020C911_2_095020C9
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_097218A011_2_097218A0
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_0972515811_2_09725158
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_0972514A11_2_0972514A
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_097248E011_2_097248E0
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_09724D2011_2_09724D20
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_0972559011_2_09725590
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_09726D9011_2_09726D90
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_09726D8011_2_09726D80
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: String function: 00402093 appears 50 times
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: String function: 00434801 appears 41 times
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: String function: 00401E65 appears 34 times
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: String function: 00434E70 appears 54 times
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5804 -s 1196
                    Source: 1evAkYZpwDV0N4v.exe, 00000001.00000002.1410748980.000000000074E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 1evAkYZpwDV0N4v.exe
                    Source: 1evAkYZpwDV0N4v.exe, 00000001.00000002.1428084519.0000000009570000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs 1evAkYZpwDV0N4v.exe
                    Source: 1evAkYZpwDV0N4v.exe, 00000001.00000002.1430750884.000000000A340000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs 1evAkYZpwDV0N4v.exe
                    Source: 1evAkYZpwDV0N4v.exe, 00000001.00000002.1413156115.00000000026A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs 1evAkYZpwDV0N4v.exe
                    Source: 1evAkYZpwDV0N4v.exeBinary or memory string: OriginalFilenameCfZK.exe, vs 1evAkYZpwDV0N4v.exe
                    Source: 1evAkYZpwDV0N4v.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000001.00000002.1415947948.00000000035D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0000000B.00000002.1469343600.00000000040F5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: 1evAkYZpwDV0N4v.exe PID: 7904, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: 1evAkYZpwDV0N4v.exe PID: 1704, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: gorfVgTf.exe PID: 6352, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 1evAkYZpwDV0N4v.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: gorfVgTf.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, lskixiFk1G7PtPWGdZ.csSecurity API names: _0020.SetAccessControl
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, lskixiFk1G7PtPWGdZ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, lskixiFk1G7PtPWGdZ.csSecurity API names: _0020.AddAccessRule
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, iR2nv085PjK3x2ADXJ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, lskixiFk1G7PtPWGdZ.csSecurity API names: _0020.SetAccessControl
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, lskixiFk1G7PtPWGdZ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, lskixiFk1G7PtPWGdZ.csSecurity API names: _0020.AddAccessRule
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, iR2nv085PjK3x2ADXJ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, lskixiFk1G7PtPWGdZ.csSecurity API names: _0020.SetAccessControl
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, lskixiFk1G7PtPWGdZ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, lskixiFk1G7PtPWGdZ.csSecurity API names: _0020.AddAccessRule
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, iR2nv085PjK3x2ADXJ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@22/21@1/2
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,9_2_0041798D
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,9_2_0040F4AF
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,9_2_0041B539
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,9_2_0041AADB
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeFile created: C:\Users\user\AppData\Roaming\gorfVgTf.exeJump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8176:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeMutant created: NULL
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-ZFXG9Y
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeMutant created: \Sessions\1\BaseNamedObjects\creUeZebDcIkiis
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7780:120:WilError_03
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5804
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8120:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7408:120:WilError_03
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEDAD.tmpJump to behavior
                    Source: 1evAkYZpwDV0N4v.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 1evAkYZpwDV0N4v.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: 1evAkYZpwDV0N4v.exeVirustotal: Detection: 46%
                    Source: 1evAkYZpwDV0N4v.exeReversingLabs: Detection: 31%
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeFile read: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe"
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gorfVgTf.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmpEDAD.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe"
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "c:\program files (x86)\internet explorer\iexplore.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\gorfVgTf.exe C:\Users\user\AppData\Roaming\gorfVgTf.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmp403.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess created: C:\Users\user\AppData\Roaming\gorfVgTf.exe "C:\Users\user\AppData\Roaming\gorfVgTf.exe"
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5804 -s 1196
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gorfVgTf.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmpEDAD.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "c:\program files (x86)\internet explorer\iexplore.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmp403.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess created: C:\Users\user\AppData\Roaming\gorfVgTf.exe "C:\Users\user\AppData\Roaming\gorfVgTf.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: iconcodecservice.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: iconcodecservice.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: 1evAkYZpwDV0N4v.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: 1evAkYZpwDV0N4v.exeStatic file information: File size 1055744 > 1048576
                    Source: 1evAkYZpwDV0N4v.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeUnpacked PE file: 1.2.1evAkYZpwDV0N4v.exe.240000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeUnpacked PE file: 1.2.1evAkYZpwDV0N4v.exe.240000.0.unpack
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, lskixiFk1G7PtPWGdZ.cs.Net Code: AvBQWXm8Wp System.Reflection.Assembly.Load(byte[])
                    Source: 1.2.1evAkYZpwDV0N4v.exe.9570000.6.raw.unpack, MainForm.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 1.2.1evAkYZpwDV0N4v.exe.2754a58.2.raw.unpack, MainForm.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, lskixiFk1G7PtPWGdZ.cs.Net Code: AvBQWXm8Wp System.Reflection.Assembly.Load(byte[])
                    Source: 11.2.gorfVgTf.exe.40d5960.3.raw.unpack, MainForm.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 11.2.gorfVgTf.exe.29d31c8.1.raw.unpack, MainForm.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, lskixiFk1G7PtPWGdZ.cs.Net Code: AvBQWXm8Wp System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,9_2_0041CBE1
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_02472BD3 push ebp; ret 1_2_02472BDB
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_02475381 push edx; ret 1_2_0247538E
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024733BF push ebp; ret 1_2_024733C0
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024758C0 push ebp; ret 1_2_024758CE
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024730F8 push ebp; ret 1_2_02473102
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_02475940 push edx; ret 1_2_0247594E
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_0247316F push edx; ret 1_2_02473171
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_024729F1 push ebp; ret 1_2_024729F2
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_02474FFA push ebp; ret 1_2_02475006
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_02474C88 push ebp; ret 1_2_02474C96
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_02474491 push ebp; ret 1_2_0247449E
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_02472518 push eax; ret 1_2_02472519
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_08052630 push A8077973h; ret 1_2_0805271D
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_08052688 push A8077973h; ret 1_2_0805271D
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 1_2_096C04EB push ecx; ret 1_2_096C04EC
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00457186 push ecx; ret 9_2_00457199
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0045E55D push esi; ret 9_2_0045E566
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00457AA8 push eax; ret 9_2_00457AC6
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00434EB6 push ecx; ret 9_2_00434EC9
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 11_2_097204EB push ecx; ret 11_2_097204EC
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeCode function: 15_2_030CF868 push ebp; retf 15_2_030CF86A
                    Source: 1evAkYZpwDV0N4v.exeStatic PE information: section name: .text entropy: 7.844289288442316
                    Source: gorfVgTf.exe.1.drStatic PE information: section name: .text entropy: 7.844289288442316
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, N0ayy7oUj79BRFbJd9.csHigh entropy of concatenated method names: 'AGyhdr6H3O', 'CAohagMXDZ', 'buVhqIbgP3', 'USphkNeiyX', 'uvThHIRxg8', 'V0vhFpBiP7', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, V8gnToD3DRJb6LinK9.csHigh entropy of concatenated method names: 'oi6A9STM6u', 'XY9AcCfZYa', 'ToString', 'hxIAnJxgX5', 'hqKANmUbJM', 'YHvAdjY0i9', 'SEfAaxuJcP', 'jQiAqYpQB5', 'OnVAkC2hLm', 'dqZAFCxYDV'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, QQwgAbe2Vv3RJqJ4i1.csHigh entropy of concatenated method names: 'ToString', 'upcr3xqbh3', 'v7FrChjmUN', 'PrYrlxWh9a', 'vKOrTtipkS', 'vk0rE2xsxL', 'JxTri0Jh78', 'noPruJajyw', 'brgrJZ6Ckt', 'ihOr5Xbrwp'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, d2PDh75hXdq1vO1Kdy.csHigh entropy of concatenated method names: 'ap8kK1nIqy', 'rXAkjKmMWE', 'CwJkW1NAQD', 'nYtkwexhYG', 'M8OkZrXmw9', 'eK3kgS1RRp', 'dRgkBtfQ8C', 'ImMk8M7FPW', 'oGbk4EcS8o', 'UnUk255iaP'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, xtd5G1zntN6uSkh1sw.csHigh entropy of concatenated method names: 'bxVhgYOYqi', 'WVRh8I4al8', 'wMMh4dLVKX', 'sX1hfWPqkC', 'i6QhCnKbh2', 'gwyhTBXvQk', 'v8QhEDGQAJ', 'H0khs2pvd5', 'MjehK6Ndhc', 'l6ahjysKFm'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, Ur02u96aaH1togwPMN.csHigh entropy of concatenated method names: 'RpSO80qkKu', 'hlOO4n7sQO', 'EwaOfR8mSJ', 'NjVOCI5ddv', 'EoVOT64w96', 'PblOEVMWGZ', 'doJOusyqgB', 'Y3IOJJDD8x', 'iyFOpa9Vx3', 'dDUO37L0Kw'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, QrxoQUul9KUIXP7LQ6.csHigh entropy of concatenated method names: 'Nk6knpQTNu', 'yFSkd87xhY', 'tbWkqCRLI1', 'G24qo221OE', 'YN8qzou5gU', 'bTUkPnmhZ3', 'rEYkIIH2FB', 'rRgk1wWYSS', 'TJ5kxvHxae', 'zWPkQvD4wK'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, Bn49wG7XohNtmcdXjG.csHigh entropy of concatenated method names: 'rvoHfYXNB1', 'NP3HCjg2KH', 'iTGHlxvgxC', 'r87HTV3sy8', 'lXGHEkqc9H', 'IQrHipWbWh', 'jiKHuhrLEb', 'R9lHJf3eBs', 'lLdH55JRGH', 'rpKHplovmY'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, ko3Z15Qfq37vB7VejN.csHigh entropy of concatenated method names: 'TJqIkR2nv0', 'MPjIFK3x2A', 'ChVI9XvjUq', 'P6aIcmaR7I', 'fj8I0KIV8C', 'PY2IrIhthi', 'qADyNHMg5fuOsya0Ze', 'EqJS5bnfTyfwdkw3Im', 'c73II8ZOHV', 'zyXIxlYSOe'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, lskixiFk1G7PtPWGdZ.csHigh entropy of concatenated method names: 'oejxb9WroX', 'CZ2xnHRIpc', 'KDrxNFh5Hk', 'MoHxdrge40', 'VuWxaPBK8a', 'G16xqFZ4eQ', 'w8yxkVLgRj', 'TLfxFRid0i', 'gk1xXsWTwU', 'GJNx9EpoG0'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, xoOPWkt5lo91Bo9dda.csHigh entropy of concatenated method names: 'HX3AGNfi7I', 'PH8AoqamHg', 'eofLPc69R7', 'avwLImCPNd', 'YEsA3iISJv', 'mkjAS7fMEa', 'yEKA6bxGb7', 'v5KAy6ULSg', 'SYvAVfmG6U', 'gfWAehBp4L'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, tVsXh51d9FIacIoJ7m.csHigh entropy of concatenated method names: 'ThtWO0kiv', 'vs1wl7Axp', 'dH1gbSZ9a', 'HbhBMXUdj', 'x664fePJb', 'TXv2WmQRe', 'F6A9X6pnDsFa1Lt6bi', 'RfXZGPIfq46l0atjFG', 'WnwLtL5MA', 'TI2h5MQL2'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, PBM33JIPcsilkpfibX3.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'WM0h3qJQLM', 'OtYhS31xJp', 'mrWh6bkqLm', 'nwPhywGvfU', 'gAhhVuCLVN', 'S4xheVihKW', 'Xy9hD3JEpN'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, mBsgqg4hVXvjUqS6am.csHigh entropy of concatenated method names: 'W6gdwjQcQg', 'YXtdg9oC1Q', 'XWGd8QtIjT', 'kD4d4unDnn', 'jZcd0KWhqt', 'KFPdrOmp6x', 'jLXdAZBUaJ', 'FMwdLMuFaT', 'Hm4dH2299q', 'dFCdhWkDE6'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, S8CSY2fIhthiDI3lcy.csHigh entropy of concatenated method names: 'n5TqblUKRl', 'Bw6qNVExMO', 'yHRqaxsCrQ', 'F4nqkAIVog', 'QA9qFwNBKW', 'oPMaU8Wh6r', 'jskatv1D22', 'TDMamL7sXH', 'NPCaGGEYZe', 'Xl0a7nw3V8'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, vgNQTSIQ28SrdjGwm5d.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'DMdMHDFt5N', 'Wi8MhmBdbQ', 'SUTMvclvTL', 'TDfMMUcvkl', 'CRuMYYljpO', 'WEUMRI9iwM', 'OTTMsBEncm'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, mppCLkmO07wUAWv2Cc.csHigh entropy of concatenated method names: 'W5kH0R5Bt1', 'jGdHAP1lKm', 'd5CHHE4NoK', 'zfMHvhbISF', 'bLEHYn8oMb', 'mcyHsoSBbw', 'Dispose', 'W3ELn5SixM', 'd0RLN8QwjW', 'fP3LdSgyK4'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, TYtf6JNyhHdG9rqm8i.csHigh entropy of concatenated method names: 'Dispose', 'XwUI7AWv2C', 'V0l1CZuCkv', 'pfteC9iM4o', 'mmTIoEgKad', 'W0aIz8awcX', 'ProcessDialogKey', 'z9g1Pn49wG', 'loh1INtmcd', 'ljG11p0ayy'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, iR2nv085PjK3x2ADXJ.csHigh entropy of concatenated method names: 'X1HNyUlle2', 'qbCNVi4o7i', 'i1eNeBMFwI', 'QleND41UO4', 'qZoNUGmqcY', 'GDuNtMnfTO', 'aT9Nm3euiZ', 'E3PNGDQDYp', 'yYKN7LuaSI', 'YbkNonibVI'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.a340000.7.raw.unpack, JFA32dIIxhSV1AxpIyd.csHigh entropy of concatenated method names: 'UEBhovd5vE', 'phYhzBuf0R', 'h4KvPeeawr', 'xFCvIjvps7', 'Rumv1ZleNM', 'DHFvxqD5Iv', 'PoSvQ42JJK', 'DBjvbGagm3', 'sYVvn9UGxO', 'REjvNt2gOR'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, N0ayy7oUj79BRFbJd9.csHigh entropy of concatenated method names: 'AGyhdr6H3O', 'CAohagMXDZ', 'buVhqIbgP3', 'USphkNeiyX', 'uvThHIRxg8', 'V0vhFpBiP7', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, V8gnToD3DRJb6LinK9.csHigh entropy of concatenated method names: 'oi6A9STM6u', 'XY9AcCfZYa', 'ToString', 'hxIAnJxgX5', 'hqKANmUbJM', 'YHvAdjY0i9', 'SEfAaxuJcP', 'jQiAqYpQB5', 'OnVAkC2hLm', 'dqZAFCxYDV'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, QQwgAbe2Vv3RJqJ4i1.csHigh entropy of concatenated method names: 'ToString', 'upcr3xqbh3', 'v7FrChjmUN', 'PrYrlxWh9a', 'vKOrTtipkS', 'vk0rE2xsxL', 'JxTri0Jh78', 'noPruJajyw', 'brgrJZ6Ckt', 'ihOr5Xbrwp'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, d2PDh75hXdq1vO1Kdy.csHigh entropy of concatenated method names: 'ap8kK1nIqy', 'rXAkjKmMWE', 'CwJkW1NAQD', 'nYtkwexhYG', 'M8OkZrXmw9', 'eK3kgS1RRp', 'dRgkBtfQ8C', 'ImMk8M7FPW', 'oGbk4EcS8o', 'UnUk255iaP'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, xtd5G1zntN6uSkh1sw.csHigh entropy of concatenated method names: 'bxVhgYOYqi', 'WVRh8I4al8', 'wMMh4dLVKX', 'sX1hfWPqkC', 'i6QhCnKbh2', 'gwyhTBXvQk', 'v8QhEDGQAJ', 'H0khs2pvd5', 'MjehK6Ndhc', 'l6ahjysKFm'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, Ur02u96aaH1togwPMN.csHigh entropy of concatenated method names: 'RpSO80qkKu', 'hlOO4n7sQO', 'EwaOfR8mSJ', 'NjVOCI5ddv', 'EoVOT64w96', 'PblOEVMWGZ', 'doJOusyqgB', 'Y3IOJJDD8x', 'iyFOpa9Vx3', 'dDUO37L0Kw'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, QrxoQUul9KUIXP7LQ6.csHigh entropy of concatenated method names: 'Nk6knpQTNu', 'yFSkd87xhY', 'tbWkqCRLI1', 'G24qo221OE', 'YN8qzou5gU', 'bTUkPnmhZ3', 'rEYkIIH2FB', 'rRgk1wWYSS', 'TJ5kxvHxae', 'zWPkQvD4wK'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, Bn49wG7XohNtmcdXjG.csHigh entropy of concatenated method names: 'rvoHfYXNB1', 'NP3HCjg2KH', 'iTGHlxvgxC', 'r87HTV3sy8', 'lXGHEkqc9H', 'IQrHipWbWh', 'jiKHuhrLEb', 'R9lHJf3eBs', 'lLdH55JRGH', 'rpKHplovmY'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, ko3Z15Qfq37vB7VejN.csHigh entropy of concatenated method names: 'TJqIkR2nv0', 'MPjIFK3x2A', 'ChVI9XvjUq', 'P6aIcmaR7I', 'fj8I0KIV8C', 'PY2IrIhthi', 'qADyNHMg5fuOsya0Ze', 'EqJS5bnfTyfwdkw3Im', 'c73II8ZOHV', 'zyXIxlYSOe'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, lskixiFk1G7PtPWGdZ.csHigh entropy of concatenated method names: 'oejxb9WroX', 'CZ2xnHRIpc', 'KDrxNFh5Hk', 'MoHxdrge40', 'VuWxaPBK8a', 'G16xqFZ4eQ', 'w8yxkVLgRj', 'TLfxFRid0i', 'gk1xXsWTwU', 'GJNx9EpoG0'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, xoOPWkt5lo91Bo9dda.csHigh entropy of concatenated method names: 'HX3AGNfi7I', 'PH8AoqamHg', 'eofLPc69R7', 'avwLImCPNd', 'YEsA3iISJv', 'mkjAS7fMEa', 'yEKA6bxGb7', 'v5KAy6ULSg', 'SYvAVfmG6U', 'gfWAehBp4L'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, tVsXh51d9FIacIoJ7m.csHigh entropy of concatenated method names: 'ThtWO0kiv', 'vs1wl7Axp', 'dH1gbSZ9a', 'HbhBMXUdj', 'x664fePJb', 'TXv2WmQRe', 'F6A9X6pnDsFa1Lt6bi', 'RfXZGPIfq46l0atjFG', 'WnwLtL5MA', 'TI2h5MQL2'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, PBM33JIPcsilkpfibX3.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'WM0h3qJQLM', 'OtYhS31xJp', 'mrWh6bkqLm', 'nwPhywGvfU', 'gAhhVuCLVN', 'S4xheVihKW', 'Xy9hD3JEpN'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, mBsgqg4hVXvjUqS6am.csHigh entropy of concatenated method names: 'W6gdwjQcQg', 'YXtdg9oC1Q', 'XWGd8QtIjT', 'kD4d4unDnn', 'jZcd0KWhqt', 'KFPdrOmp6x', 'jLXdAZBUaJ', 'FMwdLMuFaT', 'Hm4dH2299q', 'dFCdhWkDE6'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, S8CSY2fIhthiDI3lcy.csHigh entropy of concatenated method names: 'n5TqblUKRl', 'Bw6qNVExMO', 'yHRqaxsCrQ', 'F4nqkAIVog', 'QA9qFwNBKW', 'oPMaU8Wh6r', 'jskatv1D22', 'TDMamL7sXH', 'NPCaGGEYZe', 'Xl0a7nw3V8'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, vgNQTSIQ28SrdjGwm5d.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'DMdMHDFt5N', 'Wi8MhmBdbQ', 'SUTMvclvTL', 'TDfMMUcvkl', 'CRuMYYljpO', 'WEUMRI9iwM', 'OTTMsBEncm'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, mppCLkmO07wUAWv2Cc.csHigh entropy of concatenated method names: 'W5kH0R5Bt1', 'jGdHAP1lKm', 'd5CHHE4NoK', 'zfMHvhbISF', 'bLEHYn8oMb', 'mcyHsoSBbw', 'Dispose', 'W3ELn5SixM', 'd0RLN8QwjW', 'fP3LdSgyK4'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, TYtf6JNyhHdG9rqm8i.csHigh entropy of concatenated method names: 'Dispose', 'XwUI7AWv2C', 'V0l1CZuCkv', 'pfteC9iM4o', 'mmTIoEgKad', 'W0aIz8awcX', 'ProcessDialogKey', 'z9g1Pn49wG', 'loh1INtmcd', 'ljG11p0ayy'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, iR2nv085PjK3x2ADXJ.csHigh entropy of concatenated method names: 'X1HNyUlle2', 'qbCNVi4o7i', 'i1eNeBMFwI', 'QleND41UO4', 'qZoNUGmqcY', 'GDuNtMnfTO', 'aT9Nm3euiZ', 'E3PNGDQDYp', 'yYKN7LuaSI', 'YbkNonibVI'
                    Source: 1.2.1evAkYZpwDV0N4v.exe.417fd38.4.raw.unpack, JFA32dIIxhSV1AxpIyd.csHigh entropy of concatenated method names: 'UEBhovd5vE', 'phYhzBuf0R', 'h4KvPeeawr', 'xFCvIjvps7', 'Rumv1ZleNM', 'DHFvxqD5Iv', 'PoSvQ42JJK', 'DBjvbGagm3', 'sYVvn9UGxO', 'REjvNt2gOR'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, N0ayy7oUj79BRFbJd9.csHigh entropy of concatenated method names: 'AGyhdr6H3O', 'CAohagMXDZ', 'buVhqIbgP3', 'USphkNeiyX', 'uvThHIRxg8', 'V0vhFpBiP7', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, V8gnToD3DRJb6LinK9.csHigh entropy of concatenated method names: 'oi6A9STM6u', 'XY9AcCfZYa', 'ToString', 'hxIAnJxgX5', 'hqKANmUbJM', 'YHvAdjY0i9', 'SEfAaxuJcP', 'jQiAqYpQB5', 'OnVAkC2hLm', 'dqZAFCxYDV'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, QQwgAbe2Vv3RJqJ4i1.csHigh entropy of concatenated method names: 'ToString', 'upcr3xqbh3', 'v7FrChjmUN', 'PrYrlxWh9a', 'vKOrTtipkS', 'vk0rE2xsxL', 'JxTri0Jh78', 'noPruJajyw', 'brgrJZ6Ckt', 'ihOr5Xbrwp'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, d2PDh75hXdq1vO1Kdy.csHigh entropy of concatenated method names: 'ap8kK1nIqy', 'rXAkjKmMWE', 'CwJkW1NAQD', 'nYtkwexhYG', 'M8OkZrXmw9', 'eK3kgS1RRp', 'dRgkBtfQ8C', 'ImMk8M7FPW', 'oGbk4EcS8o', 'UnUk255iaP'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, xtd5G1zntN6uSkh1sw.csHigh entropy of concatenated method names: 'bxVhgYOYqi', 'WVRh8I4al8', 'wMMh4dLVKX', 'sX1hfWPqkC', 'i6QhCnKbh2', 'gwyhTBXvQk', 'v8QhEDGQAJ', 'H0khs2pvd5', 'MjehK6Ndhc', 'l6ahjysKFm'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, Ur02u96aaH1togwPMN.csHigh entropy of concatenated method names: 'RpSO80qkKu', 'hlOO4n7sQO', 'EwaOfR8mSJ', 'NjVOCI5ddv', 'EoVOT64w96', 'PblOEVMWGZ', 'doJOusyqgB', 'Y3IOJJDD8x', 'iyFOpa9Vx3', 'dDUO37L0Kw'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, QrxoQUul9KUIXP7LQ6.csHigh entropy of concatenated method names: 'Nk6knpQTNu', 'yFSkd87xhY', 'tbWkqCRLI1', 'G24qo221OE', 'YN8qzou5gU', 'bTUkPnmhZ3', 'rEYkIIH2FB', 'rRgk1wWYSS', 'TJ5kxvHxae', 'zWPkQvD4wK'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, Bn49wG7XohNtmcdXjG.csHigh entropy of concatenated method names: 'rvoHfYXNB1', 'NP3HCjg2KH', 'iTGHlxvgxC', 'r87HTV3sy8', 'lXGHEkqc9H', 'IQrHipWbWh', 'jiKHuhrLEb', 'R9lHJf3eBs', 'lLdH55JRGH', 'rpKHplovmY'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, ko3Z15Qfq37vB7VejN.csHigh entropy of concatenated method names: 'TJqIkR2nv0', 'MPjIFK3x2A', 'ChVI9XvjUq', 'P6aIcmaR7I', 'fj8I0KIV8C', 'PY2IrIhthi', 'qADyNHMg5fuOsya0Ze', 'EqJS5bnfTyfwdkw3Im', 'c73II8ZOHV', 'zyXIxlYSOe'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, lskixiFk1G7PtPWGdZ.csHigh entropy of concatenated method names: 'oejxb9WroX', 'CZ2xnHRIpc', 'KDrxNFh5Hk', 'MoHxdrge40', 'VuWxaPBK8a', 'G16xqFZ4eQ', 'w8yxkVLgRj', 'TLfxFRid0i', 'gk1xXsWTwU', 'GJNx9EpoG0'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, xoOPWkt5lo91Bo9dda.csHigh entropy of concatenated method names: 'HX3AGNfi7I', 'PH8AoqamHg', 'eofLPc69R7', 'avwLImCPNd', 'YEsA3iISJv', 'mkjAS7fMEa', 'yEKA6bxGb7', 'v5KAy6ULSg', 'SYvAVfmG6U', 'gfWAehBp4L'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, tVsXh51d9FIacIoJ7m.csHigh entropy of concatenated method names: 'ThtWO0kiv', 'vs1wl7Axp', 'dH1gbSZ9a', 'HbhBMXUdj', 'x664fePJb', 'TXv2WmQRe', 'F6A9X6pnDsFa1Lt6bi', 'RfXZGPIfq46l0atjFG', 'WnwLtL5MA', 'TI2h5MQL2'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, PBM33JIPcsilkpfibX3.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'WM0h3qJQLM', 'OtYhS31xJp', 'mrWh6bkqLm', 'nwPhywGvfU', 'gAhhVuCLVN', 'S4xheVihKW', 'Xy9hD3JEpN'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, mBsgqg4hVXvjUqS6am.csHigh entropy of concatenated method names: 'W6gdwjQcQg', 'YXtdg9oC1Q', 'XWGd8QtIjT', 'kD4d4unDnn', 'jZcd0KWhqt', 'KFPdrOmp6x', 'jLXdAZBUaJ', 'FMwdLMuFaT', 'Hm4dH2299q', 'dFCdhWkDE6'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, S8CSY2fIhthiDI3lcy.csHigh entropy of concatenated method names: 'n5TqblUKRl', 'Bw6qNVExMO', 'yHRqaxsCrQ', 'F4nqkAIVog', 'QA9qFwNBKW', 'oPMaU8Wh6r', 'jskatv1D22', 'TDMamL7sXH', 'NPCaGGEYZe', 'Xl0a7nw3V8'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, vgNQTSIQ28SrdjGwm5d.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'DMdMHDFt5N', 'Wi8MhmBdbQ', 'SUTMvclvTL', 'TDfMMUcvkl', 'CRuMYYljpO', 'WEUMRI9iwM', 'OTTMsBEncm'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, mppCLkmO07wUAWv2Cc.csHigh entropy of concatenated method names: 'W5kH0R5Bt1', 'jGdHAP1lKm', 'd5CHHE4NoK', 'zfMHvhbISF', 'bLEHYn8oMb', 'mcyHsoSBbw', 'Dispose', 'W3ELn5SixM', 'd0RLN8QwjW', 'fP3LdSgyK4'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, TYtf6JNyhHdG9rqm8i.csHigh entropy of concatenated method names: 'Dispose', 'XwUI7AWv2C', 'V0l1CZuCkv', 'pfteC9iM4o', 'mmTIoEgKad', 'W0aIz8awcX', 'ProcessDialogKey', 'z9g1Pn49wG', 'loh1INtmcd', 'ljG11p0ayy'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, iR2nv085PjK3x2ADXJ.csHigh entropy of concatenated method names: 'X1HNyUlle2', 'qbCNVi4o7i', 'i1eNeBMFwI', 'QleND41UO4', 'qZoNUGmqcY', 'GDuNtMnfTO', 'aT9Nm3euiZ', 'E3PNGDQDYp', 'yYKN7LuaSI', 'YbkNonibVI'
                    Source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, JFA32dIIxhSV1AxpIyd.csHigh entropy of concatenated method names: 'UEBhovd5vE', 'phYhzBuf0R', 'h4KvPeeawr', 'xFCvIjvps7', 'Rumv1ZleNM', 'DHFvxqD5Iv', 'PoSvQ42JJK', 'DBjvbGagm3', 'sYVvn9UGxO', 'REjvNt2gOR'
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00406EEB ShellExecuteW,URLDownloadToFileW,9_2_00406EEB
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeFile created: C:\Users\user\AppData\Roaming\gorfVgTf.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmpEDAD.tmp"
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,9_2_0041AADB

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,9_2_0041CBE1
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: 1evAkYZpwDV0N4v.exe PID: 7904, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0040F7E2 Sleep,ExitProcess,9_2_0040F7E2
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeMemory allocated: 2470000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeMemory allocated: 25D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeMemory allocated: 45D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeMemory allocated: 4C70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeMemory allocated: 5C70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeMemory allocated: 5DA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeMemory allocated: 6DA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeMemory allocated: A400000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeMemory allocated: B400000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeMemory allocated: 4C70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeMemory allocated: B90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeMemory allocated: 2850000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeMemory allocated: DB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeMemory allocated: 4D90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeMemory allocated: 5D90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeMemory allocated: 5EC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeMemory allocated: 6EC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeMemory allocated: 9E00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeMemory allocated: AE00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeMemory allocated: B290000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeMemory allocated: C290000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,9_2_0041A7D9
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8106Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 715Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8313Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 437Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeWindow / User API: threadDelayed 9471Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeWindow / User API: foregroundWindowGot 1763Jump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe TID: 7944Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7676Thread sleep time: -10145709240540247s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7336Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6568Thread sleep time: -9223372036854770s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7636Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exe TID: 2908Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exe TID: 8140Thread sleep time: -124000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exe TID: 8124Thread sleep time: -28413000s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_0040928E
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,9_2_0041C322
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,9_2_0040C388
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_004096A0
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,9_2_00408847
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00407877 FindFirstFileW,FindNextFileW,9_2_00407877
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0044E8F9 FindFirstFileExA,9_2_0044E8F9
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,9_2_0040BB6B
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,9_2_00419B86
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,9_2_0040BD72
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,9_2_00407CD2
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: gorfVgTf.exe, 0000000F.00000002.3343555387.000000000151B000.00000004.00000020.00020000.00000000.sdmp, gorfVgTf.exe, 0000000F.00000002.3343140213.00000000014AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00434A8A
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,9_2_0041CBE1
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00443355 mov eax, dword ptr fs:[00000030h]9_2_00443355
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_004120B2 GetProcessHeap,HeapFree,9_2_004120B2
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_0043503C
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00434A8A
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_0043BB71
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00434BD8 SetUnhandledExceptionFilter,9_2_00434BD8
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe"
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gorfVgTf.exe"
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gorfVgTf.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,9_2_0041812A
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeMemory written: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeMemory written: C:\Users\user\AppData\Roaming\gorfVgTf.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeSection loaded: NULL target: C:\Program Files (x86)\Internet Explorer\iexplore.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 4AF008Jump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe9_2_00412132
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00419662 mouse_event,9_2_00419662
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gorfVgTf.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmpEDAD.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "c:\program files (x86)\internet explorer\iexplore.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmp403.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeProcess created: C:\Users\user\AppData\Roaming\gorfVgTf.exe "C:\Users\user\AppData\Roaming\gorfVgTf.exe"Jump to behavior
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bProgram Managerenh.dll
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dProgram Manager
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bProgram Manager\logs.dat
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager9Y\
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager9Y\%
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager9Y\d
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dProgram Managerenh.dll
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager9Y\}
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bProgram Manager`
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerenh.dllQ
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: `Program ManagerV
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dProgram Managerj
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager9Y\er:
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cProgram Manager\logs.dats>
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager9Y\V
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager9Y\erQ
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager9Y\r
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager9Y\o
                    Source: gorfVgTf.exe, 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dProgram Manager\logs.datWx
                    Source: gorfVgTf.exe, 0000000F.00000002.3343140213.00000000014AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager=
                    Source: gorfVgTf.exe, 0000000F.00000002.3343140213.00000000014AA000.00000004.00000020.00020000.00000000.sdmp, logs.dat.15.drBinary or memory string: [Program Manager]
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00434CB6 cpuid 9_2_00434CB6
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: EnumSystemLocalesW,9_2_0045201B
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: EnumSystemLocalesW,9_2_004520B6
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,9_2_00452143
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: GetLocaleInfoW,9_2_00452393
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: EnumSystemLocalesW,9_2_00448484
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,9_2_004524BC
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: GetLocaleInfoW,9_2_004525C3
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,9_2_00452690
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: GetLocaleInfoW,9_2_0044896D
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: GetLocaleInfoA,9_2_0040F90C
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,9_2_00451D58
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: EnumSystemLocalesW,9_2_00451FD0
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeQueries volume information: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeQueries volume information: C:\Users\user\AppData\Roaming\gorfVgTf.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0041A045 __EH_prolog,GdiplusStartup,CreateDirectoryW,Sleep,Sleep,GetLocalTime,Sleep,9_2_0041A045
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_0041B69E GetUserNameW,9_2_0041B69E
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: 9_2_00449210 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,9_2_00449210
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.3343140213.0000000001497000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.3343917986.0000000002F8F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.3343140213.00000000014AA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1415947948.00000000035D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1469343600.00000000040F5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 1evAkYZpwDV0N4v.exe PID: 7904, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 1evAkYZpwDV0N4v.exe PID: 1704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: gorfVgTf.exe PID: 6352, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: gorfVgTf.exe PID: 5804, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data9_2_0040BA4D
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\9_2_0040BB6B
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: \key3.db9_2_0040BB6B

                    Remote Access Functionality

                    barindex
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-ZFXG9YJump to behavior
                    Source: C:\Users\user\AppData\Roaming\gorfVgTf.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-ZFXG9YJump to behavior
                    Source: Yara matchFile source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.1evAkYZpwDV0N4v.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.364e190.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.1evAkYZpwDV0N4v.exe.35d5570.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.gorfVgTf.exe.4400600.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.3343140213.0000000001497000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.3343917986.0000000002F8F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.3343140213.00000000014AA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1415947948.00000000035D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1469343600.00000000040F5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 1evAkYZpwDV0N4v.exe PID: 7904, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 1evAkYZpwDV0N4v.exe PID: 1704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: gorfVgTf.exe PID: 6352, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: gorfVgTf.exe PID: 5804, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exeCode function: cmd.exe9_2_0040569A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    12
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Command and Scripting Interpreter
                    1
                    Windows Service
                    1
                    Bypass User Account Control
                    1
                    Deobfuscate/Decode Files or Information
                    211
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol211
                    Input Capture
                    2
                    Encrypted Channel
                    Exfiltration Over Bluetooth1
                    Defacement
                    Email AddressesDNS ServerDomain Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    1
                    Access Token Manipulation
                    4
                    Obfuscated Files or Information
                    2
                    Credentials In Files
                    1
                    System Service Discovery
                    SMB/Windows Admin Shares3
                    Clipboard Data
                    1
                    Remote Access Software
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal Accounts2
                    Service Execution
                    Login Hook1
                    Windows Service
                    32
                    Software Packing
                    NTDS3
                    File and Directory Discovery
                    Distributed Component Object ModelInput Capture2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script422
                    Process Injection
                    1
                    DLL Side-Loading
                    LSA Secrets33
                    System Information Discovery
                    SSHKeylogging12
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                    Scheduled Task/Job
                    1
                    Bypass User Account Control
                    Cached Domain Credentials131
                    Security Software Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Masquerading
                    DCSync41
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job41
                    Virtualization/Sandbox Evasion
                    Proc Filesystem3
                    Process Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Access Token Manipulation
                    /etc/passwd and /etc/shadow1
                    Application Window Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron422
                    Process Injection
                    Network Sniffing1
                    System Owner/User Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1581290 Sample: 1evAkYZpwDV0N4v.exe Startdate: 27/12/2024 Architecture: WINDOWS Score: 100 53 geoplugin.net 2->53 59 Suricata IDS alerts for network traffic 2->59 61 Found malware configuration 2->61 63 Malicious sample detected (through community Yara rule) 2->63 65 11 other signatures 2->65 8 1evAkYZpwDV0N4v.exe 7 2->8         started        12 gorfVgTf.exe 5 2->12         started        signatures3 process4 file5 43 C:\Users\user\AppData\Roaming\gorfVgTf.exe, PE32 8->43 dropped 45 C:\Users\...\gorfVgTf.exe:Zone.Identifier, ASCII 8->45 dropped 47 C:\Users\user\AppData\Local\...\tmpEDAD.tmp, XML 8->47 dropped 49 C:\Users\user\...\1evAkYZpwDV0N4v.exe.log, ASCII 8->49 dropped 67 Contains functionality to bypass UAC (CMSTPLUA) 8->67 69 Detected unpacking (changes PE section rights) 8->69 71 Detected unpacking (overwrites its own PE header) 8->71 79 8 other signatures 8->79 14 1evAkYZpwDV0N4v.exe 2 8->14         started        17 powershell.exe 23 8->17         started        19 powershell.exe 23 8->19         started        21 schtasks.exe 1 8->21         started        73 Multi AV Scanner detection for dropped file 12->73 75 Machine Learning detection for dropped file 12->75 77 Injects a PE file into a foreign processes 12->77 23 gorfVgTf.exe 2 15 12->23         started        27 schtasks.exe 1 12->27         started        signatures6 process7 dnsIp8 81 Writes to foreign memory regions 14->81 83 Maps a DLL or memory area into another process 14->83 29 iexplore.exe 14->29         started        85 Loading BitLocker PowerShell Module 17->85 31 WmiPrvSE.exe 17->31         started        33 conhost.exe 17->33         started        35 conhost.exe 19->35         started        37 conhost.exe 21->37         started        55 192.3.64.152, 2559, 49735, 49774 AS-COLOCROSSINGUS United States 23->55 57 geoplugin.net 178.237.33.50, 49741, 80 ATOM86-ASATOM86NL Netherlands 23->57 51 C:\ProgramData\remcos\logs.dat, data 23->51 dropped 87 Detected Remcos RAT 23->87 89 Installs a global keyboard hook 23->89 39 WerFault.exe 23->39         started        41 conhost.exe 27->41         started        file9 signatures10 process11

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    1evAkYZpwDV0N4v.exe46%VirustotalBrowse
                    1evAkYZpwDV0N4v.exe32%ReversingLabsWin32.Infostealer.Generic
                    1evAkYZpwDV0N4v.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\gorfVgTf.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\gorfVgTf.exe32%ReversingLabsWin32.Infostealer.Generic
                    C:\Users\user\AppData\Roaming\gorfVgTf.exe46%VirustotalBrowse
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    geoplugin.net
                    178.237.33.50
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://geoplugin.net/json.gpfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://geoplugin.net/json.gp/C1evAkYZpwDV0N4v.exe, 00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmp, 1evAkYZpwDV0N4v.exe, 00000001.00000002.1415947948.00000000035D1000.00000004.00000800.00020000.00000000.sdmp, 1evAkYZpwDV0N4v.exe, 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, gorfVgTf.exe, 0000000B.00000002.1469343600.00000000040F5000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name1evAkYZpwDV0N4v.exe, 00000001.00000002.1413156115.0000000002638000.00000004.00000800.00020000.00000000.sdmp, gorfVgTf.exe, 0000000B.00000002.1464889990.00000000028BA000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            178.237.33.50
                            geoplugin.netNetherlands
                            8455ATOM86-ASATOM86NLfalse
                            192.3.64.152
                            unknownUnited States
                            36352AS-COLOCROSSINGUStrue
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1581290
                            Start date and time:2024-12-27 10:28:13 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 10m 1s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:25
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:1evAkYZpwDV0N4v.exe
                            Detection:MAL
                            Classification:mal100.rans.troj.spyw.expl.evad.winEXE@22/21@1/2
                            EGA Information:
                            • Successful, ratio: 75%
                            HCA Information:
                            • Successful, ratio: 95%
                            • Number of executed functions: 184
                            • Number of non-executed functions: 239
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 52.168.117.173, 13.107.246.63, 23.218.208.109, 20.109.210.53, 20.190.177.146
                            • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, fs.microsoft.com, slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                            • Execution Graph export aborted for target gorfVgTf.exe, PID 5804 because there are no executed function
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtCreateKey calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            04:29:16API Interceptor2x Sleep call for process: 1evAkYZpwDV0N4v.exe modified
                            04:29:18API Interceptor49x Sleep call for process: powershell.exe modified
                            04:29:22API Interceptor3524412x Sleep call for process: gorfVgTf.exe modified
                            04:32:34API Interceptor1x Sleep call for process: WerFault.exe modified
                            10:29:19Task SchedulerRun new task: gorfVgTf path: C:\Users\user\AppData\Roaming\gorfVgTf.exe
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            178.237.33.5094e.exeGet hashmaliciousRemcosBrowse
                            • geoplugin.net/json.gp
                            94e.exeGet hashmaliciousRemcosBrowse
                            • geoplugin.net/json.gp
                            0442.pdf.exeGet hashmaliciousRemcosBrowse
                            • geoplugin.net/json.gp
                            1734707047fff7a4a195c1e77157873964de3a3a708aa4bdc0aee24f3a94bc5bd05cc323f3964.dat-decoded.exeGet hashmaliciousRemcosBrowse
                            • geoplugin.net/json.gp
                            SHROsQyiAd.exeGet hashmaliciousRemcosBrowse
                            • geoplugin.net/json.gp
                            nikDoCvpJa.exeGet hashmaliciousRemcosBrowse
                            • geoplugin.net/json.gp
                            17346150108fd59162a7f50db4b74cc85f1873b39cc8eaeab355e353b3b8b18e8e21fd369d493.dat-decoded.exeGet hashmaliciousRemcosBrowse
                            • geoplugin.net/json.gp
                            LbtytfWpvx.vbsGet hashmaliciousRemcosBrowse
                            • geoplugin.net/json.gp
                            SEPTobn3BR.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                            • geoplugin.net/json.gp
                            greatindiancompaniesgivenbestgiftforyourhealthgivengoodreturns.htaGet hashmaliciousCobalt Strike, Remcos, DBatLoaderBrowse
                            • geoplugin.net/json.gp
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            geoplugin.net94e.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            94e.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            0442.pdf.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            1734707047fff7a4a195c1e77157873964de3a3a708aa4bdc0aee24f3a94bc5bd05cc323f3964.dat-decoded.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            SHROsQyiAd.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            nikDoCvpJa.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            17346150108fd59162a7f50db4b74cc85f1873b39cc8eaeab355e353b3b8b18e8e21fd369d493.dat-decoded.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            LbtytfWpvx.vbsGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            SEPTobn3BR.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                            • 178.237.33.50
                            greatindiancompaniesgivenbestgiftforyourhealthgivengoodreturns.htaGet hashmaliciousCobalt Strike, Remcos, DBatLoaderBrowse
                            • 178.237.33.50
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            AS-COLOCROSSINGUSRecaipt202431029.exeGet hashmaliciousXWormBrowse
                            • 172.245.244.69
                            powerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                            • 23.249.167.71
                            file.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, XWormBrowse
                            • 104.168.28.10
                            dbus.elfGet hashmaliciousUnknownBrowse
                            • 107.172.88.151
                            cB1ItKbbhY.msiGet hashmaliciousUnknownBrowse
                            • 23.94.207.151
                            tTdMHr6SlJ.dllGet hashmaliciousUnknownBrowse
                            • 23.94.207.151
                            e5mIhMkcj5.exeGet hashmaliciousUnknownBrowse
                            • 23.94.207.151
                            PVKDyWHOaX.exeGet hashmaliciousUnknownBrowse
                            • 23.94.207.151
                            RcFBMph6zu.exeGet hashmaliciousUnknownBrowse
                            • 23.94.207.151
                            tTdMHr6SlJ.dllGet hashmaliciousUnknownBrowse
                            • 23.94.207.151
                            ATOM86-ASATOM86NL94e.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            94e.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            0442.pdf.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            1734707047fff7a4a195c1e77157873964de3a3a708aa4bdc0aee24f3a94bc5bd05cc323f3964.dat-decoded.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            SHROsQyiAd.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            nikDoCvpJa.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            17346150108fd59162a7f50db4b74cc85f1873b39cc8eaeab355e353b3b8b18e8e21fd369d493.dat-decoded.exeGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            LbtytfWpvx.vbsGet hashmaliciousRemcosBrowse
                            • 178.237.33.50
                            SEPTobn3BR.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                            • 178.237.33.50
                            greatindiancompaniesgivenbestgiftforyourhealthgivengoodreturns.htaGet hashmaliciousCobalt Strike, Remcos, DBatLoaderBrowse
                            • 178.237.33.50
                            No context
                            No context
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.0072454242963857
                            Encrypted:false
                            SSDEEP:192:ler3KPWPZQzI0BU/gjkZrCHt2zuiFjZ24IO8b:wDwWRQzjBU/gjKzuiFjY4IO8b
                            MD5:197618706211A556E319C1A454115D51
                            SHA1:AC760FDD97A4C54047EFFA7DC3038BE0EA393295
                            SHA-256:EEFB44B014E607CCA0D50A63F71301B91289002261BC39BA2F16E2E767CD26D3
                            SHA-512:F0239986F35F65D68775EDD1D75452F2D290DC51CDC1A3C7D4CFDEC1EA06D2DFEDB27E835B138C5A3B5C14D97239EC4EE742E55E3E62F3057F528E643F0BF025
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.7.6.5.5.3.0.2.9.8.8.5.3.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.7.6.5.5.3.0.9.3.9.5.1.0.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.a.2.7.2.4.d.4.-.3.e.5.9.-.4.4.9.5.-.9.5.c.4.-.c.6.3.5.9.9.3.6.9.d.2.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.f.9.7.1.2.a.8.-.5.6.d.9.-.4.8.2.8.-.8.8.2.b.-.7.8.6.5.a.6.b.9.0.a.b.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.g.o.r.f.V.g.T.f...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.C.f.Z.K...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.a.c.-.0.0.0.1.-.0.0.1.3.-.5.e.1.1.-.0.8.d.1.4.1.5.8.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.2.2.8.8.8.f.b.9.7.f.c.8.a.7.f.4.0.7.f.2.5.9.2.7.3.e.d.7.5.1.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.0.a.4.c.1.1.0.8.3.2.9.2.3.d.5.6.d.4.b.8.6.a.1.0.a.d.f.3.5.7.e.1.8.3.9.c.7.b.8.!.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Fri Dec 27 09:32:10 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):131120
                            Entropy (8bit):1.8722939845567677
                            Encrypted:false
                            SSDEEP:384:0kQGuDmQ83BW5OsbUC29Vz9XZIhxlTjXYyG3JIqb89F7hDwLjEqM9qdbIkbnb:k5D/8RW53beVz9JMvXYyG3Q8LfCn8
                            MD5:DC1C402D7CD3D1B2F2FF957D43E73271
                            SHA1:13E19EC48F363DC21315056A4484D212A9CF2EAA
                            SHA-256:1D7649D2BDBAC3B5976B3AE71F2529A7831B1843DE43B4B3B47E4AFE6AD3B055
                            SHA-512:724BD973C1A14CA8D1CA8D4AFB64D79E0A6331BA67498E4A96B4F549026D535F3CE953047C53A0DC2289B3B8BC5EF386A0EDD53D9371B7741A9BA00BB385A43C
                            Malicious:false
                            Preview:MDMP..a..... ........tng............t...........|...|.......$...DR..........T.......8...........T............<...............!...........#..............................................................................eJ......|$......GenuineIntel............T...........tsng....x........................ ..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):6318
                            Entropy (8bit):3.721997820912035
                            Encrypted:false
                            SSDEEP:96:RSIU6o7wVetbfPq6f8/YbQE/EM8+5aM4U489bPvZXsfyw9vZm:R6l7wVeJfPq6f+YbTpr489bZXsffzm
                            MD5:79F3486DD3610CA1D55134A2D2BFB1C8
                            SHA1:16E13781821346F1AAFCC8BFBE68A6C9B2C4CB6F
                            SHA-256:CBF272777CA767334104C08DFAD3A115CBC67FCEEB51DBA967BE853B0D45F4AD
                            SHA-512:573C2BE931A17B16585C377A6618631470CB4ACCC64BEF09C3BE3E65A71EF2D55352A74316F956ED491797E1D4D9C29E27A3498403089DC0D57402EB3B4D223C
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.8.0.4.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4624
                            Entropy (8bit):4.4596889222762375
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs+Jg77aI9qFWpW8VYinYm8M4JGs25FM+q8ODFftVL9d:uIjf0I7I07VOJb3tVL9d
                            MD5:D22E3EE32054CA1AF5B9D11812B43DDB
                            SHA1:7D604AD00DBD1015FA2E96F3847FFB2E36115486
                            SHA-256:A807A5A06B7AAEF57548C7F490E102B034D8F8E8C7530560F035EA34BAF00A30
                            SHA-512:C7DAB90D61D0E9533E0E0CF6CB282B349CC8BE7347C56EC25E836DA87D85CE9B90C2770C7773D04CF057D3BE7B2C13077C957B2832100DDD0CFEEDE80290A614
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="649474" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Users\user\AppData\Roaming\gorfVgTf.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):144
                            Entropy (8bit):3.341257056764204
                            Encrypted:false
                            SSDEEP:3:rhlKlyKWr2hNU5JWRal2Jl+7R0DAlBG45klovDl6v:6lZWH5YcIeeDAlOWAv
                            MD5:5D2D44F59C7B592E04D3AF97F4171957
                            SHA1:41C1161516F290B5F1881B5B280D9A43A3EFCCC7
                            SHA-256:C31B077B4FCAF6E6AEED0CE9D60058A0983A9B43A2CEBF72FAB3E91858BF5014
                            SHA-512:4274B26F77E889E4130FED1FD85446279A986812B7079F65787639366A71A58C0C0F967ADD5B1F8056744305D2496D33ECB3446BBCEB94539FFB6EC8368AA654
                            Malicious:true
                            Yara Hits:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                            Preview:....[.2.0.2.4./.1.2./.2.7. .0.4.:.2.9.:.2.4. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                            Process:C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.34331486778365
                            Encrypted:false
                            SSDEEP:24:ML9E4KiE4Kx1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MxHKiHKx1qHiYHKh3oPtHo6hAHKze0HJ
                            MD5:8B21C0FDF91680677FEFC8890882FD1F
                            SHA1:E15AC7685BFC89F63015C29DE7F6BCE7A1A9F0E7
                            SHA-256:E2F188397C73C8150EE6F09E833E4D1ABA01293CCFDFED61981F5F66660731F9
                            SHA-512:1EFDF56115A8688CA2380F3047A28CA3E03C74369C3A377050066A56B8171AD756F7DD7AA29F5648A84D16812D1B422749259ED47447713E9B3A0834CE361BE7
                            Malicious:true
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                            Process:C:\Users\user\AppData\Roaming\gorfVgTf.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.34331486778365
                            Encrypted:false
                            SSDEEP:24:ML9E4KiE4Kx1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MxHKiHKx1qHiYHKh3oPtHo6hAHKze0HJ
                            MD5:8B21C0FDF91680677FEFC8890882FD1F
                            SHA1:E15AC7685BFC89F63015C29DE7F6BCE7A1A9F0E7
                            SHA-256:E2F188397C73C8150EE6F09E833E4D1ABA01293CCFDFED61981F5F66660731F9
                            SHA-512:1EFDF56115A8688CA2380F3047A28CA3E03C74369C3A377050066A56B8171AD756F7DD7AA29F5648A84D16812D1B422749259ED47447713E9B3A0834CE361BE7
                            Malicious:false
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                            Process:C:\Users\user\AppData\Roaming\gorfVgTf.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):963
                            Entropy (8bit):5.019205124979377
                            Encrypted:false
                            SSDEEP:12:tkluWJmnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlupdVauKyGX85jvXhNlT3/7AcV9Wro
                            MD5:B62617530A8532F9AECAA939B6AB93BB
                            SHA1:E4DE9E9838052597EB2A5B363654C737BA1E6A66
                            SHA-256:508F952EF83C41861ECD44FB821F7BB73535BFF89F54D54C3549127DCA004E70
                            SHA-512:A0B385593B721313130CF14182F3B6EE5FF29D2A36FED99139FA2EE838002DFEEC83285DEDEAE437A53D053FCC631AEAD001D3E804386211BBA2F174134EA70D
                            Malicious:false
                            Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):2232
                            Entropy (8bit):5.380192968514367
                            Encrypted:false
                            SSDEEP:48:+WSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMugei/ZPUyus:+LHyIFKL3IZ2KRH9Ougss
                            MD5:E8C6AA547838112A4333B69A7B0D2631
                            SHA1:7321E759023E02AE38DF1671E0B76E0A59C08523
                            SHA-256:44F958F4042B1E27B74015CCB2F9C5FB23E50CD3E206F65202AB99FEEFB4F5AA
                            SHA-512:05DF12298784708E59D3706591EE090A22EF01F4DD574154D7DCB0C820565AD48F97E4DFC877D47DCF5EF4B4E53D5F52568D4E2EDC31A7E3A10C6A6A35E1B748
                            Malicious:false
                            Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Users\user\AppData\Roaming\gorfVgTf.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1567
                            Entropy (8bit):5.104377320852544
                            Encrypted:false
                            SSDEEP:48:cge7XQBBYrFdOFzOzN33ODOiDdKrsuTYv:He7XQBBYrFdOFzOz6dKrsuq
                            MD5:44BD2E5E200DB5E906D2F703E6E19339
                            SHA1:167CD8D3682633768AF589B9F784FC9A0C39C3F2
                            SHA-256:A71F3F3F704F9BF1C7D54DB4168028CC14E5A3F350AF4B2CE33DAD4F0E8C6F81
                            SHA-512:0C5B21FA32D0623A54D7D33D3606C6D95905F39C8B588BC2783EB2CAFB6D33191E3614BB337FB4701E90A6EC86A7B0505218EB3668C1CB9DBFF08127A1D0E666
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvailable>f
                            Process:C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1567
                            Entropy (8bit):5.104377320852544
                            Encrypted:false
                            SSDEEP:48:cge7XQBBYrFdOFzOzN33ODOiDdKrsuTYv:He7XQBBYrFdOFzOz6dKrsuq
                            MD5:44BD2E5E200DB5E906D2F703E6E19339
                            SHA1:167CD8D3682633768AF589B9F784FC9A0C39C3F2
                            SHA-256:A71F3F3F704F9BF1C7D54DB4168028CC14E5A3F350AF4B2CE33DAD4F0E8C6F81
                            SHA-512:0C5B21FA32D0623A54D7D33D3606C6D95905F39C8B588BC2783EB2CAFB6D33191E3614BB337FB4701E90A6EC86A7B0505218EB3668C1CB9DBFF08127A1D0E666
                            Malicious:true
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvailable>f
                            Process:C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):1055744
                            Entropy (8bit):7.8393579291826025
                            Encrypted:false
                            SSDEEP:24576:X1azvpEnO/9uGgmyB7KMXEHB036bTTOz9Rs:X1kpEg9uBOsEHbsS
                            MD5:01366B2E0CA4523828110DA357D12653
                            SHA1:80A4C110832923D56D4B86A10ADF357E1839C7B8
                            SHA-256:F977974B2DF2BECE2382B3C31B24382B629D18144C1FD56901900B1D1ABA6024
                            SHA-512:B4E21BB81C0134EEC03A37AD171A73C6A501891717656A590AC94E2DEFE255F4FCC13A65B2E69D6652D6BA8F2264F883472BE56C548C2E8CC15C132DE88A567D
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 32%
                            • Antivirus: Virustotal, Detection: 46%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....?ng..............0......"........... ... ....@.. .......................`............@.................................\...O.... ..(....................@....................................................... ............... ..H............text........ ...................... ..`.rsrc...(.... ... ..................@..@.reloc.......@......................@..B........................H.......P....l......]...x.................................................k.r.l..2f..Tf....(n%....k4.m.......0 ..O.rUUt..I...i..n/F..._.q..4...@H..$.?.t..|*7..S%.../.>......7,..Y.....1...Jt........6.QZ.W....Lg.7.7x.(E.}:.....\f.o.-.v.[..6...f.p>.j^.Kup..O(....?..*.h\[.d..x.q.@...L~...TTp.\R#..V..u..>.J\ .B....V .'.{Z..]......I(.........E........../4y/.{}.....i..0".C.x.}.%....'j...qZ.....WW.y..<..qrP..U.+-..](..X..W..!...c.......-8.V...@...............0
                            Process:C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Preview:[ZoneTransfer]....ZoneId=0
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.8393579291826025
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            • Win32 Executable (generic) a (10002005/4) 49.78%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            • DOS Executable Generic (2002/1) 0.01%
                            File name:1evAkYZpwDV0N4v.exe
                            File size:1'055'744 bytes
                            MD5:01366b2e0ca4523828110da357d12653
                            SHA1:80a4c110832923d56d4b86a10adf357e1839c7b8
                            SHA256:f977974b2df2bece2382b3c31b24382b629d18144c1fd56901900b1d1aba6024
                            SHA512:b4e21bb81c0134eec03a37ad171a73c6a501891717656a590ac94e2defe255f4fcc13a65b2e69d6652d6ba8f2264f883472be56c548c2e8cc15c132de88a567d
                            SSDEEP:24576:X1azvpEnO/9uGgmyB7KMXEHB036bTTOz9Rs:X1kpEg9uBOsEHbsS
                            TLSH:4E25028C7505F54FC5469B754C70EEB069381DEA6A03D3139ACB2EDFF86E8968E041E2
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....?ng..............0......"........... ... ....@.. .......................`............@................................
                            Icon Hash:7d324a191b1e0515
                            Entrypoint:0x5016ae
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x676E3FE2 [Fri Dec 27 05:49:22 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x10165c0x4f.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1020000x1f28.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1040000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000xff6b40xff800e08c810f8be33e2c7b8e2d1b2bae94d8False0.9286067835738747data7.844289288442316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0x1020000x1f280x2000147e905476435884465f545891eae6c3False0.847412109375data7.308652637907621IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x1040000xc0x200d3c4fc29433b88e4dbd37f975ac3c94fFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x1020e80x1af5PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9340675264454427
                            RT_GROUP_ICON0x103be00x14data1.05
                            RT_VERSION0x103bf40x334data0.44634146341463415
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2024-12-27T10:29:26.942230+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.1049735192.3.64.1522559TCP
                            2024-12-27T10:29:30.157480+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.1049741178.237.33.5080TCP
                            2024-12-27T10:29:42.551155+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.1049774192.3.64.1522559TCP
                            2024-12-27T10:29:42.691758+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.1049775192.3.64.1522559TCP
                            2024-12-27T10:31:04.691832+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.1049957192.3.64.1522559TCP
                            2024-12-27T10:31:04.692020+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.1049959192.3.64.1522559TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 27, 2024 10:29:25.424386024 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:25.544107914 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:25.544250965 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:25.550545931 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:25.670059919 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:26.811242104 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:26.942229986 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:27.053541899 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:27.058394909 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:27.177936077 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:27.178091049 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:27.297812939 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:27.613197088 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:27.616333008 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:27.736121893 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:27.959697008 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:28.004247904 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:28.746020079 CET4974180192.168.2.10178.237.33.50
                            Dec 27, 2024 10:29:28.865566015 CET8049741178.237.33.50192.168.2.10
                            Dec 27, 2024 10:29:28.865761995 CET4974180192.168.2.10178.237.33.50
                            Dec 27, 2024 10:29:28.874574900 CET4974180192.168.2.10178.237.33.50
                            Dec 27, 2024 10:29:28.994146109 CET8049741178.237.33.50192.168.2.10
                            Dec 27, 2024 10:29:30.157335043 CET8049741178.237.33.50192.168.2.10
                            Dec 27, 2024 10:29:30.157480001 CET4974180192.168.2.10178.237.33.50
                            Dec 27, 2024 10:29:30.170053959 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:30.289676905 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:31.158113003 CET8049741178.237.33.50192.168.2.10
                            Dec 27, 2024 10:29:31.158229113 CET4974180192.168.2.10178.237.33.50
                            Dec 27, 2024 10:29:41.053256035 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:41.054769993 CET497742559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:41.098258018 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:41.174355984 CET255949774192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:41.174444914 CET497742559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:41.178141117 CET497742559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:41.254276037 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:41.258531094 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:41.297811985 CET255949774192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:41.301145077 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:41.421492100 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:41.421581984 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:41.425177097 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:41.567066908 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:42.501080036 CET255949774192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:42.551155090 CET497742559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:42.642642021 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:42.691757917 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:42.754650116 CET255949774192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:42.759721994 CET497742559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:42.876274109 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:42.879245996 CET255949774192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:42.879354000 CET497742559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:42.880960941 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:42.926090956 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:42.998895884 CET255949774192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.000441074 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.000551939 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:43.045794010 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.045806885 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.045886040 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.045896053 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.045943022 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:43.045943022 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:43.045969963 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.045979977 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.046027899 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:43.046197891 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.046221972 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.046235085 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.046238899 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:43.120316029 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.165617943 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.165637970 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.165754080 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.165869951 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.165880919 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.165977001 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.166093111 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.166188002 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.166281939 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:43.770498037 CET497742559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:43.890100002 CET255949774192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.164073944 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.207385063 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:44.211232901 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:44.212677956 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:44.330997944 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.331047058 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.331106901 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.331135035 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.331167936 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.331218004 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.331250906 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.331300020 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.331353903 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.331404924 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.331444979 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.331487894 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.331600904 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.331612110 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.332130909 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.332230091 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.332412958 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.332500935 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.332540989 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.332600117 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:44.790206909 CET497742559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:44.909787893 CET255949774192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.180912971 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.223032951 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:45.237313032 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:45.239063978 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:45.356952906 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.356976032 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.357038975 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.357055902 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.357129097 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.357139111 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.357182026 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.357232094 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.357281923 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.357319117 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.357372999 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.357383013 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.357465982 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.357476950 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.358577967 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.358661890 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.358671904 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.358681917 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.358750105 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.358760118 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.358839989 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.358882904 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.358891964 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:45.809412956 CET497742559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:45.929047108 CET255949774192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.201759100 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.257596016 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:46.524741888 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:46.526350975 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:46.644402027 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.644444942 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.644558907 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.644571066 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.644651890 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.644665003 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.644777060 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.644793987 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.644845963 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.644890070 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.644970894 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.644982100 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.645118952 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.645129919 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.645910025 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.645961046 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.645992041 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.646008968 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.646089077 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.646105051 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.646203995 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.646214008 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.646267891 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:46.817107916 CET497742559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:46.936778069 CET255949774192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.207731962 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.254264116 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:47.273376942 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:47.275907040 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:47.393187046 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.393203974 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.393222094 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.393232107 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.393294096 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.393304110 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.393379927 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.393399000 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.393451929 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.393526077 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.393562078 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.393636942 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.393651962 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.393662930 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.395426035 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.395441055 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.395531893 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.395543098 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.395632029 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.395781040 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.395795107 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.395826101 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.395864010 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:47.832653046 CET497742559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:47.952315092 CET255949774192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.223190069 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.267776966 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:48.269284964 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:48.387584925 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.387612104 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.387722969 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.387732983 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.387797117 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.387806892 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.387890100 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.387907982 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.387988091 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.388022900 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.388079882 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.388118029 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.388205051 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.388226986 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.388850927 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.388907909 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.388950109 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.388966084 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.389045000 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.389060974 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.389142036 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.389158010 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:48.389200926 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:49.215110064 CET497742559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:49.300098896 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:49.300162077 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:49.300309896 CET497752559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:49.310942888 CET255949774192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:49.310996056 CET497742559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:49.334537029 CET255949774192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:49.419733047 CET255949775192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:49.430545092 CET255949774192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:50.185976028 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:29:50.187345982 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:29:50.307252884 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:30:20.291187048 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:30:20.295486927 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:30:20.414938927 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:30:50.444293976 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:30:50.449398041 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:30:50.568907976 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:03.102108002 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:03.103372097 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:03.176234007 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:03.223153114 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:03.223227024 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:03.228787899 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:03.303265095 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:03.306376934 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:03.348272085 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:03.426043987 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:03.426166058 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:03.430100918 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:03.488815069 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:03.549840927 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:04.543009996 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:04.649897099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:04.691832066 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:04.692019939 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:04.794513941 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:04.799909115 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:04.884023905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:04.888473034 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:04.919398069 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:04.919455051 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:04.931334972 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:05.007987976 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.008131981 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:05.039042950 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.050947905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.050962925 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.050975084 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.050992966 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.051110029 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:05.051110029 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.051139116 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:05.051151037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.051161051 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.051161051 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:05.051212072 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:05.051243067 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.051253080 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.127669096 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.170628071 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.170711040 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.170770884 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.170783043 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.170849085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.170917988 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.170943975 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.171039104 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.171047926 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:05.817132950 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:05.936573029 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.210341930 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.257371902 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:06.259569883 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:06.376908064 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.377002954 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.377015114 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.377123117 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.377131939 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.377202988 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.377218008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.377260923 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.377283096 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.377394915 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.377404928 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.377487898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.377497911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.377528906 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.379153967 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.379194975 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.379286051 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.379370928 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.379458904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.379468918 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:06.832751989 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:06.952263117 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.224186897 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.274867058 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:07.276468039 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:07.394526958 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.394552946 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.394618988 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.394746065 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.394756079 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.394766092 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.394809961 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.394833088 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.394946098 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.394956112 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.395087004 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.395097017 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.395165920 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.395181894 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.396058083 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.396097898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.396202087 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.396212101 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.396321058 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.396332026 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.396430969 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.396440983 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.396517992 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:07.848475933 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:07.967973948 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.239480972 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.311625957 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:08.313251019 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:08.431267977 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.431293964 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.431375980 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.431386948 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.431477070 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.431509972 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.431632996 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.431664944 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.431729078 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.431740046 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.431824923 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.431834936 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.431926012 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.431936026 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.432821989 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.432832003 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.432936907 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.433026075 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.433036089 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.433054924 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.433141947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.433151960 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.433180094 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:08.864057064 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:08.983555079 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.253038883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.302181959 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:09.303160906 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:09.421873093 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422000885 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422010899 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422055960 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422209978 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422219992 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422229052 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422264099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422307014 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422359943 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422436953 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422449112 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422522068 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422532082 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422782898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422792912 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422914982 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422924995 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.422991991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.423090935 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.423101902 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.423113108 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.423209906 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:09.879885912 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:09.999427080 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.269788980 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.319027901 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:10.320492029 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:10.438797951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.438816071 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.438891888 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.438903093 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.438921928 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.438977957 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.439069033 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.439079046 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.439141035 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.439191103 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.439246893 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.439258099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.439331055 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.439341068 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.440002918 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.440020084 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.440103054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.440172911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.440182924 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.440193892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.440283060 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.440294027 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.440340042 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:10.895504951 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:11.015026093 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.287898064 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.332901955 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:11.334511995 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:11.453155041 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.453178883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.453198910 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.453210115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.453223944 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.453294992 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.453424931 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.453458071 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.453592062 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.453651905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.453792095 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.453883886 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.453998089 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.454016924 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.455344915 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.455771923 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.455785990 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.455796003 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.455805063 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.455815077 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.455823898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.455827951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.455832958 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.455852985 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:11.911016941 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:12.030438900 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.301085949 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.346806049 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:12.348412037 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:12.466655016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.466670036 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.466675043 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.466681004 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.466753006 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.466803074 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.466962099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.466990948 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.467084885 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.467118025 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.467210054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.467219114 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.467308044 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.467338085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.468050957 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.468075037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.468149900 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.468173027 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.468255997 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.468266010 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.468369007 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.468379021 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.468470097 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:12.926794052 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:13.046230078 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.318322897 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.362467051 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:13.363961935 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:13.482192993 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.482211113 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.482275009 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.482292891 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.482419014 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.482436895 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.482527018 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.482536077 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.482633114 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.482644081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.482683897 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.482731104 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.482795954 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.482805967 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.483495951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.483536959 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.483580112 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.483628035 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.483714104 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.483724117 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.483781099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.483817101 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.483871937 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:13.942303896 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:14.061834097 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.330821037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.377691984 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:14.379163980 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:14.497478008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.497494936 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.497581959 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.497639894 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.497687101 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.497697115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.497741938 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.497793913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.497926950 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.497936964 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.497966051 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.498002052 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.498133898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.498164892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.498684883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.498756886 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.498769045 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.498886108 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.498897076 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.498990059 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.499000072 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.499046087 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.499058008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:14.961544991 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:15.081207991 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.351898909 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.394354105 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:15.396007061 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:15.513967991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.514108896 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.514156103 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.514194965 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.514254093 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.514313936 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.514349937 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.514399052 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.514492035 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.514501095 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.514555931 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.514573097 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.514673948 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.514703989 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.515552044 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.515561104 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.515644073 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.515727997 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.515737057 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.515866995 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.515877008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.515886068 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.515902996 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:15.974520922 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:16.094126940 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.366375923 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.425846100 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:16.427534103 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:16.545561075 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.545593977 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.545727968 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.545768023 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.545875072 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.545886040 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.545963049 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.546025991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.546140909 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.546150923 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.546199083 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.546257973 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.546310902 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.546381950 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.547090054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.547178030 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.547255039 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.547303915 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.547410965 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.547420979 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.547455072 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.547497034 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:16.547568083 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.007384062 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:17.127255917 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.400482893 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.454668999 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:17.472404957 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:17.574491024 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.574609041 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.574763060 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.574780941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.574857950 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.575139999 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.575150013 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.575162888 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.575200081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.575210094 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.575330019 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.575381041 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.575522900 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.575532913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.592068911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.592080116 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.592113972 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.592191935 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.592242002 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.592251062 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.592334032 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.592344046 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:17.592384100 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.020550013 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:18.140110970 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.411887884 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.456280947 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:18.457854986 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:18.575922966 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.575937033 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.576036930 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.576097012 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.576108932 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.576147079 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.576183081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.576222897 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.576292038 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.576302052 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.576353073 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.576390982 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.576483011 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.576499939 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.577471018 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.577490091 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.577536106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.577626944 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.577636957 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.577649117 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.577693939 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.577706099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.577737093 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:18.582684040 CET4974180192.168.2.10178.237.33.50
                            Dec 27, 2024 10:31:18.988735914 CET4974180192.168.2.10178.237.33.50
                            Dec 27, 2024 10:31:19.036333084 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:19.156317949 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.426402092 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.472894907 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:19.474374056 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:19.592665911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.592691898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.592744112 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.592776060 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.592834949 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.592876911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.592911959 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.592952013 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.592998981 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.593063116 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.593106031 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.593139887 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.593256950 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.593278885 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.593807936 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.593943119 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.593955040 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.594038010 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.594048023 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.594156981 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.594166994 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.594223976 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.594244957 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:19.691884995 CET4974180192.168.2.10178.237.33.50
                            Dec 27, 2024 10:31:20.478563070 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:20.499340057 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:20.518825054 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:20.598720074 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:20.638729095 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:20.872267008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:20.925103903 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:20.926683903 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:20.988770008 CET4974180192.168.2.10178.237.33.50
                            Dec 27, 2024 10:31:21.044617891 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.044683933 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.044831038 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.044840097 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.044852018 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.044894934 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.044941902 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.045047998 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.045063972 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.045103073 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.045151949 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.045232058 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.045272112 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.045320988 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.046423912 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.046436071 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.046477079 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.046488047 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.046551943 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.046570063 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.046622992 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.046681881 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.046722889 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.489017963 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:21.608469009 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.881536961 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:21.924542904 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:21.926054955 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:22.044159889 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.044173956 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.044184923 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.044218063 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.044267893 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.044342041 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.044373989 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.044436932 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.044471025 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.044548988 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.044584036 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.044644117 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.044656038 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.044689894 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.045633078 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.045644045 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.045753002 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.045763016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.045804977 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.045814037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.045862913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.045881987 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.045933008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.506298065 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:22.672780991 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.914971113 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:22.974308968 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:22.975933075 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:23.094240904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.094259024 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.094275951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.094383001 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.094393015 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.094430923 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.094459057 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.094490051 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.094540119 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.094549894 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.094629049 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.094638109 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.094707966 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.094768047 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.095778942 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.095788956 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.095861912 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.095871925 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.095951080 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.095959902 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.096034050 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.096142054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.096152067 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.096160889 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.398606062 CET4974180192.168.2.10178.237.33.50
                            Dec 27, 2024 10:31:23.520286083 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:23.639944077 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.909930944 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:23.961668015 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:23.964586973 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:24.081459999 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.081475973 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.081542015 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.081585884 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.081707001 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.081816912 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.081868887 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.081877947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.081902981 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.081967115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.082022905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.082072020 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.082173109 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.082190037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.084342957 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.084400892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.084538937 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.084623098 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.084750891 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.084760904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.084770918 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.084789991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.084829092 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.540498972 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:24.660085917 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.933062077 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:24.975521088 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:24.977601051 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:25.095223904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.095256090 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.095318079 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.095362902 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.095412016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.095422029 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.095568895 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.095578909 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.095592976 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.095606089 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.095678091 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.095689058 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.095696926 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.095778942 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.097121000 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.097187996 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.097237110 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.097249031 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.097311974 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.097356081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.097440958 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.097501993 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.097512007 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.551779985 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:25.671478987 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.943945885 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:25.988729954 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:25.998200893 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:26.000575066 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:26.117902040 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.117958069 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.117970943 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.117981911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.118047953 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.118057013 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.118093014 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.118127108 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.118201971 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.118211031 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.118274927 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.118293047 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.118388891 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.118397951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.120220900 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.120254993 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.120296001 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.120366096 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.120417118 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.120493889 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.120527983 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.120537043 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.120568037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.570275068 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:26.689974070 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:26.963454962 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.003417015 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:27.004894018 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:27.122947931 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.122973919 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.123076916 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.123111010 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.123121023 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.123243093 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.123338938 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.123358011 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.123384953 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.123451948 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.123549938 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.123559952 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.123625994 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.123636007 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.124448061 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.124485970 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.124581099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.124598980 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.124630928 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.124676943 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.124766111 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.124775887 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.124799013 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.582957029 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:27.702517033 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:27.974036932 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.037563086 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:28.039148092 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:28.157370090 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.157386065 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.157394886 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.157414913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.157424927 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.157442093 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.157510042 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.157552958 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.157604933 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.157622099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.157764912 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.157774925 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.157823086 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.157833099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.158852100 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.158907890 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.158973932 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.159020901 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.159116983 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.159205914 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.159216881 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.395008087 CET4974180192.168.2.10178.237.33.50
                            Dec 27, 2024 10:31:28.599668980 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:28.719352961 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:28.992815018 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.037357092 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:29.038992882 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:29.157047987 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.157062054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.157073021 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.157111883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.157197952 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.157238007 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.157330036 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.157390118 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.157525063 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.157545090 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.157651901 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.157661915 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.157804012 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.157814026 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.158530951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.158557892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.158662081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.158773899 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.158854961 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.158898115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:29.614309072 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:29.735084057 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.005044937 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.048645020 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:30.050131083 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:30.168340921 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.168370008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.168380022 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.168409109 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.168533087 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.168543100 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.168575048 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.168584108 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.168675900 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.168684959 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.168821096 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.168831110 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.168839931 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.168873072 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.169714928 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.169724941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.169744968 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.169812918 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.170576096 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.170587063 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:30.629933119 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:30.749593973 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.024142027 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.066627026 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:31.068219900 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:31.186728954 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.186743021 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.187320948 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.187330961 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.187449932 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.187458992 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.187468052 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.187578917 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.187587023 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.187592030 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.187599897 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.187721968 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.187731028 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.187735081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.188807964 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.188817024 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.188965082 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.188973904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.189121008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:31.645296097 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:31.765017986 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.036672115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.082432032 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:32.084196091 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:32.202256918 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.202275038 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.202285051 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.202297926 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.202302933 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.202342033 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.202346087 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.202382088 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.202410936 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.202419996 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.202441931 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.321774960 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.321790934 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.321803093 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.321837902 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.321893930 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.321902990 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.321973085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.322020054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:32.661504984 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:32.781271935 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.050630093 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.179358959 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:33.412718058 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:33.414236069 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:33.532438040 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.532460928 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.532473087 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.532483101 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.532594919 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.532604933 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.532618999 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.532636881 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.532676935 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.532706022 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.651823997 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.651839972 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.651906013 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.651916981 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.651933908 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.652013063 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.652112961 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.652302980 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:33.676731110 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:33.802814007 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.071877003 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.136850119 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:34.138739109 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:34.256824017 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.256839991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.256850958 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.256870985 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.256880045 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.256899118 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.256917000 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.256927013 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.257002115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.257019997 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.257102966 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.257112980 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.257169962 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.257186890 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.258317947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.258335114 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.376243114 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.376276970 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:34.692940950 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:34.813076973 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.081275940 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.144212961 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:35.145956993 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:35.264069080 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.264086008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.264098883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.264108896 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.264120102 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.264131069 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.264220953 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.264230967 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.264317989 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.264327049 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.264388084 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.264403105 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.264456987 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.264476061 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.265531063 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.265602112 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.265611887 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.308171034 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.383980036 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.384047985 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.384078026 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:35.708867073 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:35.828655958 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.098371029 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.191854954 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:36.251303911 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:36.254291058 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:36.371292114 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.371400118 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.371551037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.371581078 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.371685028 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.371735096 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.371886015 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.371912956 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.371944904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.471668005 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.471690893 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.492810011 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.492829084 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.492837906 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.492846966 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.492856979 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.492866039 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.492876053 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.492883921 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.492893934 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:36.723458052 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:36.843194962 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.112492085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.175601006 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:37.177270889 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:37.295928955 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.296060085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.296071053 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.296082020 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.296127081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.296138048 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.296168089 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.296277046 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.296345949 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.296355963 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.416147947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.416168928 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.416208029 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.416223049 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.416232109 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.416244030 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.416400909 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.416416883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.416537046 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.416547060 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:37.751665115 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:37.872113943 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.140981913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.174403906 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:38.175899029 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:38.191884995 CET4974180192.168.2.10178.237.33.50
                            Dec 27, 2024 10:31:38.294217110 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.294231892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.294243097 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.296164989 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.296178102 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.296188116 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.296197891 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.296206951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.296216011 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.296225071 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.413846016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.413860083 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.413868904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.414000988 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.414009094 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.414019108 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.414027929 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.414038897 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.416167974 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.416183949 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:38.723707914 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:38.843947887 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.113559008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.162861109 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:39.168163061 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:39.282749891 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.282799006 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.282835960 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.282864094 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.282891035 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.282922983 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.282958031 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.282989979 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.283071995 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.283099890 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.403204918 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.403249025 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.403304100 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.403357983 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.403386116 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.404108047 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.404252052 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.404613972 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.405221939 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:39.661228895 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:39.781052113 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.050337076 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.096947908 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:40.098685026 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:40.216897011 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.216948032 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.216985941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.217096090 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.217125893 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.217155933 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.217184067 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.217215061 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.217242956 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.217283964 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.336937904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.336981058 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.336993933 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.337003946 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.337035894 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.337213039 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.337250948 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.337426901 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.337591887 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.337932110 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.567576885 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:40.687417030 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:40.956475973 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.030071020 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:41.031564951 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:41.150158882 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.150209904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.150248051 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.150275946 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.150301933 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.150332928 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.150358915 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.150386095 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.150445938 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.150473118 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.269658089 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.269675016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.269687891 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.269718885 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.269730091 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.269808054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.269906998 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.269999027 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.270085096 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.270139933 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.443852901 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:41.563900948 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.832915068 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:41.879395008 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:41.900758982 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:41.902687073 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:42.020694017 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.020714045 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.020735979 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.020745993 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.020781994 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.020793915 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.020803928 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.020940065 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.020950079 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.020957947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.021018028 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.021028042 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.021037102 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.140337944 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.140357018 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.140376091 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.140386105 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.140423059 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.140465975 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.140494108 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.301672935 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:42.421458006 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.693293095 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.738090038 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:42.739679098 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:42.857916117 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.857952118 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.857963085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.857973099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.857983112 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.858156919 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.858166933 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.858176947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.858192921 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.858201981 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.858225107 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.858233929 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.858279943 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.858309031 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.977612019 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.977628946 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.977648973 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:42.977750063 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.129822969 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:43.249670982 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.518914938 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.566111088 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:43.567586899 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:43.685960054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.685981035 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.686002970 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.686043024 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.686105967 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.686115980 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.686145067 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.686175108 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.686268091 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.686279058 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.686386108 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.686394930 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.686419964 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.686429977 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.687131882 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.687144995 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.687244892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.805536985 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.805655956 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:43.929063082 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:44.048784018 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.317179918 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.362510920 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:44.364048958 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:44.482415915 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.482430935 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.482443094 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.482461929 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.482471943 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.482481956 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.482500076 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.482510090 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.482609987 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.482630968 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.482678890 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.482706070 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.482795000 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.482804060 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.483716011 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.483726978 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.483752966 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.483836889 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.601876020 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.601898909 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:44.708031893 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:44.827656984 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.096271038 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.144201994 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:45.145708084 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:45.264226913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.264240980 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.264250040 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.264261007 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.264280081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.264290094 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.264349937 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.264390945 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.264458895 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.264475107 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.264555931 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.264596939 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.264705896 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.264714956 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.265367031 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.265403986 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.265537024 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.265647888 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.308129072 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.383826017 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.459019899 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:45.578663111 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.848239899 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:45.908783913 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:45.911293983 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:46.028740883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.028764009 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.028784037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.028794050 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.028805971 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.028831959 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.028888941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.028970957 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.028991938 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.029002905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.029148102 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.029158115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.029198885 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.029207945 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.030894041 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.030931950 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.031047106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.031151056 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.031203985 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.031213999 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.176805973 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:46.296632051 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.565815926 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.613183975 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:46.614752054 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:46.733077049 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.733093023 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.733133078 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.733143091 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.733151913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.733170033 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.733228922 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.733239889 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.733333111 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.733342886 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.733419895 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.733429909 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.733488083 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.733517885 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.734293938 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.734303951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.734371901 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.734497070 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.734575033 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.734586000 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:46.881355047 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:47.001115084 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.270679951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.342016935 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:47.343600988 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:47.461811066 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.461844921 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.461865902 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.461966038 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.461975098 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.462002993 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.462099075 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.462136030 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.462208986 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.462219954 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.462328911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.462340117 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.462424040 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.462470055 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.463099003 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.463134050 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.463231087 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.463327885 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.463419914 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.463496923 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.551572084 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:47.671283007 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.940114975 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:47.988945007 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:48.003885031 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:48.005484104 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:48.123727083 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.123748064 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.123769045 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.123779058 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.123898029 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.123917103 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.123965025 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.123984098 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.124066114 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.124084949 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.124181986 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.124200106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.124310017 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.124320030 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.125077963 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.125087976 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.125211954 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.125330925 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.125348091 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.207884073 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:48.243323088 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.327613115 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.599096060 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.649064064 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:48.650938034 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:48.768889904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.768918991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.768949986 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.769115925 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.769125938 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.769164085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.769289017 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.769300938 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.769390106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.769418955 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.769512892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.769522905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.769594908 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.769613028 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.770473957 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.770500898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.770598888 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.770642996 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.770749092 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.770890951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:48.833126068 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:48.952917099 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.221997976 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.285161972 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:49.286736965 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:49.405086040 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.405107975 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.405118942 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.405129910 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.405224085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.405258894 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.405345917 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.405354977 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.405411005 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.405467033 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.405566931 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.405575991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.405592918 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.405620098 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.406327963 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.406375885 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.406497955 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.406611919 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.406629086 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.406646013 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.442425013 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:49.562371969 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.834017038 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:49.879401922 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:49.898415089 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:49.900818110 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:50.018179893 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.018196106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.018214941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.018274069 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.018320084 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.018342972 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.018424034 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.018440962 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.018506050 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.018533945 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.018629074 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.018646955 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.018692017 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.018733978 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.020430088 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.020520926 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.020539999 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.020613909 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.020675898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.035986900 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:50.137938976 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.155607939 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.429264069 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.488823891 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:50.501842976 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:50.503896952 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:50.546411991 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.548085928 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:50.614156961 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:50.621628046 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.621649027 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.621668100 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.621706963 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.621773958 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.621784925 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.621825933 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.621838093 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.621920109 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.621929884 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.621964931 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.622009039 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.622068882 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.622080088 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.623457909 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.623553991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.625890017 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.741197109 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.741214991 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:50.741225958 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.078819990 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.162300110 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:51.165599108 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:51.167623043 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:51.282151937 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.285101891 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.285156965 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.285254955 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.285264969 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.285360098 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.285371065 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.285458088 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.285470009 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.285568953 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.285578012 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.285644054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.285661936 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.285737038 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.285764933 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.287138939 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.287240982 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.287250042 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.287281990 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.287349939 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.401757956 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.553266048 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.616183043 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:51.617654085 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:51.692226887 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:51.736145973 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.736196995 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.736263037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.736310959 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.736363888 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.737272024 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.737318039 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.737376928 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.737472057 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.737507105 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:51.855468035 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.124874115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.176280975 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:52.209213972 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:52.221642971 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:52.223913908 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:52.328923941 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.341321945 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.341392994 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.341403961 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.341450930 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.341582060 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.341593027 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.341710091 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.341720104 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.341803074 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.341814041 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.341892958 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.341938019 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.342037916 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.342048883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.343475103 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.343539000 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.343631983 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.343709946 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.384134054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.448385954 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.600744963 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.674083948 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:52.675570011 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:52.710177898 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:52.793956041 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.793982029 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.794084072 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.794127941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.794193983 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.794289112 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.794306040 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.795125008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.795288086 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.795352936 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.795454025 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.795478106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:52.829819918 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.098860979 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.192992926 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:53.370062113 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:53.426858902 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:53.428654909 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:53.489885092 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.546610117 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.546623945 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.546714067 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.546724081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.546823978 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.546833992 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.546922922 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.546931982 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.547013044 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.547029018 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.547100067 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.547122955 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.547230959 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.547270060 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.548115015 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.548204899 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.548301935 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.548378944 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.548508883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.548525095 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.763552904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.798880100 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:53.800273895 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:53.832844019 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:53.918911934 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.918987036 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.919006109 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.919842958 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.919918060 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.920052052 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.920115948 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.920169115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:53.952392101 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.221653938 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.273636103 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:54.275078058 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:54.285959005 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:54.393418074 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.393433094 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.393452883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.393560886 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.393596888 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.393614054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.393687963 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.393707991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.393846989 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.393856049 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.393872023 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.393903017 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.393980980 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.393990993 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.394565105 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.394582033 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.394750118 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.394767046 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.394915104 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.405555964 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.675435066 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.723674059 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:54.736779928 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:54.738343954 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:54.843444109 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.856606007 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.856628895 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.856755018 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.856765032 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.856924057 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.856957912 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.857075930 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.857114077 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.857281923 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.857302904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.857413054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.857429981 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.857522964 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.857590914 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.857897043 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.857995987 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.858114958 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.858304977 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.858382940 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:54.858408928 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.112353086 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.146275043 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:55.158998013 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:55.160511971 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:55.266604900 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.279460907 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.279479980 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.279491901 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.279510975 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.279520988 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.279530048 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.279663086 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.279673100 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.279681921 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.279802084 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.279812098 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.279819965 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.279829025 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.279838085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.280757904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.280767918 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.280895948 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.280905008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.281034946 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.281044006 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.535410881 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.604816914 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:55.607183933 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:55.611546040 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:55.724692106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.724708080 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.724726915 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.724746943 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.724756956 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.724766016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.724873066 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.724903107 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.724987030 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.724996090 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.725116014 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.725125074 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.725167990 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.725178003 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.726646900 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.726736069 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.726773024 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.726875067 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.726918936 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.726959944 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:55.731015921 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.000555992 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.084049940 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:56.086007118 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:56.204183102 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.204199076 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.204221010 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.204238892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.204248905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.204351902 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.204360962 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.204370975 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.204444885 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.204458952 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.204484940 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.204493999 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.204571009 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.204580069 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.205542088 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.205550909 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.205667019 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.205748081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.205838919 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.205847979 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.317226887 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:56.437933922 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.692195892 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:56.706927061 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.754703045 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:56.756845951 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:56.811901093 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.874522924 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.874538898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.874550104 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.874665976 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.874675989 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.874685049 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.874759912 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.874850035 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.874928951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.874938965 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.874989033 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.874999046 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.875041008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.875058889 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.876409054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.876427889 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.876548052 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.876631975 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.920068026 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:56.931921959 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.067280054 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:57.082309008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.146699905 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:57.148246050 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:57.187499046 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.266614914 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.266690016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.266737938 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.266747952 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.266869068 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.266885996 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.267831087 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.267957926 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.268053055 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.268101931 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.268141031 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.426635981 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:57.457232952 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.519110918 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:57.520684958 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:57.546549082 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.639898062 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.639947891 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.639997005 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.640131950 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.640276909 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.640386105 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.640405893 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.641833067 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.641968966 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.642024040 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.642080069 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.642098904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.771658897 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:57.815299034 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.864955902 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:57.866631985 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:57.891212940 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.984797001 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.984818935 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.984885931 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.984945059 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.985008955 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.985085011 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.985270977 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.986174107 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.986259937 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.986350060 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.986426115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:57.986552954 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.114159107 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:58.160054922 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.205180883 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:58.206466913 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:58.233860016 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.325998068 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.326097012 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.326167107 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.326178074 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.326273918 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.326348066 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.326356888 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.326448917 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.326524019 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.326565981 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.442128897 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:58.502674103 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.561793089 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.612936020 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:58.614689112 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:58.732713938 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.732741117 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.732819080 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.732827902 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.733014107 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.733042002 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.733169079 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.733185053 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.733266115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.733314991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.733375072 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.733417988 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.733464003 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.733517885 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.734231949 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.734297037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.734394073 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.734456062 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.734564066 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.734572887 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.754925966 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:58.831036091 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.874654055 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.877826929 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:58.879261971 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:58.997699022 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.997801065 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.997870922 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.998022079 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.998157978 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.998323917 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.998363972 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.998879910 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.998997927 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.999119043 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.999161959 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:58.999200106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.058475018 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:59.143353939 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.178114891 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.191889048 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:59.212102890 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:59.214216948 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:59.331917048 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.331967115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.332001925 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.332087994 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.332179070 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.333796978 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.333830118 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.333919048 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.333995104 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.334002972 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.348557949 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:59.446840048 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.468105078 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.487524986 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:59.489012957 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:59.607239008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.607290030 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.607372999 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.607412100 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.607496023 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.607625961 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.607636929 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.608633041 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.608644962 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.608705997 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.608741999 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.608791113 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.629698992 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:59.736818075 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.749239922 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.799330950 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:59.800756931 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:59.910907984 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:31:59.919059038 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.919178009 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.919217110 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.919291019 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.919389963 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.919476032 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.919555902 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.920310020 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.920425892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.920492887 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.920584917 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:31:59.920663118 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.018321991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.030436039 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.082465887 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:00.093889952 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:00.178560972 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:00.203052044 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.203166962 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.203176975 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.203219891 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.203289032 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.203346968 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.203394890 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.213619947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.213684082 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.213777065 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.213850021 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.213860989 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.298669100 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.299218893 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.354490995 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:00.356450081 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:00.442461967 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:00.474260092 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.474284887 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.474387884 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.474399090 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.474471092 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.474551916 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.474602938 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.476032019 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.476109982 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.476196051 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.476280928 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.476290941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.562150002 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.567205906 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.612103939 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:00.613342047 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:00.692420959 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:00.731892109 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.731986046 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.732101917 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.732180119 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.732233047 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.732342005 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.732357979 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.732924938 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.733033895 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.733122110 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.733170033 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.733221054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.812052011 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.831669092 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.876933098 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:00.878195047 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:00.926966906 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:00.996766090 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.996802092 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.996885061 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.996942997 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.997064114 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.997196913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.997245073 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.997792006 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.997894049 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.997981071 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.998033047 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:00.998054028 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.046619892 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.080972910 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.133266926 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:01.139929056 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:01.161134958 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:01.253398895 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.253448009 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.253463030 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.253473043 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.253542900 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.253655910 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.253667116 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.259783983 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.259874105 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.259921074 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.280807018 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.315675020 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.379405022 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:01.380001068 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:01.401894093 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:01.403676033 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:01.499572039 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.521832943 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.522032976 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.522093058 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.522186041 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.522289991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.522386074 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.522483110 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.523442984 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.523559093 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.523648024 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.523782015 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.523799896 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.549485922 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.607100010 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:01.619755983 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:01.621717930 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:01.726908922 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.739448071 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.739562988 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.739573002 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.739677906 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.739778042 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.739794970 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.741220951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.741337061 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.741507053 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.741517067 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.768328905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.828358889 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:01.831767082 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:01.833309889 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:01.948261023 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.951517105 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.951529026 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.951566935 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.951616049 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.951719046 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.951816082 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.952861071 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.952908039 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.953073978 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.953128099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.953210115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:01.995804071 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.034557104 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:02.036201000 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:02.036529064 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:02.154593945 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.154644012 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.154670954 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.154731989 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.154797077 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.154946089 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.154956102 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.156944036 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.156956911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.156965971 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.156975031 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.156985044 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.200068951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.216692924 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.246670008 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:02.255722046 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:02.257319927 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:02.366424084 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.375523090 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.375588894 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.375742912 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.375813007 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.375864983 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.375965118 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.376010895 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.376934052 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.377033949 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.377118111 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.377248049 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.377259970 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.442399979 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:02.452199936 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.488704920 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:02.495629072 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:02.562160969 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.608607054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.608645916 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.608669043 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.608773947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.608850956 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.608968973 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.608979940 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.615475893 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.615489960 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.615569115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.615706921 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.615797997 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.643964052 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.788825035 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:02.834666014 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:02.874470949 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:02.920320034 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:02.921803951 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:02.994215965 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.040193081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.040283918 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.040465117 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.040587902 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.040684938 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.040788889 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.040833950 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.041383028 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.041495085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.041577101 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.041663885 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.044120073 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:03.045591116 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:03.051879883 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:03.084114075 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.164052010 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.164122105 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.164132118 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.164135933 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.164171934 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.164278030 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.164325953 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.164408922 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.164447069 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.165087938 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.165245056 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.165318966 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.165436983 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.165477991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.171331882 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.223619938 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:03.262727022 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.302824974 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:03.304335117 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:03.343333960 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.395492077 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:03.422466040 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.422579050 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.422595024 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.422776937 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.422822952 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.422878981 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.422960997 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.423945904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.423995018 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.424077988 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.424141884 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.424164057 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.454611063 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.493866920 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:03.495554924 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:03.515189886 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.551789999 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:03.613663912 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.613754034 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.613868952 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.613948107 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.614021063 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.614110947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.614228010 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.614535093 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.615056992 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.615184069 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.615252972 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.615353107 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.656075001 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.663532019 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:03.665314913 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:03.671554089 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.707819939 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:03.783415079 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.783449888 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.783566952 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.783633947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.783739090 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.783870935 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.783879995 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.784898043 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.785020113 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.785077095 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.785202980 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.785245895 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.805792093 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.827476978 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.847271919 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:03.848967075 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:03.909375906 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:03.967109919 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.967140913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.967164993 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.967365026 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.967376947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.967456102 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.967467070 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.968508959 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.968616962 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.968693972 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.968794107 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:03.975361109 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.027899981 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.029697895 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.029932976 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.053042889 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.148096085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.148130894 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.148160934 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.148191929 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.148258924 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.149600029 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.149616003 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.149697065 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.149787903 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.159369946 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.173086882 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.226814985 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.232505083 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.233525991 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.340313911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.346548080 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.346612930 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.346708059 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.346793890 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.346823931 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.346899986 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.352133036 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.352217913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.352227926 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.352303982 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.352377892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.352948904 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.379936934 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.384661913 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.386363029 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.499691010 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.504282951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.504344940 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.504456043 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.504565954 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.504687071 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.504739046 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.504748106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.505867958 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.505942106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.506141901 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.506227016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.521622896 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.538712978 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.586849928 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.588413000 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.641279936 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.645627022 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.697180986 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.707285881 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.707357883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.707369089 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.707511902 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.707523108 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.707659006 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.707669020 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.708657026 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.708781004 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.708947897 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.708957911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.738172054 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.739759922 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.752084970 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.765379906 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.772547960 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.858031034 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.858092070 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.858110905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.858181000 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.858242989 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.858304977 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.859349966 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.859411001 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.859424114 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.859522104 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.859534025 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.892385006 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.899171114 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.910015106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:04.910212994 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.916179895 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.988593102 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:04.990350008 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.033791065 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.035324097 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.035820007 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.036166906 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.050232887 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.108701944 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.108731031 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.109647036 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.109942913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.109956980 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.109966993 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.109977007 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.109986067 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.109996080 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.110069990 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.110120058 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.110236883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.110250950 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.111274004 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.153703928 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.153801918 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.153832912 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.153906107 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.154066086 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.154170990 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.154222012 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.154972076 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.155109882 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.155162096 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.155250072 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.155282021 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.155666113 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.155771017 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.229914904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.229991913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.230003119 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.230293989 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.230465889 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.230618000 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.230681896 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.231127024 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.231241941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.231364012 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.231424093 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.231460094 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.275501966 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.284126997 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.306507111 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.306643009 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.423759937 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.427537918 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.496478081 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.543579102 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.625507116 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.678792000 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.801153898 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.803100109 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.817370892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.863717079 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.866249084 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.867906094 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.920918941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.920952082 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.920969963 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.921010017 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.921123981 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.921145916 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.921235085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.921283007 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.921363115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.921386957 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.921485901 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.921510935 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.921581984 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.921623945 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.922636032 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.922662973 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.922791004 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.922888041 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.922955990 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.923003912 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.937314987 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.938754082 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.983341932 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.983387947 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:05.985784054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.985909939 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.985976934 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.986138105 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.986154079 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.986260891 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.986299038 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.987423897 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.987546921 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.987649918 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.987719059 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:05.987729073 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.004810095 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.006433010 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.049518108 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.051096916 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.057077885 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.057141066 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.057235003 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.057302952 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.057995081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.058290958 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.058406115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.058432102 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.058535099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.058543921 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.103117943 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.104315996 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.125915051 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.126009941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.126094103 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.126177073 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.126244068 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.126368046 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.126399040 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.127399921 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.127521038 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.127618074 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.127703905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.127788067 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.169542074 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.169624090 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.170603037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.170762062 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.170829058 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.170876980 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.170921087 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.223949909 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.224029064 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.251785040 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.285032034 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.286604881 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.343631983 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.343717098 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.374433994 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.406596899 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.406613111 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.406620979 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.406769037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.406827927 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.406837940 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.406847000 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.407886982 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.408015013 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.408025026 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.408163071 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.408171892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.427043915 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.428740025 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.463512897 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.463562965 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.546957016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.546991110 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.547039032 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.547152996 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.547233105 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.547352076 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.547475100 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.548407078 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.548506021 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.548638105 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.548733950 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.548789024 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.564593077 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.583298922 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.584259987 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.612078905 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.613425970 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.613487959 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.676361084 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.681356907 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.682804108 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.704027891 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.704266071 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.732057095 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.732115030 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.732127905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.732184887 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.732240915 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.732260942 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.733073950 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.733125925 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.733222008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.733258009 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.738992929 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.785692930 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.800806999 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.801178932 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.801285028 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.801295042 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.801855087 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.801863909 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.802443981 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.802546978 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.802556992 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.802577972 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.804193974 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.804203987 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.823982954 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.824131012 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.920640945 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.920748949 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.920835018 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.920912027 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.921013117 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.921051979 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.922142982 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.922331095 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.922342062 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.922389984 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.922442913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.924103975 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.943824053 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:06.944047928 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.972714901 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.974445105 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:06.993355036 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.037117958 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.039058924 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.063796997 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.063868046 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.093296051 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.093641996 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.093652964 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.094192982 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.094260931 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.094911098 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.094919920 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.095357895 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.095451117 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.095460892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.113102913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.157236099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.157248974 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.158530951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.158540964 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.158550024 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.158721924 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.158730984 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.160177946 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.160187960 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.168085098 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.169900894 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.184699059 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.184757948 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.213587999 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.215655088 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.228189945 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.279093027 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.280925989 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.287666082 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.287781000 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.287822962 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.287965059 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.288158894 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.288172960 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.288182020 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.288192987 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.289604902 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.289655924 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.289696932 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.304467916 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.304518938 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.333424091 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.333472967 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.333483934 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.333745003 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.333754063 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.335149050 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.335243940 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.335256100 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.335454941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.335495949 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.352344036 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.352420092 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.354358912 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.355814934 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.391801119 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.393198013 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.398984909 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.399208069 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.399218082 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.399318933 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.400605917 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.400664091 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.400674105 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.400738001 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.400801897 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.424278021 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.424393892 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.454930067 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.456356049 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.474268913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.474284887 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.474371910 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.474381924 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.474390984 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.475285053 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.475294113 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.475657940 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.475667000 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.475675106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.476169109 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.480182886 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.511897087 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.511914015 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.511940956 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.512002945 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.512849092 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.512859106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.512938023 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.513051033 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.532900095 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.534130096 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.544054031 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.544136047 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.556029081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.574922085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.574942112 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.575042009 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.575052023 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.575062037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.575943947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.575953007 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.576040030 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.576174021 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.576183081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.584177017 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.591367006 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.591422081 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.652890921 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.652908087 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.652919054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.653017998 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.653165102 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.653199911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.653336048 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.653768063 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.653856039 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.653866053 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.653945923 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.655791044 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.658133984 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.663657904 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.663759947 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.700145960 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.703975916 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.721335888 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.722716093 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.767872095 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.769207954 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.775553942 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.775722027 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.775845051 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.775964975 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.775975943 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.777779102 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.777797937 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.777839899 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.777890921 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.777906895 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.783251047 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.784213066 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.824284077 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.841182947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.841204882 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.841301918 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.841377974 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.841387033 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.842233896 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.842315912 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.842355013 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.842549086 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.842557907 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.861565113 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.862840891 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.887759924 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.887821913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.887896061 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.888143063 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.888168097 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.888178110 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.888758898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.888830900 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.888926983 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.888998032 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.889008045 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.903821945 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.904370070 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:07.967875957 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.981355906 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.981396914 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.981461048 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.981491089 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.981523991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.981571913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.981626987 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.981758118 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.981791019 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.981817961 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.981873035 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.981918097 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.981950998 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.982448101 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.982475996 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.982590914 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.982619047 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.982650995 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.982698917 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.982748032 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.982794046 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:07.982825041 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.017237902 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.018569946 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.024837017 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.028248072 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.033421993 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.066832066 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.074038982 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.126708031 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.128043890 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.137406111 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.137447119 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.137516975 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.137545109 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.137572050 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.137604952 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.137633085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.137676001 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.137725115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.137752056 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.137778997 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.137804985 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.137836933 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.137936115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.138125896 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.138254881 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.138283014 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.138400078 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.138427973 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.138459921 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.138509035 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.138612032 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.138639927 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.148041010 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.148210049 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.173420906 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.186718941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.186733961 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.186796904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.187024117 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.187156916 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.187274933 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.187284946 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.193818092 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.193830967 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.193861961 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.193898916 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.236093044 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.246469021 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.246540070 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.246550083 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.246567965 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.246685028 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.246711016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.246824026 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.246854067 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.246931076 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.246939898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.247006893 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.247050047 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.247149944 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.247184992 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.247875929 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.247884989 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.248009920 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.248018980 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.248114109 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.248138905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.248187065 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.248238087 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.248322010 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.267961979 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.268100023 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.268181086 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.365634918 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.488771915 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.500137091 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.665209055 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.676708937 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.677053928 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.678747892 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.692414045 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.747251987 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.748981953 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.784976006 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.785023928 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.787281990 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.789184093 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.797058105 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.797158003 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.797185898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.797219992 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.797230959 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.797342062 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.797353983 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.798275948 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.798410892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.798489094 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.798567057 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.835088968 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.836771965 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.840142012 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.867010117 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.867026091 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.867074966 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.867172003 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.867222071 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.867249012 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.867351055 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.867360115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.867424965 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.867474079 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.867547035 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.867598057 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.867640972 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.867692947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.868511915 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.868530035 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.868649006 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.868673086 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.868760109 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.868779898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.868874073 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.868882895 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.868946075 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.880701065 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.882199049 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.904639006 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.904761076 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.906913996 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.907016039 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.907141924 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.907208920 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.907399893 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.907495022 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.907543898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.907669067 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.907730103 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.907752991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.907998085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.908041954 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.908163071 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.908272028 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.908757925 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.908858061 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.908958912 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.909012079 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.909132957 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.909188032 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.909341097 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.909406900 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.909537077 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.923887968 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.925334930 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.954880953 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.954919100 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.954933882 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.955010891 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.955019951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.955099106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.955163956 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.955176115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.955207109 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.955282927 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.955306053 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.955384970 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.955440998 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.955451012 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.956341028 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.956350088 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.956537008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.956546068 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.956581116 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.956607103 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.956691027 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.956717968 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.956757069 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:08.973746061 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:08.975193024 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.000499010 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.000521898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.000621080 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.000647068 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.000719070 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.000746012 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.000864029 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.000977039 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.000986099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.000994921 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.001096964 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.001106024 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.001230001 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.001291990 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.001758099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.001835108 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.001883984 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.001933098 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.001970053 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.002002954 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.002079964 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.002104998 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.002194881 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.018001080 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.019540071 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.024277925 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.024367094 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.043876886 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.043993950 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.044167042 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.044198036 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.044260979 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.044368982 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.044384003 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.044415951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.044502020 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.044511080 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.044580936 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.044595957 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.044687033 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.044754028 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.045150042 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.045363903 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.045372963 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.045464039 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.045486927 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.045598030 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.045605898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.045730114 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.045908928 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.054831028 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.093753099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.093769073 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.093827963 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.093872070 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.093957901 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.094043016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.094084024 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.094774008 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.094866037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.094974041 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.095040083 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.115705967 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.117227077 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.136176109 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.137716055 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.137733936 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.137855053 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.137866974 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.138055086 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.138066053 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.138145924 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.138156891 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.138206005 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.138258934 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.138372898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.138463020 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.138557911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.138622999 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.139206886 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.139264107 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.139395952 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.139406919 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.139434099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.139498949 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.139542103 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.139569044 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.139664888 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.143826962 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.144218922 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.176512003 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.177985907 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.192764997 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.235488892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.235507011 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.235512972 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.235529900 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.235605955 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.235639095 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.235704899 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.235728979 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.235793114 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.235872030 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.235882998 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.236027956 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.236037016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.236103058 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.236793995 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.236833096 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.236943007 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.236951113 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.237034082 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.237042904 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.237096071 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.237104893 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.237437010 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.251602888 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.253026962 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.263757944 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.263864994 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.287830114 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.298901081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.298912048 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.298930883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.298940897 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.298954964 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.298963070 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.298973083 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.298981905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.298993111 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.299001932 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.299010992 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.299020052 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.299029112 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.299037933 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.299056053 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.299065113 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.299165010 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.299174070 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.299182892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.299194098 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.299202919 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.299211979 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.299458981 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.300421953 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.301996946 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.346143961 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.347609997 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.373009920 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373025894 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373097897 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373107910 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373116016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373126030 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373226881 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373235941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373245955 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373255014 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373399019 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373408079 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373543024 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373552084 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373773098 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373781919 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373799086 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373809099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373816967 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373826027 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373830080 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373832941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.373836040 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.385004044 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.385061026 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.415537119 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.417817116 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.421637058 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.421773911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.421785116 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.421902895 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.421911955 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.421920061 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.422054052 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.422063112 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.422071934 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.422080994 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.422194004 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.422353029 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.422360897 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.422509909 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.423115015 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.423124075 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.423283100 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.423291922 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.423434973 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.423444986 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.423583984 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.423594952 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.423738003 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.429725885 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.465971947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.466012955 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.466078997 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.466133118 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.466216087 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.466273069 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.466317892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.467186928 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.467231035 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.467396975 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.467468023 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.480961084 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.482810974 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.504673004 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.504733086 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.507989883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.535304070 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.535330057 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.535348892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.535358906 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.535433054 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.535466909 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.535506964 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.535562992 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.535624027 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.535648108 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.535775900 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.535804033 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.535895109 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.535921097 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.537322998 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.537348986 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.537385941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.537462950 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.537528038 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.537554979 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.537652016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.537662029 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.537756920 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.543893099 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.545902014 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.600788116 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.600804090 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.600817919 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.600899935 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.600960016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.600987911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.601064920 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.601074934 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.601176977 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.601187944 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.601246119 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.601286888 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.601345062 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.601383924 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.602518082 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.602528095 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.602552891 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.602602005 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.602648020 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.602674007 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.602741003 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.602770090 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.602807999 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.606479883 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.608396053 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.624281883 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.624350071 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.628269911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.642637968 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.644136906 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.663629055 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.663691998 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.663727999 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.663846016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.663921118 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.664020061 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.664031029 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.665416002 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.665460110 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.665589094 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.665636063 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.689212084 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.690654993 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.708158016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.726329088 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.726365089 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.726418972 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.726445913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.726507902 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.726556063 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.726588011 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.726684093 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.726807117 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.726855993 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.726978064 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.727070093 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.727102041 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.727149963 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.728003979 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.728055000 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.728090048 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.728118896 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.728194952 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.728226900 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.728357077 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.728384018 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.728967905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.743949890 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.744025946 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.759733915 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.761451960 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.762356043 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.762449980 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.762480021 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.762509108 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.762558937 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.762588978 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.762614965 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.762641907 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.762690067 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.762707949 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.762721062 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.762741089 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.762762070 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.762773991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.763668060 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.763688087 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.763727903 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.763756037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.763813019 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.763860941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.763928890 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.763942957 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.764025927 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.799829960 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.801553965 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.808938980 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.808973074 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.809050083 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.809067011 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.809129000 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.809146881 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.809207916 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.809225082 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.809313059 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.809322119 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.809401035 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.809410095 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.809457064 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.809472084 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.810194016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.810203075 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.810281038 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.810288906 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.810337067 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.810379028 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.810461998 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.810471058 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.810511112 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.820103884 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.861005068 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.862504959 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.863687038 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.863799095 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.879636049 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.879700899 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.879740000 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.879808903 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.879904032 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.879959106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.880001068 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.881032944 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.881074905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.881273985 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.881423950 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.907738924 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.909183979 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.919631004 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.919735909 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.919769049 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.919821978 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.919861078 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.919970036 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.920008898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.921190977 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.921222925 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.921339035 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.921457052 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.921514988 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.954611063 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.956034899 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:09.980654955 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.980684042 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.980746984 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.980811119 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.980977058 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.981060982 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.981101990 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.982068062 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.982145071 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.982237101 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.982304096 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.983299017 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:09.983362913 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.002573013 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.003969908 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.012063026 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.028526068 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.028539896 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.028625011 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.028704882 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.029122114 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.029213905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.029223919 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.030204058 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.030293941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.030447006 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.030558109 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.068810940 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.070209980 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.072107077 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.074889898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.074923038 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.074980974 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.075009108 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.075042009 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.075506926 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.075536013 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.075586081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.075613976 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.076442957 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.076472044 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.076499939 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.076529026 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.076580048 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.076608896 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.076636076 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.076663971 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.076713085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.076740026 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.076941013 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.076992989 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.077042103 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.077069998 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.102967978 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.106281996 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.122621059 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.122665882 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.122711897 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.122757912 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.122908115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.122929096 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.123115063 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.123187065 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.123291016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.123352051 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.123393059 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.123447895 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.123536110 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.123586893 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.123629093 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.123657942 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.123763084 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.123774052 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.123836040 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.123850107 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.123960018 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.123997927 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.128237009 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.129899025 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.174037933 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.175447941 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.188720942 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.188749075 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.188786030 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.188815117 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.188931942 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.188987970 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.189088106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.189097881 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.189145088 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.189155102 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.189234972 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.189244986 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.189363003 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.189373016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.189835072 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.189862013 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.189973116 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.190001011 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.190102100 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.190110922 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.190229893 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.190238953 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.190309048 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.204090118 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.225950956 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.228257895 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.236726046 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.238185883 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.249095917 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.249167919 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.249386072 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.249526978 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.249727964 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.249830961 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.249953032 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.249963999 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.250355005 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.250406981 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.251218081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.283835888 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.285187960 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.292042971 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.293972015 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.294171095 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.294229984 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.294372082 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.294491053 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.294616938 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.294693947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.295038939 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.295216084 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.295309067 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.295458078 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.295495033 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.330168009 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.331717968 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.349030018 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.352242947 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.356421947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.356461048 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.356564999 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.356667995 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.356787920 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.356848001 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.356869936 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.357848883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.357934952 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.358030081 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.358113050 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.358148098 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.377294064 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.378931046 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.395993948 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.396075010 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.403671026 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.403743029 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.403906107 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.404010057 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.404149055 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.404203892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.404747963 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.404910088 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.405164957 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.405184031 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.426873922 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.428654909 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.448730946 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.450592041 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.450745106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.450763941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.450774908 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.451034069 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.451037884 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.451042891 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.451927900 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.451937914 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.452178001 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.452187061 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.452191114 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.472491026 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.472594976 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.488071918 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.489633083 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.497087955 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.497165918 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.497267962 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.497433901 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.497456074 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.498608112 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.498620033 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.498761892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.498867989 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.498927116 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.533570051 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.535033941 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.546690941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.546863079 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.546906948 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.548289061 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.548300028 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.548379898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.548713923 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.548770905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.587982893 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.592113018 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.592231989 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.596107006 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.597595930 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.607887983 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.607955933 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.608046055 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.608133078 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.608198881 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.608279943 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.609157085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.609213114 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.609318972 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.609407902 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.609473944 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.653486013 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.653676987 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.653796911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.653877020 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.653997898 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.654146910 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.654159069 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.654757977 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.654880047 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.654957056 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.655073881 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.658267021 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.659687042 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.696094990 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.711942911 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.712234974 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.716124058 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.716135979 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.716145039 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.716320992 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.717200041 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.717236996 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.717246056 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.717329979 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.717411995 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.717421055 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.718846083 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.718856096 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.730703115 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.732120991 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.777987957 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.778064013 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.778073072 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.778229952 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.778302908 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.778398991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.779210091 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.779264927 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.779376984 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.779484034 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.779491901 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.779596090 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.799082994 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.800506115 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.830266953 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.831877947 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.831971884 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.850507021 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.850555897 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.850565910 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.850747108 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.850800037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.850954056 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.851672888 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.851730108 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.851783037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.851943016 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.851952076 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.877479076 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.878854990 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.918917894 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.918991089 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.919075012 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.919130087 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.919140100 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.920018911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.920068026 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.920114994 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.920229912 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.920239925 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.928020954 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.940824032 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.942399979 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.951818943 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.951929092 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:10.997248888 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.997282982 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.997500896 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.997509956 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.997638941 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.997742891 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.997751951 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.998473883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.998626947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.998657942 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:10.998667002 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.035298109 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.038172007 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.040047884 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.060617924 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.060693979 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.060796022 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.061067104 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.061075926 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.061187029 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.061196089 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.062024117 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.062033892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.062211037 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.062220097 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.062305927 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.071563959 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.071618080 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.117396116 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.119283915 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.120251894 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.120306969 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.155374050 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.155389071 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.155397892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.155513048 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.155601978 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.155611992 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.155622005 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.157943964 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.157953978 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.158086061 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.158094883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.167000055 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.168591976 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.191279888 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.191334963 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.237327099 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.237341881 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.237359047 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.237396002 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.237409115 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.237504959 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.237584114 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.238846064 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.238939047 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.239020109 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.239113092 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.239121914 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.261044025 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.262562990 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.286820889 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.286890984 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.286981106 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.287061930 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.287072897 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.288362980 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.288372993 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.288501978 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.288511038 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.288918018 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.311332941 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.311424971 CET499572559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.311903954 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.361254930 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.362644911 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.380928993 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.381040096 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.381050110 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.381445885 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.382217884 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.382262945 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.382272005 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.382498980 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.409832954 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.414872885 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.424238920 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.432226896 CET255949957192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.481076956 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.481113911 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.481125116 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.481168985 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.481286049 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.481348991 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.481358051 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.482317924 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.482328892 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.482361078 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.482443094 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.482577085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.504008055 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.529639959 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.529671907 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.529745102 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.529869080 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.529879093 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.534481049 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.534578085 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.534718990 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.534729004 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.576220036 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.676278114 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.695967913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.790225983 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:11.888000965 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:11.988842010 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:20.585933924 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:20.629430056 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:35.421056986 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:35.422496080 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:35.431934118 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:35.540843964 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.540870905 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.540883064 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.540891886 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.541007042 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.541014910 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.541037083 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.541996956 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.559721947 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.559735060 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.561184883 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.561276913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.561317921 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.590946913 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.590965033 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.591012955 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.591124058 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.660392046 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.660444975 CET255949735192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.660573959 CET255949959192.3.64.152192.168.2.10
                            Dec 27, 2024 10:32:35.664448023 CET497352559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:35.665812016 CET499592559192.168.2.10192.3.64.152
                            Dec 27, 2024 10:32:35.665904045 CET499572559192.168.2.10192.3.64.152
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 27, 2024 10:29:28.594044924 CET6033553192.168.2.101.1.1.1
                            Dec 27, 2024 10:29:28.738166094 CET53603351.1.1.1192.168.2.10
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Dec 27, 2024 10:29:28.594044924 CET192.168.2.101.1.1.10x7d3cStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Dec 27, 2024 10:29:28.738166094 CET1.1.1.1192.168.2.100x7d3cNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                            • geoplugin.net
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.1049741178.237.33.50805804C:\Users\user\AppData\Roaming\gorfVgTf.exe
                            TimestampBytes transferredDirectionData
                            Dec 27, 2024 10:29:28.874574900 CET71OUTGET /json.gp HTTP/1.1
                            Host: geoplugin.net
                            Cache-Control: no-cache
                            Dec 27, 2024 10:29:30.157335043 CET1171INHTTP/1.1 200 OK
                            date: Fri, 27 Dec 2024 09:29:29 GMT
                            server: Apache
                            content-length: 963
                            content-type: application/json; charset=utf-8
                            cache-control: public, max-age=300
                            access-control-allow-origin: *
                            Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                            Data Ascii: { "geoplugin_request":"8.46.123.189", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:1
                            Start time:04:29:15
                            Start date:27/12/2024
                            Path:C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe"
                            Imagebase:0x240000
                            File size:1'055'744 bytes
                            MD5 hash:01366B2E0CA4523828110DA357D12653
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000001.00000002.1415947948.0000000003E37000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000001.00000002.1415947948.00000000035D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.1415947948.00000000035D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000002.1415947948.00000000035D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000001.00000002.1415947948.00000000035D1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Reputation:low
                            Has exited:true

                            Target ID:3
                            Start time:04:29:17
                            Start date:27/12/2024
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe"
                            Imagebase:0xdb0000
                            File size:433'152 bytes
                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:04:29:17
                            Start date:27/12/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff620390000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:5
                            Start time:04:29:17
                            Start date:27/12/2024
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gorfVgTf.exe"
                            Imagebase:0xdb0000
                            File size:433'152 bytes
                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:6
                            Start time:04:29:18
                            Start date:27/12/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff620390000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:7
                            Start time:04:29:18
                            Start date:27/12/2024
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmpEDAD.tmp"
                            Imagebase:0xef0000
                            File size:187'904 bytes
                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:8
                            Start time:04:29:18
                            Start date:27/12/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff620390000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:9
                            Start time:04:29:18
                            Start date:27/12/2024
                            Path:C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe"
                            Imagebase:0xfb0000
                            File size:1'055'744 bytes
                            MD5 hash:01366B2E0CA4523828110DA357D12653
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            Reputation:low
                            Has exited:true

                            Target ID:10
                            Start time:04:29:19
                            Start date:27/12/2024
                            Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                            Wow64 process (32bit):true
                            Commandline:"c:\program files (x86)\internet explorer\iexplore.exe"
                            Imagebase:0xbe0000
                            File size:828'368 bytes
                            MD5 hash:6F0F06D6AB125A99E43335427066A4A1
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:false

                            Target ID:11
                            Start time:04:29:20
                            Start date:27/12/2024
                            Path:C:\Users\user\AppData\Roaming\gorfVgTf.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\gorfVgTf.exe
                            Imagebase:0x310000
                            File size:1'055'744 bytes
                            MD5 hash:01366B2E0CA4523828110DA357D12653
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000B.00000002.1469343600.00000000040F5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.1469343600.00000000040F5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000B.00000002.1469343600.00000000040F5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000B.00000002.1469343600.00000000040F5000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Antivirus matches:
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 32%, ReversingLabs
                            • Detection: 46%, Virustotal, Browse
                            Reputation:low
                            Has exited:true

                            Target ID:12
                            Start time:04:29:21
                            Start date:27/12/2024
                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                            Imagebase:0x7ff6616b0000
                            File size:496'640 bytes
                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                            Has elevated privileges:true
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:13
                            Start time:04:29:23
                            Start date:27/12/2024
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gorfVgTf" /XML "C:\Users\user\AppData\Local\Temp\tmp403.tmp"
                            Imagebase:0xef0000
                            File size:187'904 bytes
                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:14
                            Start time:04:29:23
                            Start date:27/12/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff620390000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:15
                            Start time:04:29:24
                            Start date:27/12/2024
                            Path:C:\Users\user\AppData\Roaming\gorfVgTf.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\AppData\Roaming\gorfVgTf.exe"
                            Imagebase:0xe20000
                            File size:1'055'744 bytes
                            MD5 hash:01366B2E0CA4523828110DA357D12653
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000002.3343140213.0000000001497000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000002.3343917986.0000000002F8F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000002.3343376314.00000000014D4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000002.3343140213.00000000014AA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            Has exited:true

                            Target ID:23
                            Start time:04:32:10
                            Start date:27/12/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5804 -s 1196
                            Imagebase:0x4e0000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:11.4%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:4.1%
                              Total number of Nodes:221
                              Total number of Limit Nodes:17
                              execution_graph 45861 70081e0 DuplicateHandle 45862 70082bd 45861->45862 45648 96cb7c8 45649 96cb953 45648->45649 45651 96cb7ee 45648->45651 45651->45649 45652 96c3f18 45651->45652 45653 96cbaa0 PostMessageW 45652->45653 45654 96cbb4d 45653->45654 45654->45651 45680 96c7d2b 45685 96ca55e 45680->45685 45690 96ca4ea 45680->45690 45694 96ca4f8 45680->45694 45681 96c7d3a 45686 96ca4ec 45685->45686 45688 96ca561 45685->45688 45698 96ca81f 45686->45698 45687 96ca51a 45687->45681 45688->45681 45691 96ca512 45690->45691 45693 96ca81f 12 API calls 45691->45693 45692 96ca51a 45692->45681 45693->45692 45695 96ca512 45694->45695 45697 96ca81f 12 API calls 45695->45697 45696 96ca51a 45696->45681 45697->45696 45699 96ca835 45698->45699 45700 96ca847 45699->45700 45715 96caa0d 45699->45715 45720 96cab13 45699->45720 45725 96cad31 45699->45725 45729 96cb097 45699->45729 45733 96cb3bb 45699->45733 45737 96cacd8 45699->45737 45742 96cab9f 45699->45742 45747 96cac9e 45699->45747 45751 96cb03d 45699->45751 45756 96cb305 45699->45756 45761 96caf0a 45699->45761 45766 96cafea 45699->45766 45771 96ca969 45699->45771 45776 96cb00f 45699->45776 45700->45687 45716 96caa1a 45715->45716 45717 96caa48 45716->45717 45781 96c778c 45716->45781 45785 96c7798 45716->45785 45721 96cab36 45720->45721 45789 96c7408 45721->45789 45793 96c7410 45721->45793 45722 96cb349 45797 96c71c2 45725->45797 45801 96c71c8 45725->45801 45726 96cad54 45726->45700 45805 96c7568 45729->45805 45809 96c7560 45729->45809 45730 96cb0b9 45734 96cb3e3 45733->45734 45735 96c7408 WriteProcessMemory 45733->45735 45736 96c7410 WriteProcessMemory 45733->45736 45735->45734 45736->45734 45738 96cabc4 45737->45738 45739 96caaa1 45738->45739 45813 96c6c98 45738->45813 45817 96c6ca0 45738->45817 45739->45700 45743 96cabac 45742->45743 45745 96c6c98 ResumeThread 45743->45745 45746 96c6ca0 ResumeThread 45743->45746 45744 96caaa1 45744->45700 45745->45744 45746->45744 45749 96c71c8 Wow64SetThreadContext 45747->45749 45750 96c71c2 Wow64SetThreadContext 45747->45750 45748 96cacb8 45749->45748 45750->45748 45752 96cb043 45751->45752 45753 96caaa1 45752->45753 45754 96c7408 WriteProcessMemory 45752->45754 45755 96c7410 WriteProcessMemory 45752->45755 45753->45700 45754->45752 45755->45752 45757 96cb30b 45756->45757 45759 96c7408 WriteProcessMemory 45757->45759 45760 96c7410 WriteProcessMemory 45757->45760 45758 96cb349 45759->45758 45760->45758 45762 96caf16 45761->45762 45764 96c7408 WriteProcessMemory 45762->45764 45765 96c7410 WriteProcessMemory 45762->45765 45763 96cb3e3 45764->45763 45765->45763 45767 96cb054 45766->45767 45768 96caaa1 45767->45768 45769 96c7408 WriteProcessMemory 45767->45769 45770 96c7410 WriteProcessMemory 45767->45770 45768->45700 45769->45767 45770->45767 45772 96ca973 45771->45772 45774 96c778c CreateProcessA 45772->45774 45775 96c7798 CreateProcessA 45772->45775 45773 96caa48 45774->45773 45775->45773 45777 96cb015 45776->45777 45821 96c72e8 45777->45821 45825 96c72f0 45777->45825 45778 96cb420 45782 96c781f CreateProcessA 45781->45782 45784 96c7a74 45782->45784 45786 96c781f CreateProcessA 45785->45786 45788 96c7a74 45786->45788 45790 96c7410 WriteProcessMemory 45789->45790 45792 96c74f5 45790->45792 45792->45722 45794 96c745c WriteProcessMemory 45793->45794 45796 96c74f5 45794->45796 45796->45722 45798 96c71c8 Wow64SetThreadContext 45797->45798 45800 96c7289 45798->45800 45800->45726 45802 96c7211 Wow64SetThreadContext 45801->45802 45804 96c7289 45802->45804 45804->45726 45806 96c75b4 ReadProcessMemory 45805->45806 45808 96c762c 45806->45808 45808->45730 45810 96c75b4 ReadProcessMemory 45809->45810 45812 96c762c 45810->45812 45812->45730 45814 96c6ca0 ResumeThread 45813->45814 45816 96c6d30 45814->45816 45816->45739 45818 96c6ce4 ResumeThread 45817->45818 45820 96c6d30 45818->45820 45820->45739 45822 96c72f0 VirtualAllocEx 45821->45822 45824 96c73ac 45822->45824 45824->45778 45826 96c7334 VirtualAllocEx 45825->45826 45828 96c73ac 45826->45828 45828->45778 45571 9681fe0 45572 968201a 45571->45572 45573 96820ab 45572->45573 45574 9682096 45572->45574 45576 9681bcc 2 API calls 45573->45576 45579 9681bcc 45574->45579 45578 96820ba 45576->45578 45580 9681bd7 45579->45580 45581 96820a1 45580->45581 45583 9682ae8 45580->45583 45589 9681c14 45583->45589 45586 9682b0f 45586->45581 45587 9682b27 CreateIconFromResourceEx 45588 9682c0d 45587->45588 45588->45581 45590 9682b38 CreateIconFromResourceEx 45589->45590 45591 9682b02 45590->45591 45591->45586 45591->45587 45592 2470848 45593 247085c 45592->45593 45594 247089e 45593->45594 45596 24784e7 45593->45596 45597 2478514 45596->45597 45598 24785a9 45597->45598 45601 2479458 45597->45601 45605 2479400 45597->45605 45598->45593 45602 247946f 45601->45602 45609 247949f 45602->45609 45606 247946f 45605->45606 45608 247949f NtQueryInformationProcess 45606->45608 45607 2479483 45607->45597 45608->45607 45610 24794c0 45609->45610 45614 2479500 45610->45614 45618 24794ff 45610->45618 45611 2479483 45611->45597 45616 2479524 45614->45616 45615 2479658 45615->45611 45616->45615 45622 24707f4 45616->45622 45620 2479524 45618->45620 45619 2479658 45619->45611 45620->45619 45621 24707f4 NtQueryInformationProcess 45620->45621 45621->45620 45623 24796c0 NtQueryInformationProcess 45622->45623 45625 2479787 45623->45625 45625->45616 45655 24783e8 45656 2478435 VirtualProtect 45655->45656 45658 24784a1 45656->45658 45659 247a868 45660 247a8ad CloseHandle 45659->45660 45661 247a8f8 45660->45661 45626 700c890 45627 700c928 CreateWindowExW 45626->45627 45629 700ca66 45627->45629 45829 700efd0 45830 700effa 45829->45830 45831 700f042 45830->45831 45832 700f0ec 45830->45832 45833 700f09a CallWindowProcW 45831->45833 45835 700f049 45831->45835 45836 700bc7c 45832->45836 45833->45835 45837 700bc87 45836->45837 45839 700d9a9 45837->45839 45840 700bda4 CallWindowProcW 45837->45840 45840->45839 45630 247ea50 45632 247ea77 45630->45632 45631 247eb54 45632->45631 45634 247e614 45632->45634 45635 247fb08 CreateActCtxA 45634->45635 45637 247fc0e 45635->45637 45662 247a770 45663 247a7ba OutputDebugStringW 45662->45663 45665 247a81c 45663->45665 45638 7007f98 45639 7007fde GetCurrentProcess 45638->45639 45641 7008030 GetCurrentThread 45639->45641 45642 7008029 45639->45642 45643 7008066 45641->45643 45644 700806d GetCurrentProcess 45641->45644 45642->45641 45643->45644 45647 70080a3 45644->45647 45645 70080cb GetCurrentThreadId 45646 70080fc 45645->45646 45647->45645 45666 7005ab8 45667 7005ac7 45666->45667 45670 7005bb0 45666->45670 45675 7005ba1 45666->45675 45671 7005bc1 45670->45671 45672 7005be4 45670->45672 45671->45672 45673 7005e05 GetModuleHandleW 45671->45673 45672->45667 45674 7005e44 45673->45674 45674->45667 45676 7005be4 45675->45676 45677 7005bc1 45675->45677 45676->45667 45677->45676 45678 7005e05 GetModuleHandleW 45677->45678 45679 7005e44 45678->45679 45679->45667 45841 c3d01c 45842 c3d034 45841->45842 45843 c3d08e 45842->45843 45847 700bc7c CallWindowProcW 45842->45847 45848 700d948 45842->45848 45852 700cb28 45842->45852 45856 700cb18 45842->45856 45847->45843 45849 700d958 45848->45849 45851 700d9a9 45849->45851 45860 700bda4 CallWindowProcW 45849->45860 45853 700cb4e 45852->45853 45854 700bc7c CallWindowProcW 45853->45854 45855 700cb6f 45854->45855 45855->45843 45857 700cb28 45856->45857 45858 700bc7c CallWindowProcW 45857->45858 45859 700cb6f 45858->45859 45859->45843 45860->45851

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 45 24735d8-24735fd 46 2473604-2473621 45->46 47 24735ff 45->47 48 2473629 46->48 47->46 49 2473630-247364c 48->49 50 2473655-2473656 49->50 51 247364e 49->51 52 2473a0d-2473a14 50->52 53 247365b-2473672 50->53 51->48 51->52 51->53 54 2473786-2473798 51->54 55 247394f-2473953 51->55 56 247384e-247386e 51->56 57 247368d-24736a2 51->57 58 24738d6-24738ea 51->58 59 24736d4-24736e6 51->59 60 2473752-247375e 51->60 61 247379d-24737a9 51->61 62 24739d9-24739e5 51->62 63 2473919-247392e 51->63 64 24736a4-24736a8 51->64 65 24738a0-24738b9 call 2473c27 51->65 66 24738ef-24738fb 51->66 67 247372d-2473733 51->67 68 247382b-2473849 51->68 69 24736eb-24736f8 51->69 70 24739b4-24739d4 51->70 71 2473674-247368b 51->71 72 2473933-247394a 51->72 73 2473873-247387f 51->73 74 247397f-2473988 51->74 75 24736fd-2473701 51->75 53->49 54->49 78 2473966-247396d 55->78 79 2473955-2473964 55->79 56->49 57->49 58->49 59->49 88 2473765-2473781 60->88 89 2473760 60->89 92 24737b0-24737c6 61->92 93 24737ab 61->93 86 24739e7 62->86 87 24739ec-2473a08 62->87 63->49 80 24736bb-24736c2 64->80 81 24736aa-24736b9 64->81 95 24738bf-24738d1 65->95 76 2473902-2473914 66->76 77 24738fd 66->77 101 247373b-247374d 67->101 68->49 69->49 70->49 71->49 72->49 90 2473886-247389b 73->90 91 2473881 73->91 82 247399b-24739a2 74->82 83 247398a-2473999 74->83 84 2473714-247371b 75->84 85 2473703-2473712 75->85 76->49 77->76 94 2473974-247397a 78->94 79->94 97 24736c9-24736cf 80->97 81->97 96 24739a9-24739af 82->96 83->96 99 2473722-2473728 84->99 85->99 86->87 87->49 88->49 89->88 90->49 91->90 108 24737cd-24737e3 92->108 109 24737c8 92->109 93->92 94->49 95->49 96->49 97->49 99->49 101->49 111 24737e5 108->111 112 24737ea-2473800 108->112 109->108 111->112 114 2473807-2473826 112->114 115 2473802 112->115 114->49 115->114
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID: &+"$&+"$&+"$q+gL
                              • API String ID: 0-3739868574
                              • Opcode ID: a7631a7310c816b6a9571f4cc69f3f96e958e530b8856aaae905be5180021b98
                              • Instruction ID: 11ef121fc672d2e91177a61a76581cc5b86a835bb9a32d80fcb2938598e3da4e
                              • Opcode Fuzzy Hash: a7631a7310c816b6a9571f4cc69f3f96e958e530b8856aaae905be5180021b98
                              • Instruction Fuzzy Hash: 09D12870D1020ADFCB18DF95C5809AEFBB2FF89300B14D59AD426AB354D734AA86CF95

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 118 24735d7-24735fd 119 2473604-2473621 118->119 120 24735ff 118->120 121 2473629 119->121 120->119 122 2473630-247364c 121->122 123 2473655-2473656 122->123 124 247364e 122->124 125 2473a0d-2473a14 123->125 126 247365b-2473672 123->126 124->121 124->125 124->126 127 2473786-2473798 124->127 128 247394f-2473953 124->128 129 247384e-247386e 124->129 130 247368d-24736a2 124->130 131 24738d6-24738ea 124->131 132 24736d4-24736e6 124->132 133 2473752-247375e 124->133 134 247379d-24737a9 124->134 135 24739d9-24739e5 124->135 136 2473919-247392e 124->136 137 24736a4-24736a8 124->137 138 24738a0-24738b9 call 2473c27 124->138 139 24738ef-24738fb 124->139 140 247372d-2473733 124->140 141 247382b-2473849 124->141 142 24736eb-24736f8 124->142 143 24739b4-24739d4 124->143 144 2473674-247368b 124->144 145 2473933-247394a 124->145 146 2473873-247387f 124->146 147 247397f-2473988 124->147 148 24736fd-2473701 124->148 126->122 127->122 151 2473966-247396d 128->151 152 2473955-2473964 128->152 129->122 130->122 131->122 132->122 161 2473765-2473781 133->161 162 2473760 133->162 165 24737b0-24737c6 134->165 166 24737ab 134->166 159 24739e7 135->159 160 24739ec-2473a08 135->160 136->122 153 24736bb-24736c2 137->153 154 24736aa-24736b9 137->154 168 24738bf-24738d1 138->168 149 2473902-2473914 139->149 150 24738fd 139->150 174 247373b-247374d 140->174 141->122 142->122 143->122 144->122 145->122 163 2473886-247389b 146->163 164 2473881 146->164 155 247399b-24739a2 147->155 156 247398a-2473999 147->156 157 2473714-247371b 148->157 158 2473703-2473712 148->158 149->122 150->149 167 2473974-247397a 151->167 152->167 170 24736c9-24736cf 153->170 154->170 169 24739a9-24739af 155->169 156->169 172 2473722-2473728 157->172 158->172 159->160 160->122 161->122 162->161 163->122 164->163 181 24737cd-24737e3 165->181 182 24737c8 165->182 166->165 167->122 168->122 169->122 170->122 172->122 174->122 184 24737e5 181->184 185 24737ea-2473800 181->185 182->181 184->185 187 2473807-2473826 185->187 188 2473802 185->188 187->122 188->187
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID: &+"$&+"$&+"$q+gL
                              • API String ID: 0-3739868574
                              • Opcode ID: b59200a4bb22d8c935426f7d6939b64196e1b2dea3d6178227c2798c487c6edc
                              • Instruction ID: ff6354ad797208657cf425f3de0313c2366c8f803e53c40a7b9295bfea76afd5
                              • Opcode Fuzzy Hash: b59200a4bb22d8c935426f7d6939b64196e1b2dea3d6178227c2798c487c6edc
                              • Instruction Fuzzy Hash: 4AD12970E1020ACFCB18DF95C5809AEFBB2FF89300B14959AD416AB354D734AA86CF95

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 235 7001808-7001811 236 7001813-700183d 235->236 237 70017d8-70017eb 235->237 243 7001844-7001891 call 7000374 236->243 244 700183f 236->244 238 70017b0-70017cc 237->238 240 70017d5-70017d6 238->240 241 70017ce 238->241 242 70017ed-70017f1 240->242 241->237 241->240 241->242 245 70017a9 241->245 247 7001896 243->247 244->243 245->238 248 700189d-70018b9 247->248 249 70018c2-70018c3 248->249 250 70018bb 248->250 252 7001ab7-7001ac0 249->252 250->247 250->249 251 7001a97-7001a9a call 7000404 250->251 250->252 253 70018c8-70018dc 250->253 254 70018de-7001923 250->254 256 7001a9f-7001ab2 251->256 257 7001ac8-7001ad8 252->257 253->248 259 7001972-7001975 254->259 260 7001925-700196f 254->260 256->248 261 700197e-70019a7 259->261 260->259 265 70019e4-7001a92 261->265 266 70019a9-70019e1 261->266 265->248 266->265
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID: `Z/$}V
                              • API String ID: 0-3847960650
                              • Opcode ID: 07e34bbb26ec74ac148910f647014bddcc10708677337aabf2776bc1fd44edb9
                              • Instruction ID: e450b4a95c42ebdb98de3df3dd3c9f580265ba431abf5051840fa0cd0dec90e0
                              • Opcode Fuzzy Hash: 07e34bbb26ec74ac148910f647014bddcc10708677337aabf2776bc1fd44edb9
                              • Instruction Fuzzy Hash: 69A1B1B4E00218CFDB44DFA9D984AEDBBF2BF89310F14816AD419AB364DB349941CF51
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b68a8a09e2011bade3a59ed406cb59fc4eadc9928591147f4e3849ac999496bd
                              • Instruction ID: ab410f09de12cdc9bf91f5356d321455d489b39965266b2a269d50cd16d5fead
                              • Opcode Fuzzy Hash: b68a8a09e2011bade3a59ed406cb59fc4eadc9928591147f4e3849ac999496bd
                              • Instruction Fuzzy Hash: DB431C74E01219CFDB64DF28C898A9EB7B2BF89311F158599D819AB361CB34ED81CF50
                              APIs
                              • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 02479775
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: InformationProcessQuery
                              • String ID:
                              • API String ID: 1778838933-0
                              • Opcode ID: c2640cfff1b04d128ae86be348c619a2c6d8b47ec48d8b1f10b5deb686b3ed84
                              • Instruction ID: ce9619475bfe62b3ad6cf8802cc112090fcabf8ef0c042ba4dd628281ca0e180
                              • Opcode Fuzzy Hash: c2640cfff1b04d128ae86be348c619a2c6d8b47ec48d8b1f10b5deb686b3ed84
                              • Instruction Fuzzy Hash: 1B4146B9D042589FCF10CFA9D984ADEFBB5AB49310F10902AE824B7310D335A945CF65
                              APIs
                              • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 02479775
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: InformationProcessQuery
                              • String ID:
                              • API String ID: 1778838933-0
                              • Opcode ID: 057b4fd22289f664aeccaae9c2a797ea8c247d5b396a543b1f3abcd8b50828b9
                              • Instruction ID: 0a315f15db45f3f5d577796f4ad28ef0719c1f14f53248e38ecefb7a04251771
                              • Opcode Fuzzy Hash: 057b4fd22289f664aeccaae9c2a797ea8c247d5b396a543b1f3abcd8b50828b9
                              • Instruction Fuzzy Hash: 224154B9D042589FCF10CFA9E984ADEFBB1AB49310F24902AE824B7210D335A945CF64
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID: `Z/
                              • API String ID: 0-1889551871
                              • Opcode ID: 1d75ace9c2688308bb41792964a69ebd84eb15e19eca851a63b977d8b6a6f957
                              • Instruction ID: 8c6f806e5438a823d0af67c1d63ce339a47595d9a2c49682d84960b3fc6ca608
                              • Opcode Fuzzy Hash: 1d75ace9c2688308bb41792964a69ebd84eb15e19eca851a63b977d8b6a6f957
                              • Instruction Fuzzy Hash: E39190B4E002189FDB54DFA9D884AEDBBF6FF89310F10816AD819AB354DB349941CF91
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID: HvT
                              • API String ID: 0-336023267
                              • Opcode ID: 7695f619066cd6d523e0d5a5f243ab7d0ac7b230144340286e2414cc191113b5
                              • Instruction ID: 6e96027178aaef129f00cb11a2eceecdbabaa5cbdf5819243c7403773656959d
                              • Opcode Fuzzy Hash: 7695f619066cd6d523e0d5a5f243ab7d0ac7b230144340286e2414cc191113b5
                              • Instruction Fuzzy Hash: CC51EA74D152198FDB48CFAAC9406EEFBF2BF89200F24D16AD829B7254D7345941CF58
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430129397.0000000009680000.00000040.00000800.00020000.00000000.sdmp, Offset: 09680000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_9680000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c1a845dd3a99d8d802cbb28650fae9efddbe92f2de3a8273cdbf7ec9cbdbc62f
                              • Instruction ID: 461e057aa41958a8eee6f8983c0266475ab2922c0127a61e307807686ab825d8
                              • Opcode Fuzzy Hash: c1a845dd3a99d8d802cbb28650fae9efddbe92f2de3a8273cdbf7ec9cbdbc62f
                              • Instruction Fuzzy Hash: 2052D070A04259CFCB14DFE9D9447BBBBB1FB45311F04826BE856DB292D3788982CB51
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0ede2c57789115c14af661ab8b279b2f528a3ae7c612805d92e93300d28d7d61
                              • Instruction ID: 4148ce1abfc89ed3c5778a45088c72d2c0ec44eb45f0b3605704f197bcfd4cfa
                              • Opcode Fuzzy Hash: 0ede2c57789115c14af661ab8b279b2f528a3ae7c612805d92e93300d28d7d61
                              • Instruction Fuzzy Hash: 02525D35B001259FDB58DF69D884A6E77F3BF88711B158269EC069B361DB34DC42CBA0
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430129397.0000000009680000.00000040.00000800.00020000.00000000.sdmp, Offset: 09680000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_9680000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 251d98cc3be337c7b9d3c2b60b5d6093d97cfc49b2a3b793df7fc5b5ee95946b
                              • Instruction ID: 1eac1f9734e28101ac8b4705eef2c146fce3fbabfb2101b598338964ec999be4
                              • Opcode Fuzzy Hash: 251d98cc3be337c7b9d3c2b60b5d6093d97cfc49b2a3b793df7fc5b5ee95946b
                              • Instruction Fuzzy Hash: F1427F70E002188FDB54EFA9C85079EBBF2BF88340F14866AD419AB355DB349D46CFA5
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7d5079dd9771656e5531c28e4de81346d6b21ff4a42fc915dfc96dda09d6c9b8
                              • Instruction ID: 2ff010e4df5586f2f77082c0fcf6329351c93e55213c83cfadba6014a33ace31
                              • Opcode Fuzzy Hash: 7d5079dd9771656e5531c28e4de81346d6b21ff4a42fc915dfc96dda09d6c9b8
                              • Instruction Fuzzy Hash: 1BE19CB17012449FEB15DF66C450BAEB7F6EF89700F14886DE18A9B790CB39E901CB91
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430129397.0000000009680000.00000040.00000800.00020000.00000000.sdmp, Offset: 09680000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_9680000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a99b3950b33220dc84d4bb8a35684866470061904d9d974ce82f7e2e9b230d1c
                              • Instruction ID: b32814632bb02fd020ff33e0b7a60314603c4f8948ca344d97ba2b036be1252e
                              • Opcode Fuzzy Hash: a99b3950b33220dc84d4bb8a35684866470061904d9d974ce82f7e2e9b230d1c
                              • Instruction Fuzzy Hash: E3C17935E002188FCF15DFA5C89079ABBB2BF89350F14C2AAE859AB255DB70D985CF50
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9f7f260823a1b903ff5bfccc5851fb0e093a58b864e533da98b43daf2a53f4b2
                              • Instruction ID: eb45d21b9c27d33908c82e7ff0ebe638d4c0e0f468a1bf3dfd136080e05e6e49
                              • Opcode Fuzzy Hash: 9f7f260823a1b903ff5bfccc5851fb0e093a58b864e533da98b43daf2a53f4b2
                              • Instruction Fuzzy Hash: 70A11670E052498FDB08CFA9C890AEDFBF2FF89304F24906AD459AB615D7319946CF54
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b8a145fd86d9e71c5117e5cb2bad63b653882850fcc94fe4ba1cf144cf5c2100
                              • Instruction ID: 744d635fbabdc8e941015edc27589149040b9d92d8454298ac1715bd5e625cb2
                              • Opcode Fuzzy Hash: b8a145fd86d9e71c5117e5cb2bad63b653882850fcc94fe4ba1cf144cf5c2100
                              • Instruction Fuzzy Hash: 2C81B274E052188FDB08CFAAC984AEDBBB2EF88300F24942AD519BB354D7349946CF54
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0a58a53e13b4539a8d7616261cc58d8b46de90660637365b10793234b51346d9
                              • Instruction ID: 44525f5c14d97d2b2b2c6892144fc876af4ecb7b673cb91ac40f3620a3637b21
                              • Opcode Fuzzy Hash: 0a58a53e13b4539a8d7616261cc58d8b46de90660637365b10793234b51346d9
                              • Instruction Fuzzy Hash: 4E81B374E052198FDB08CFAAC984AEDBBB2AF88300F24952AD419BB354D7359946CF54
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9b6be2c01579f40e680c5e0b46a02368ab0cd06a511a08ebebc5136b6f3c4707
                              • Instruction ID: a2ec37b6b2ba15aa991d7edf0adfa6a9d6b04147b095e02006941c4aa1d42394
                              • Opcode Fuzzy Hash: 9b6be2c01579f40e680c5e0b46a02368ab0cd06a511a08ebebc5136b6f3c4707
                              • Instruction Fuzzy Hash: C07117B4D15218DFCB54DFA5D4946EEBBB2BF89300F10886AD425BB350DB345942CF51
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b3d61de583a650db4f92ea6ad9652b42b82ef9f67709d4654de0e6242bb12b7c
                              • Instruction ID: 92d46121d46c3ef14a993407ea49d8d976e34caf0f3eb9d0ffa9d350a01e5e8e
                              • Opcode Fuzzy Hash: b3d61de583a650db4f92ea6ad9652b42b82ef9f67709d4654de0e6242bb12b7c
                              • Instruction Fuzzy Hash: 3041CBB4D003489FDB20CFA9D584BDEFBF1AB09310F60942AE814BB250D771A945CFA4
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f22f0b54f84e72f98590df23527dce9fa165068a507a7686bfaf5ca47cc53abc
                              • Instruction ID: 3772e52fa29d96409f4ed8f4ded3cad0b5c6b259df4473de53df5c94bf7d44ec
                              • Opcode Fuzzy Hash: f22f0b54f84e72f98590df23527dce9fa165068a507a7686bfaf5ca47cc53abc
                              • Instruction Fuzzy Hash: 1C3142B4E1510DEFDB44CFA8D58059EF7F6EF89310F24D5B98015A72A4D6309A01CB45
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e4f6de99ccf40f6775ed0ef58ff81663d5283534710cf83cf335ed4677ed29b8
                              • Instruction ID: 93431d15659611defc59c845c59b72295ce50e73c23a7de167b8d07bf9791032
                              • Opcode Fuzzy Hash: e4f6de99ccf40f6775ed0ef58ff81663d5283534710cf83cf335ed4677ed29b8
                              • Instruction Fuzzy Hash: B7314FB4E1520DEFDB48CFA8D58199EF7F6EF89310F20D5B98015AB2A4D6309A01CB45
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 33d3fc99313a0a9edca7c8aa058681f6151c83f36733215083f272ce76e61ba9
                              • Instruction ID: 43e4bbc4801ad5df2459a64eb11216e7aa37e964c12178544f2c2b87f1d9bb96
                              • Opcode Fuzzy Hash: 33d3fc99313a0a9edca7c8aa058681f6151c83f36733215083f272ce76e61ba9
                              • Instruction Fuzzy Hash: D941BBB4D053089FDB10DFA9D584BDEFBF1AB09300F60942AE814BB250D7B5A944CF64
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b77b04613c5e9befd48655be67e7f6f24e28c89e803968260dfdf929a2beccad
                              • Instruction ID: da72ce6f0431f8e34c052b4fdabef84ed7db10a1369fe3380420bcdc05dc2e1b
                              • Opcode Fuzzy Hash: b77b04613c5e9befd48655be67e7f6f24e28c89e803968260dfdf929a2beccad
                              • Instruction Fuzzy Hash: DB3129B0D09658CBDB08CFA6C8446FEBBFAEFCA340F14D46AE409A6225DB3405468F50
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7888cd4341cac50442926afc5ac80fcdb997e9da4e985bc54064d05857697616
                              • Instruction ID: e3dfaef89a88a03cffdad4cc8037b95a1feb3ae627553b610bf45a4c914c89ed
                              • Opcode Fuzzy Hash: 7888cd4341cac50442926afc5ac80fcdb997e9da4e985bc54064d05857697616
                              • Instruction Fuzzy Hash: E331F571E006188BDB18CFAAD9447DEBBB2AFC8310F14C1AAD409AB264DB755985CF40
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 86d163f6ac30899c13264d5e7dfbbc0f41f4abc65e725509921b3f778c3b8ec5
                              • Instruction ID: d8399b41617ccaef0ba999bab2913390459d0c62ee66af4629ebee5ee7e8d418
                              • Opcode Fuzzy Hash: 86d163f6ac30899c13264d5e7dfbbc0f41f4abc65e725509921b3f778c3b8ec5
                              • Instruction Fuzzy Hash: 25317DB8D05219DFCB14CFA9D484AAEBBF2BB49311F249129E814A7350D7359941CF54
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 133f250d2bda177d975ddfceccb351de44c3d975d1ca83b512cde2c1de723924
                              • Instruction ID: c7026cf19e51f1cd12e5de7426c3f1b604c987e258c3e57a2671addbf398e5d1
                              • Opcode Fuzzy Hash: 133f250d2bda177d975ddfceccb351de44c3d975d1ca83b512cde2c1de723924
                              • Instruction Fuzzy Hash: 09315DB4D05218EFCB54CFA9D584AAEBBF2BB89310F249129E824B7350D7349941CF54
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4ee6bdd41680e9e1af97eb6ec3f75d62a2ea63306ffb078b2674acbd781618f7
                              • Instruction ID: 26d74aff37244d1ed958fbda0283dd3b30a0abb1ae75db232a5bdf9762f4c83c
                              • Opcode Fuzzy Hash: 4ee6bdd41680e9e1af97eb6ec3f75d62a2ea63306ffb078b2674acbd781618f7
                              • Instruction Fuzzy Hash: E8219EB8D042089FDB15CFAAD444AEEBBF2AB49311F10D12AE824B7350D7349945CFA8
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 08ce5821401eeada8a1056bfd02bd6ae7a061f8b842688ba60b75c0f44719a8a
                              • Instruction ID: 7902ec437d00bf910e6efffe347ce3ce8deda79c1db736fae6db44b07bed7392
                              • Opcode Fuzzy Hash: 08ce5821401eeada8a1056bfd02bd6ae7a061f8b842688ba60b75c0f44719a8a
                              • Instruction Fuzzy Hash: 8A216FB4D04209DFDB15CFAAD444AEEBBF2AB49311F10E12AE824B7354D7349945CFA8
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1dabad1f6152ff529606deaa5ce5071817d0fb234fb1d87d24a43995423dc509
                              • Instruction ID: c6bc0c6c9738976d450b6882e9bbfbdc920d07c525f2b15920d6b7198e772d6e
                              • Opcode Fuzzy Hash: 1dabad1f6152ff529606deaa5ce5071817d0fb234fb1d87d24a43995423dc509
                              • Instruction Fuzzy Hash: F9F0C4B8D052089F8F14CFA9D4414EEFBF2AB5A311F10A16AE814B3310E73199418FA8
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9eb7edaa31dfbf35867dc96d8b8f8c426529f6e1b54484e160c576f9eb5ddf33
                              • Instruction ID: 75c40aa10d3b3be358a052c9a93133248704d897c896465506f29a95182f01a6
                              • Opcode Fuzzy Hash: 9eb7edaa31dfbf35867dc96d8b8f8c426529f6e1b54484e160c576f9eb5ddf33
                              • Instruction Fuzzy Hash: 82F042B5D0520C9F8F04DFA9D5418EEFBF2AB5A310F10A16AE814B3310E73599518FA8
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 48509470e98f53e1ab05923df4f6efdadd34ec6ae059452578d05baa796b35bf
                              • Instruction ID: a4f557120f0e18e41ca14ba25721adf469bca2a155c4b69a3ecfc845561fc853
                              • Opcode Fuzzy Hash: 48509470e98f53e1ab05923df4f6efdadd34ec6ae059452578d05baa796b35bf
                              • Instruction Fuzzy Hash: 25C048A6A8E008B689205CA460024F8B33CC3CB2B6E40B06AF20EA340A811089678A69

                              Control-flow Graph

                              APIs
                              • GetCurrentProcess.KERNEL32 ref: 07008016
                              • GetCurrentThread.KERNEL32 ref: 07008053
                              • GetCurrentProcess.KERNEL32 ref: 07008090
                              • GetCurrentThreadId.KERNEL32 ref: 070080E9
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: Current$ProcessThread
                              • String ID:
                              • API String ID: 2063062207-0
                              • Opcode ID: e32805282fbce3aef3e93f643b5eb980e98db89d0a300383cdb814f0e70d4614
                              • Instruction ID: 3c8acb519ffb05a880bfede612df29d07ede59ba1af4c17d2a002a6928e12500
                              • Opcode Fuzzy Hash: e32805282fbce3aef3e93f643b5eb980e98db89d0a300383cdb814f0e70d4614
                              • Instruction Fuzzy Hash: 695176B09003499FEB54DFAAE848BEEBBF1BF48310F208459E019A73A1D7745944CF66

                              Control-flow Graph

                              APIs
                              • GetCurrentProcess.KERNEL32 ref: 07008016
                              • GetCurrentThread.KERNEL32 ref: 07008053
                              • GetCurrentProcess.KERNEL32 ref: 07008090
                              • GetCurrentThreadId.KERNEL32 ref: 070080E9
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: Current$ProcessThread
                              • String ID:
                              • API String ID: 2063062207-0
                              • Opcode ID: 1f422b075df4ced89a38d8ac47f0f4e6e29020d5964a385b6b07bc4539e3f85c
                              • Instruction ID: 7f814abb0cf8afe253333b0490bae24e0895e85f3e0eea505ef628a6773417b9
                              • Opcode Fuzzy Hash: 1f422b075df4ced89a38d8ac47f0f4e6e29020d5964a385b6b07bc4539e3f85c
                              • Instruction Fuzzy Hash: 345164B09003099FEB54DFAAE848BEEBBF1BF48310F208419E519A73A0D7745944CF66

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1104 2478096-2478099 1105 2478104-2478151 1104->1105 1106 247809b-24780ae 1104->1106 1107 2478153-2478155 1105->1107 1108 247819a-247819d 1105->1108 1106->1105 1109 2478157-2478161 1107->1109 1110 247819e-24781a5 1107->1110 1108->1110 1111 2478163-247816d 1109->1111 1112 24781aa-24781b3 1109->1112 1113 24781a7 1110->1113 1114 24781ee-24781f1 1110->1114 1117 24781b6-24781b9 1111->1117 1118 247816f-2478199 1111->1118 1112->1117 1113->1112 1115 24781f3-24781fd 1114->1115 1116 247823a-2478243 1114->1116 1119 2478246-2478249 1115->1119 1120 24781ff 1115->1120 1116->1119 1122 2478202-2478205 1117->1122 1123 24781bb-24781c5 1117->1123 1118->1108 1121 24781e2-24781e5 1118->1121 1124 2478292-2478295 1119->1124 1125 247824a-247824d 1119->1125 1120->1122 1126 24781e7-24781e9 1121->1126 1127 247822e-2478231 1121->1127 1128 2478207-247820d 1122->1128 1129 247824e-2478259 1122->1129 1130 24781c7-24781d1 1123->1130 1131 247820e-2478219 1123->1131 1132 2478296-24782a1 1124->1132 1125->1129 1125->1132 1133 2478232-2478235 1126->1133 1134 24781eb 1126->1134 1127->1133 1128->1131 1135 24782a2-24782b1 1129->1135 1136 247825b-2478271 1129->1136 1137 247821a-2478221 1130->1137 1138 24781d3-24781d9 1130->1138 1131->1137 1132->1135 1141 24782ea-24782eb 1132->1141 1144 2478237-2478239 1133->1144 1145 247827e-2478281 1133->1145 1134->1114 1142 24782b3-24782b9 1135->1142 1143 24782fa-2478301 1135->1143 1139 2478272-2478278 1136->1139 1140 2478222-2478229 1137->1140 1138->1140 1146 24781db-24781e1 1138->1146 1147 24782ee-24782f9 1139->1147 1148 247827a-247827b 1139->1148 1140->1139 1152 247822b 1140->1152 1141->1147 1149 2478302-2478309 1142->1149 1153 24782bb-24782c9 1142->1153 1143->1149 1150 247834a-2478351 1143->1150 1144->1116 1151 2478282-2478285 1144->1151 1145->1151 1146->1121 1147->1143 1148->1145 1154 2478352-2478381 1149->1154 1156 247830b-247830f 1149->1156 1150->1154 1155 247839a-24783a4 1150->1155 1157 2478287-247828d 1151->1157 1158 24782ce-24782d5 1151->1158 1152->1127 1159 2478312-247831d 1153->1159 1160 24782cb-24782cd 1153->1160 1161 2478383 1154->1161 1162 24783ca-24783cd 1154->1162 1165 24783a6-24783b9 1155->1165 1166 247841b-247849f VirtualProtect 1155->1166 1156->1159 1163 24782d6-24782d9 1157->1163 1167 247828f 1157->1167 1158->1163 1164 247831e-247831f 1158->1164 1159->1164 1160->1158 1168 2478386-247838b 1161->1168 1174 2478416-247841a 1162->1174 1175 24783ce-24783cf 1162->1175 1169 2478322-2478327 1163->1169 1170 24782db-24782e1 1163->1170 1164->1169 1172 2478402-2478405 1165->1172 1173 24783bb-24783bd 1165->1173 1183 24784a1-24784a7 1166->1183 1184 24784a8-24784e4 1166->1184 1167->1124 1177 247838e-2478397 1168->1177 1179 247832a-247833d 1169->1179 1178 24782e3 1170->1178 1170->1179 1180 2478406-2478409 1172->1180 1173->1180 1181 24783bf-24783c5 1173->1181 1174->1166 1182 24783d2-2478400 1175->1182 1177->1155 1178->1141 1179->1168 1188 247833f-2478345 1179->1188 1180->1182 1189 247840a-247840d 1180->1189 1186 24783c7-24783c9 1181->1186 1187 247840e-2478414 1181->1187 1182->1172 1183->1184 1186->1162 1187->1174 1188->1177 1192 2478347 1188->1192 1189->1187 1192->1150
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9dc2846ad67b55d3da96a3f55517035368671c56216aeae35a121bd60b9ba947
                              • Instruction ID: d11af0022b1eb0ddc0c8730803fa68e4ddd023f06292317e30465a70e3240907
                              • Opcode Fuzzy Hash: 9dc2846ad67b55d3da96a3f55517035368671c56216aeae35a121bd60b9ba947
                              • Instruction Fuzzy Hash: 9AE1D571B086C49BD7178B7884B97DDBFF1EF93218B1A50DAC4E25A913D6219C87D700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1194 96c778c-96c7831 1196 96c787a-96c78a2 1194->1196 1197 96c7833-96c784a 1194->1197 1201 96c78e8-96c793e 1196->1201 1202 96c78a4-96c78b8 1196->1202 1197->1196 1200 96c784c-96c7851 1197->1200 1203 96c7874-96c7877 1200->1203 1204 96c7853-96c785d 1200->1204 1211 96c7984-96c7a72 CreateProcessA 1201->1211 1212 96c7940-96c7954 1201->1212 1202->1201 1209 96c78ba-96c78bf 1202->1209 1203->1196 1206 96c785f 1204->1206 1207 96c7861-96c7870 1204->1207 1206->1207 1207->1207 1210 96c7872 1207->1210 1213 96c78c1-96c78cb 1209->1213 1214 96c78e2-96c78e5 1209->1214 1210->1203 1230 96c7a7b-96c7b60 1211->1230 1231 96c7a74-96c7a7a 1211->1231 1212->1211 1220 96c7956-96c795b 1212->1220 1215 96c78cd 1213->1215 1216 96c78cf-96c78de 1213->1216 1214->1201 1215->1216 1216->1216 1219 96c78e0 1216->1219 1219->1214 1222 96c795d-96c7967 1220->1222 1223 96c797e-96c7981 1220->1223 1224 96c7969 1222->1224 1225 96c796b-96c797a 1222->1225 1223->1211 1224->1225 1225->1225 1226 96c797c 1225->1226 1226->1223 1243 96c7b70-96c7b74 1230->1243 1244 96c7b62-96c7b66 1230->1244 1231->1230 1246 96c7b84-96c7b88 1243->1246 1247 96c7b76-96c7b7a 1243->1247 1244->1243 1245 96c7b68 1244->1245 1245->1243 1249 96c7b98-96c7b9c 1246->1249 1250 96c7b8a-96c7b8e 1246->1250 1247->1246 1248 96c7b7c 1247->1248 1248->1246 1251 96c7b9e-96c7bc7 1249->1251 1252 96c7bd2-96c7bdd 1249->1252 1250->1249 1253 96c7b90 1250->1253 1251->1252 1257 96c7bde 1252->1257 1253->1249 1257->1257
                              APIs
                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 096C7A5F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: a4a143cfe7de4e617d828d926043589a577578790d3584a1a568f60ee5c26ac7
                              • Instruction ID: 107de8907938732d4098afff8a396abf9d5646f2ff8f03d7b15c41a5ffe08b76
                              • Opcode Fuzzy Hash: a4a143cfe7de4e617d828d926043589a577578790d3584a1a568f60ee5c26ac7
                              • Instruction Fuzzy Hash: 73C115B1D002299FDB24DFA8C841BEDBBB1FF49300F1095AAE459B7250DB749A85CF94

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1258 96c7798-96c7831 1260 96c787a-96c78a2 1258->1260 1261 96c7833-96c784a 1258->1261 1265 96c78e8-96c793e 1260->1265 1266 96c78a4-96c78b8 1260->1266 1261->1260 1264 96c784c-96c7851 1261->1264 1267 96c7874-96c7877 1264->1267 1268 96c7853-96c785d 1264->1268 1275 96c7984-96c7a72 CreateProcessA 1265->1275 1276 96c7940-96c7954 1265->1276 1266->1265 1273 96c78ba-96c78bf 1266->1273 1267->1260 1270 96c785f 1268->1270 1271 96c7861-96c7870 1268->1271 1270->1271 1271->1271 1274 96c7872 1271->1274 1277 96c78c1-96c78cb 1273->1277 1278 96c78e2-96c78e5 1273->1278 1274->1267 1294 96c7a7b-96c7b60 1275->1294 1295 96c7a74-96c7a7a 1275->1295 1276->1275 1284 96c7956-96c795b 1276->1284 1279 96c78cd 1277->1279 1280 96c78cf-96c78de 1277->1280 1278->1265 1279->1280 1280->1280 1283 96c78e0 1280->1283 1283->1278 1286 96c795d-96c7967 1284->1286 1287 96c797e-96c7981 1284->1287 1288 96c7969 1286->1288 1289 96c796b-96c797a 1286->1289 1287->1275 1288->1289 1289->1289 1290 96c797c 1289->1290 1290->1287 1307 96c7b70-96c7b74 1294->1307 1308 96c7b62-96c7b66 1294->1308 1295->1294 1310 96c7b84-96c7b88 1307->1310 1311 96c7b76-96c7b7a 1307->1311 1308->1307 1309 96c7b68 1308->1309 1309->1307 1313 96c7b98-96c7b9c 1310->1313 1314 96c7b8a-96c7b8e 1310->1314 1311->1310 1312 96c7b7c 1311->1312 1312->1310 1315 96c7b9e-96c7bc7 1313->1315 1316 96c7bd2-96c7bdd 1313->1316 1314->1313 1317 96c7b90 1314->1317 1315->1316 1321 96c7bde 1316->1321 1317->1313 1321->1321
                              APIs
                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 096C7A5F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: f587be3b1740509de82b1b8ae77f672a14daa62abcdb9e489fd35f1470ad7b3f
                              • Instruction ID: 31f840bde94a2045a7c837f59de80f11630ffc9f2c0f156121f40c055ca0bc7d
                              • Opcode Fuzzy Hash: f587be3b1740509de82b1b8ae77f672a14daa62abcdb9e489fd35f1470ad7b3f
                              • Instruction Fuzzy Hash: 04C114B1D002298FDB20DFA8C841BEDBBB1FF09300F1095AAE459B7250DB749A85CF94

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1422 7005bb0-7005bbf 1423 7005bc1-7005bce call 7005864 1422->1423 1424 7005beb-7005bef 1422->1424 1431 7005bd0 1423->1431 1432 7005be4 1423->1432 1426 7005bf1-7005bfb 1424->1426 1427 7005c03-7005c44 1424->1427 1426->1427 1433 7005c51-7005c5f 1427->1433 1434 7005c46-7005c4e 1427->1434 1479 7005bd6 call 7005e80 1431->1479 1480 7005bd6 call 7005e90 1431->1480 1432->1424 1435 7005c61-7005c66 1433->1435 1436 7005c83-7005c85 1433->1436 1434->1433 1438 7005c71 1435->1438 1439 7005c68-7005c6f call 7005870 1435->1439 1440 7005c88-7005c8f 1436->1440 1437 7005bdc-7005bde 1437->1432 1441 7005d20-7005df1 1437->1441 1442 7005c73-7005c81 1438->1442 1439->1442 1444 7005c91-7005c99 1440->1444 1445 7005c9c-7005ca3 1440->1445 1473 7005df3-7005e02 1441->1473 1474 7005e05-7005e42 GetModuleHandleW 1441->1474 1442->1440 1444->1445 1448 7005cb0-7005cb9 call 7005880 1445->1448 1449 7005ca5-7005cad 1445->1449 1453 7005cc6-7005ccb 1448->1453 1454 7005cbb-7005cc3 1448->1454 1449->1448 1456 7005ce9-7005cf6 1453->1456 1457 7005ccd-7005cd4 1453->1457 1454->1453 1463 7005cf8-7005d16 1456->1463 1464 7005d19-7005d1f 1456->1464 1457->1456 1458 7005cd6-7005ce6 call 7005890 call 70058a0 1457->1458 1458->1456 1463->1464 1473->1474 1475 7005e44-7005e4a 1474->1475 1476 7005e4b-7005e79 1474->1476 1475->1476 1479->1437 1480->1437
                              APIs
                              • GetModuleHandleW.KERNELBASE(?), ref: 07005E32
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 4801cc66e0f4924e0766cb7c58d454fcd3066503770956825ce9513dbb8e963c
                              • Instruction ID: fad4d59230f235dc471d24484c9f7d44142d25844486cd27255140c9794c685f
                              • Opcode Fuzzy Hash: 4801cc66e0f4924e0766cb7c58d454fcd3066503770956825ce9513dbb8e963c
                              • Instruction Fuzzy Hash: 419145B0A00B098FEB64CF69D844B9ABBF1BF48310F148A2AD445E7B90D774E955CF91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1481 700c884-700c926 1483 700c928-700c93a 1481->1483 1484 700c93d-700c948 1481->1484 1483->1484 1485 700c94a-700c959 1484->1485 1486 700c95c-700c9bc 1484->1486 1485->1486 1488 700c9c4-700ca64 CreateWindowExW 1486->1488 1489 700ca66-700ca6c 1488->1489 1490 700ca6d-700cad8 1488->1490 1489->1490 1494 700cae5 1490->1494 1495 700cada-700cadd 1490->1495 1496 700cae6 1494->1496 1495->1494 1496->1496
                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0700CA51
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: CreateWindow
                              • String ID:
                              • API String ID: 716092398-0
                              • Opcode ID: d674bec75e72a41197f264810439baf59f3ba1631a947c047134a94fcdfe7368
                              • Instruction ID: 35fb7040ed5260c00a867f17a888019f50c644a23d7f964e9340b9c070412d14
                              • Opcode Fuzzy Hash: d674bec75e72a41197f264810439baf59f3ba1631a947c047134a94fcdfe7368
                              • Instruction Fuzzy Hash: 1371ACB4D00218DFDF20CFA9D984BDEBBF1BB0A314F5091AAE818A7211D7719A85CF55

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1497 700c890-700c926 1498 700c928-700c93a 1497->1498 1499 700c93d-700c948 1497->1499 1498->1499 1500 700c94a-700c959 1499->1500 1501 700c95c-700ca64 CreateWindowExW 1499->1501 1500->1501 1504 700ca66-700ca6c 1501->1504 1505 700ca6d-700cad8 1501->1505 1504->1505 1509 700cae5 1505->1509 1510 700cada-700cadd 1505->1510 1511 700cae6 1509->1511 1510->1509 1511->1511
                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0700CA51
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: CreateWindow
                              • String ID:
                              • API String ID: 716092398-0
                              • Opcode ID: bd6084a132ad722e76678dbde78ad787566f74c09a3bf5b0bd763859b14ee774
                              • Instruction ID: dd4cb9ebf84e8807f4f26d905265789d020a9e18663ced2103f21db707099784
                              • Opcode Fuzzy Hash: bd6084a132ad722e76678dbde78ad787566f74c09a3bf5b0bd763859b14ee774
                              • Instruction Fuzzy Hash: C2719CB4D00218DFDF20CFA9D984BDEBBF1BB0A314F5091AAE818A7211D7309A85CF54
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430129397.0000000009680000.00000040.00000800.00020000.00000000.sdmp, Offset: 09680000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_9680000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: CreateFromIconResource
                              • String ID:
                              • API String ID: 3668623891-0
                              • Opcode ID: 41c162c903560d74784dee7d264ac519f198c71e83633b01dcb844c5343c71ae
                              • Instruction ID: a0ec03e6c7c87e8486b1428dea4ef2152027ad2bda5f513f359902e3c0c5290a
                              • Opcode Fuzzy Hash: 41c162c903560d74784dee7d264ac519f198c71e83633b01dcb844c5343c71ae
                              • Instruction Fuzzy Hash: 5D51ECB5D042589FCF01DFA9D980AEEBBB4AB0A310F14906AE814BB221C335A951CF64
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 0247FBF9
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: a640260925dfdaf123d1b732627609ae67ace8a6573f970077f1f9441ada13c8
                              • Instruction ID: 4516f57ef66016ea06b5a7ed700d7f98983075d2a3670f00189738cd0ee27408
                              • Opcode Fuzzy Hash: a640260925dfdaf123d1b732627609ae67ace8a6573f970077f1f9441ada13c8
                              • Instruction Fuzzy Hash: 9D51E471D002199FEB20DFA8C840BDEBBF5BF49300F1084AAD519BB251DB716A89CF91
                              APIs
                              • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 09682BFB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430129397.0000000009680000.00000040.00000800.00020000.00000000.sdmp, Offset: 09680000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_9680000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: CreateFromIconResource
                              • String ID:
                              • API String ID: 3668623891-0
                              • Opcode ID: e11a8f4ac86eb4a34e82794d3347219b4a81d35b99252731e98beb0465811625
                              • Instruction ID: 13f49930156efd4b886067e4baa752e37861121251e31108cee4a30c32907656
                              • Opcode Fuzzy Hash: e11a8f4ac86eb4a34e82794d3347219b4a81d35b99252731e98beb0465811625
                              • Instruction Fuzzy Hash: 6E419AB9D042589FCF10DFA9E584AEEFBF4EB19310F14A01AE914BB210D375A945CF64
                              APIs
                              • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 09682BFB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430129397.0000000009680000.00000040.00000800.00020000.00000000.sdmp, Offset: 09680000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_9680000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: CreateFromIconResource
                              • String ID:
                              • API String ID: 3668623891-0
                              • Opcode ID: 30ba7c4876c3cf559cb483320eb2ebdc650ef3c54f60e3157e552c2de9aae1a2
                              • Instruction ID: 66fe0da0eb373a4fb2a752f5ab10bca0f8a283e76328e684869e9acbd643a408
                              • Opcode Fuzzy Hash: 30ba7c4876c3cf559cb483320eb2ebdc650ef3c54f60e3157e552c2de9aae1a2
                              • Instruction Fuzzy Hash: 004189B9D042589FCF10DFA9D584AEEFBF4AB19310F14A01AE814BB310D375A941CF64
                              APIs
                              • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 096C74E3
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: a3c519ee3bacddff1fc0970ff48c2cda9df7afbd973c5e5635061abd1e2b30e0
                              • Instruction ID: 84fe5ef275a3d87f0ca277101b6b6ad16421a5bcd1e865b95a31931be5f17910
                              • Opcode Fuzzy Hash: a3c519ee3bacddff1fc0970ff48c2cda9df7afbd973c5e5635061abd1e2b30e0
                              • Instruction Fuzzy Hash: A441ABB5D012589FDB14CFA9D984AEEFBF1FB49310F24902AE818B7210D735A946CF64
                              APIs
                              • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 096C74E3
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: a3c94c29e34062c35e104fdfa1a145d1b2191a634fdbdc19f6ee497e86a80594
                              • Instruction ID: cda5fb2e0cd64eea1aa06697c5caafad9ec859a58174711802c83575bbbc8e8d
                              • Opcode Fuzzy Hash: a3c94c29e34062c35e104fdfa1a145d1b2191a634fdbdc19f6ee497e86a80594
                              • Instruction Fuzzy Hash: 4C4198B5D012589FCB10CFA9D984AEEFBF1FB49310F24942AE818B7210D775AA45CF64
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 070082AB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: a7de02b6571bf8112206aec930c686180a2ad1182caa2ec7a65df08e78e2f49d
                              • Instruction ID: 5ed32b7b88975b702ea48c7e40ed770ae1ca584efe79dc9a4a2a1fc383a370ab
                              • Opcode Fuzzy Hash: a7de02b6571bf8112206aec930c686180a2ad1182caa2ec7a65df08e78e2f49d
                              • Instruction Fuzzy Hash: DB4178B9D002589FDB10CFA9D984ADEBBF5BB09310F14902AE918BB350D335A945CF94
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 070082AB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 70618bd638ee210cf23e939299e070b12b30e12ed10a52d79e482f1697189fac
                              • Instruction ID: d5d96068de3aa5071d9ebff6cb17773c5651222250af59616a32425f14afec5f
                              • Opcode Fuzzy Hash: 70618bd638ee210cf23e939299e070b12b30e12ed10a52d79e482f1697189fac
                              • Instruction Fuzzy Hash: D14176B9D002589FDB10CFAAD984ADEBBF5BB09310F14902AE918BB350D335A945CF94
                              APIs
                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 096C761A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: a21a6fc89fa4535f34089bfdabac83383e6b48a1c877ac91cbd54be71f499316
                              • Instruction ID: 695e54fa818cedbd284ce5acbde20b7372df920af074f176319ecf7c93edea37
                              • Opcode Fuzzy Hash: a21a6fc89fa4535f34089bfdabac83383e6b48a1c877ac91cbd54be71f499316
                              • Instruction Fuzzy Hash: 5C41BBB5D002589FCF10CFAAD984AEEFBB1BB49310F14942AE815B7210C735A945CF54
                              APIs
                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 096C761A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: 3727cfd61f07e90cff0832d265e1591187de3750a4ef9a3f4ea15562596a8579
                              • Instruction ID: 23f6d822ddcb926e52490ba5670f1a25ae03cf68ec3514909162749b0254ca12
                              • Opcode Fuzzy Hash: 3727cfd61f07e90cff0832d265e1591187de3750a4ef9a3f4ea15562596a8579
                              • Instruction Fuzzy Hash: 8241A9B9D042589FCF10CFAAD984AEEFBB1FB49310F14942AE814B7210D735A945CF68
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 096C739A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 66068b9aa9332a97655d370910b48d488400963d49d0fe9bc6471c07d3457318
                              • Instruction ID: afd97e0f98e55a067d84b42f9049f40d4dfddd000f18bf7f7c8204310025aa38
                              • Opcode Fuzzy Hash: 66068b9aa9332a97655d370910b48d488400963d49d0fe9bc6471c07d3457318
                              • Instruction Fuzzy Hash: D83198B9D002589FCF14CFA9D984AEEFBB5FB49310F10942AE815BB210D735A946CF64
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 096C739A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 22c7ac229b8a090e467a1528b484658636e05d4329319e716dc98630c5ea0da3
                              • Instruction ID: 07b0d383bba311c02604293225cded5d3da2ee79dc7102d5e337950a345fc830
                              • Opcode Fuzzy Hash: 22c7ac229b8a090e467a1528b484658636e05d4329319e716dc98630c5ea0da3
                              • Instruction Fuzzy Hash: 803188B9D042589FCF10CFA9E980AEEFBB1FB49310F10942AE815B7210D735A946CF64
                              APIs
                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 0700F0C1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: CallProcWindow
                              • String ID:
                              • API String ID: 2714655100-0
                              • Opcode ID: 3b906f767a805f882854e0efc84757e2182f795bd33581c2e8ff7c1ea3e85c93
                              • Instruction ID: 321797c7682a5b4e9562ff377ec42854d27bb9a22b511d81a4b1d71a1c8d0e4c
                              • Opcode Fuzzy Hash: 3b906f767a805f882854e0efc84757e2182f795bd33581c2e8ff7c1ea3e85c93
                              • Instruction Fuzzy Hash: BB4139B5A00306DFDB24CF99C848BAABBF5FF88324F248559D519A7361D771A841CFA0
                              APIs
                              • Wow64SetThreadContext.KERNEL32(?,?), ref: 096C7277
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: ContextThreadWow64
                              • String ID:
                              • API String ID: 983334009-0
                              • Opcode ID: cc5e7b11076da85bdee38d2ccdc6bbacfee323c3167cd716ce63b538c7467df1
                              • Instruction ID: e155e2ee075dd1f529784f8e9fabb3fa592ef6e428f99c85d9708851523cfc8c
                              • Opcode Fuzzy Hash: cc5e7b11076da85bdee38d2ccdc6bbacfee323c3167cd716ce63b538c7467df1
                              • Instruction Fuzzy Hash: F341CBB4D012189FDB14DFAAD884AEEFBF1FB49310F24802AE414B7210C739A985CF54
                              APIs
                              • Wow64SetThreadContext.KERNEL32(?,?), ref: 096C7277
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: ContextThreadWow64
                              • String ID:
                              • API String ID: 983334009-0
                              • Opcode ID: 0379157a3114bb281f6d5cb87d4b378abe19918ee123f2bd092c4e6154b361f3
                              • Instruction ID: c8b9572dd0ab4ebb0bdb4692535859a25c50561bd16fd23571707a8609f2498b
                              • Opcode Fuzzy Hash: 0379157a3114bb281f6d5cb87d4b378abe19918ee123f2bd092c4e6154b361f3
                              • Instruction Fuzzy Hash: 2831BAB5D012589FDB14DFAAD884AEEFBF1FB49310F24802AE418B7240D779A985CF54
                              APIs
                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0247848F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: ce4e0060bbba8241bc394cb06af8150fed87bd90a9b85fba5260569c28b2329c
                              • Instruction ID: 5435c047ee858f287b2ead0814149626deb90a69bd1747fa4f6a37d4943d56cf
                              • Opcode Fuzzy Hash: ce4e0060bbba8241bc394cb06af8150fed87bd90a9b85fba5260569c28b2329c
                              • Instruction Fuzzy Hash: 5C3179B9D042589FCB10CFA9E584ADEFBF1BB19310F24902AE814B7210D375A945CF64
                              APIs
                              • PostMessageW.USER32(?,?,?,00000000), ref: 096CBB3B
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: 3b0fab5f94266e02a45abf3a42e547de7c97150949c3d88de3f66f97f6d8f473
                              • Instruction ID: 65c95a4335fdc9a2cb701adc50c265cbb4fab8ba9955ec3e2342934d9855186d
                              • Opcode Fuzzy Hash: 3b0fab5f94266e02a45abf3a42e547de7c97150949c3d88de3f66f97f6d8f473
                              • Instruction Fuzzy Hash: A83188B9D01258AFCB14CFA9E584ADEFBF1EB49310F24902AE814B7310D375A946CF64
                              APIs
                              • PostMessageW.USER32(?,?,?,00000000), ref: 096CBB3B
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: 64203c48a4bbccc4ce45053d0e8f5719729f84ea26cefce2b9f57115675fb05a
                              • Instruction ID: e0166fc64c377111a8f871cf33a7f76cf9cc2634df3f802a74809a85fcd83b7b
                              • Opcode Fuzzy Hash: 64203c48a4bbccc4ce45053d0e8f5719729f84ea26cefce2b9f57115675fb05a
                              • Instruction Fuzzy Hash: B03188B9D042589FCB10CFA9E484ADEFBF5EB09310F14902AE814BB310D775A945CFA4
                              APIs
                              • OutputDebugStringW.KERNELBASE(?), ref: 0247A80A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: DebugOutputString
                              • String ID:
                              • API String ID: 1166629820-0
                              • Opcode ID: f53b2008dbac95696ce5506cc619e81a4fe2f9b938c2a81779483e8c80e0aa44
                              • Instruction ID: 731aff3854816d8037acbddbd11c3a2fde5cf417e73c45386b583b8e4d4031ca
                              • Opcode Fuzzy Hash: f53b2008dbac95696ce5506cc619e81a4fe2f9b938c2a81779483e8c80e0aa44
                              • Instruction Fuzzy Hash: A231ABB5D012589FCB14CFAAE584ADEFBF1AB49314F14906AE818B7310D335A946CFA4
                              APIs
                              • OutputDebugStringW.KERNELBASE(?), ref: 0247A80A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: DebugOutputString
                              • String ID:
                              • API String ID: 1166629820-0
                              • Opcode ID: 998d977e42352ee519b589f9714853d5c224c2d5b491e8fe76ba4a45caf282a3
                              • Instruction ID: 4441970a061a04370134af03104a82f8ca63bafa909352d4546115667b862719
                              • Opcode Fuzzy Hash: 998d977e42352ee519b589f9714853d5c224c2d5b491e8fe76ba4a45caf282a3
                              • Instruction Fuzzy Hash: 25319CB4D012199FCB14CFAAD584ADEFBF5AF49314F14906AE818B7310D334A946CFA4
                              APIs
                              • GetModuleHandleW.KERNELBASE(?), ref: 07005E32
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: bd96ee7f5754cb49a72b8edc9be0c3013ac792a0a0e144e4f29d89791d43bdd8
                              • Instruction ID: 87463ce6a9589a0ba94cd87d7f12079e0118fce30995d5d0d8200b0a08785d1e
                              • Opcode Fuzzy Hash: bd96ee7f5754cb49a72b8edc9be0c3013ac792a0a0e144e4f29d89791d43bdd8
                              • Instruction Fuzzy Hash: 8431A9B4D00259DFDB14CFAAD884ADEFBF5AB49314F14902AE858B7360D334A945CFA4
                              APIs
                              • ResumeThread.KERNELBASE(?), ref: 096C6D1E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: e5458a8339ee3d08d527c2857843f5568594fabd7a8ec7b184a4f1c7d0794168
                              • Instruction ID: 666ab9e6768c1f445c499c8c47c17cca05e63e29769145d24ec11a821f0adfa0
                              • Opcode Fuzzy Hash: e5458a8339ee3d08d527c2857843f5568594fabd7a8ec7b184a4f1c7d0794168
                              • Instruction Fuzzy Hash: AC31BCB4D012189FDB14DFAAE584AEEFBB5FB49310F24942AE815B7210C735A941CF98
                              APIs
                              • ResumeThread.KERNELBASE(?), ref: 096C6D1E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: 895e6a2a077607b756766e539f2ac37d749aa0406f23d19d501d7d6be6166357
                              • Instruction ID: 4fabd80f88b81d439e93f471e72f671b3f41dd6b703a6f558820d5ffa4135a69
                              • Opcode Fuzzy Hash: 895e6a2a077607b756766e539f2ac37d749aa0406f23d19d501d7d6be6166357
                              • Instruction Fuzzy Hash: 4831CBB4D002189FCB24CFAAE584AEEFBB5FB49310F14942AE814B7300C735A941CF98
                              APIs
                              • CloseHandle.KERNELBASE(?), ref: 0247A8E6
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: CloseHandle
                              • String ID:
                              • API String ID: 2962429428-0
                              • Opcode ID: ded3f0add0d0537f44bbbb0a5db4551b7735986f1f817172723ba5acda15aa09
                              • Instruction ID: 2175e73a3dadaf6b96956b5e534537a9d4b69c97575d6065c41f10533eaa2601
                              • Opcode Fuzzy Hash: ded3f0add0d0537f44bbbb0a5db4551b7735986f1f817172723ba5acda15aa09
                              • Instruction Fuzzy Hash: 4C31ACB5D042599FCB10CFA9E484AEEFBF0EB49314F24905AE814B3350C335A946CFA4
                              APIs
                              • CloseHandle.KERNELBASE(?), ref: 0247A8E6
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID: CloseHandle
                              • String ID:
                              • API String ID: 2962429428-0
                              • Opcode ID: bba6e53e7a96babcda708cf031180864526912e47d36a5680fa46d64f25ac96e
                              • Instruction ID: eac363ea62b269eae66d2795c79cdd4ea09f990011048d1acaf7e2bbdd55f1c6
                              • Opcode Fuzzy Hash: bba6e53e7a96babcda708cf031180864526912e47d36a5680fa46d64f25ac96e
                              • Instruction Fuzzy Hash: E221CCB9D04219DFCB10CFA9E484AEEFBF4AB09314F24906AE814B3350D335A945CFA4
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8e9cb3760ed32c77893dfb17118e3b791f84435db4cbbbfdb6ed673ba2bcb1b7
                              • Instruction ID: ff235669b6153a527cb2ed62049e619bd66aea7e54919d3e3b8632539d8f9ffe
                              • Opcode Fuzzy Hash: 8e9cb3760ed32c77893dfb17118e3b791f84435db4cbbbfdb6ed673ba2bcb1b7
                              • Instruction Fuzzy Hash: 4472CEB4D10F858ADBB4DF7498993AFBAE2AB55302F204D1EC4EACB251D7349441CB71
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: efeed82b9854d31e7a9021aebe0e9bcfd1b8b9148fe4ffdfc3a1a423601397c0
                              • Instruction ID: e75b6c160f93783645f4d8c0a4d5f5b26db63e169465979be57d496ef5dc6006
                              • Opcode Fuzzy Hash: efeed82b9854d31e7a9021aebe0e9bcfd1b8b9148fe4ffdfc3a1a423601397c0
                              • Instruction Fuzzy Hash: 7F124BF0915FC24ADBB49F6489883AFB6D1AB15302F204D1FC4FA8F265D7349086DB66
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f617c454f4da3b56776485a3ae168fd77d4210eeace528f72aea44efb9d9b168
                              • Instruction ID: 3792a9ec382e298fca4e5c8f1e03baa8016338fbce64b8cf6203703606c1e55c
                              • Opcode Fuzzy Hash: f617c454f4da3b56776485a3ae168fd77d4210eeace528f72aea44efb9d9b168
                              • Instruction Fuzzy Hash: 26616E35B00119DFEB14DF68E954A9E7BF7AF89712F144069E802AB391CB31DC41CBA1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 65fedfc3452826baa5a80beae77f5f81bf54c766f80736c4ed15ae542bb50b95
                              • Instruction ID: 4582d7df4e6883ca4868bf8b83102fb077136cb6838b4bc894adb294fd167774
                              • Opcode Fuzzy Hash: 65fedfc3452826baa5a80beae77f5f81bf54c766f80736c4ed15ae542bb50b95
                              • Instruction Fuzzy Hash: 6261D235A00619DFDB15DF64C440AAEBBF6EF89301F1480A9D845EB361DB35ED06CBA1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1616e627e514d90aa8815f053bb917350396bb534b926e27ee062c1e2bbd73cc
                              • Instruction ID: a3465dbd91edd02b13d932604cb516ac6cdb9dc4e2f5b74da34af4417fb6a959
                              • Opcode Fuzzy Hash: 1616e627e514d90aa8815f053bb917350396bb534b926e27ee062c1e2bbd73cc
                              • Instruction Fuzzy Hash: 8E719D74A01249EFCB55DF69D884EAEBBB2BF49325F114098F905AB361CB71EC81CB50
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7dc9e7084e931f15bbb216d8188d531407e21ec0561d566a42d4ac7e75daac29
                              • Instruction ID: af9f5b019bdbd94d9f3c1e57577b4f5ef47ce81569c467d7a1e1efe713d27ae3
                              • Opcode Fuzzy Hash: 7dc9e7084e931f15bbb216d8188d531407e21ec0561d566a42d4ac7e75daac29
                              • Instruction Fuzzy Hash: 6651ACB0700604DFDB14EB68C494BAEB7F6AF89601F10416DE90ADB3A1DB71EC45CBA5
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 38c4d1e9d356cce97702d5dc128a03630e4df9301005b233b2611be98f5f1344
                              • Instruction ID: 4a1e2176b0d6924d3647c8eb54440a9e2bb70e24e4413974d3e1d45b8ba018ad
                              • Opcode Fuzzy Hash: 38c4d1e9d356cce97702d5dc128a03630e4df9301005b233b2611be98f5f1344
                              • Instruction Fuzzy Hash: 6551E074B002058FDB10DB79D8589AFBBF7EFC5321754856AE829CB351EB309C068BA1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2ff44d324cbaaaa2a9ab95632c50f4e7ea292f8b80eadc516a14121a2e985570
                              • Instruction ID: 9ce97f16b482bcfa11747a35ae0a2a1c3990ce2eda35395e3ad3cbe2df14c91c
                              • Opcode Fuzzy Hash: 2ff44d324cbaaaa2a9ab95632c50f4e7ea292f8b80eadc516a14121a2e985570
                              • Instruction Fuzzy Hash: 0241D0B0700640DFDB15DB68C480BEEB7F6AF8A201F10416DD90ADB3A1CB71E845CBA5
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e83d4b9bf0553552b44f744c17579a892ed9ebd6fb47748472294959153e4c56
                              • Instruction ID: 366f08ed3358396150fb987a32575dad4876ace369c44a516b9984b17b7b0fbe
                              • Opcode Fuzzy Hash: e83d4b9bf0553552b44f744c17579a892ed9ebd6fb47748472294959153e4c56
                              • Instruction Fuzzy Hash: B7418CB4B145588FDB54DFA9D884EEE7BF6BF4A601F1040A9E901EB361CB70D840CB64
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d2a1ad4796cf1ea96d12ca5720c97a68fb76e3c938629869d7f5bcb5d819722f
                              • Instruction ID: bd05b4f83c8b49bf8d9b06864272e41b3597e45230671e8931fdc8859f35777e
                              • Opcode Fuzzy Hash: d2a1ad4796cf1ea96d12ca5720c97a68fb76e3c938629869d7f5bcb5d819722f
                              • Instruction Fuzzy Hash: E0414935B002299FDF059F68D856AAE77A7FF88311F148129FC0297290CB74DD92CBA1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5f8768d667f96f0746525f2d4316a6af1d800b79eb67aa7303379bd685a109a7
                              • Instruction ID: c2264354bd06b40aa152945c518d6278286e5c4366f5757fef4407184bb47b5e
                              • Opcode Fuzzy Hash: 5f8768d667f96f0746525f2d4316a6af1d800b79eb67aa7303379bd685a109a7
                              • Instruction Fuzzy Hash: A63149362093489FDB129A6494203BB7FB59F82255F18C0EFE94DCB742C63AC856C3B1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c12a8fa10fdfb28d0d80c60c1c139b3d9fa6c75d50fafbbbd2188418af66b7c7
                              • Instruction ID: 7e57cbf108337abe30a921c4a2cca101a604dbdaa1be894dd34922f6d585565f
                              • Opcode Fuzzy Hash: c12a8fa10fdfb28d0d80c60c1c139b3d9fa6c75d50fafbbbd2188418af66b7c7
                              • Instruction Fuzzy Hash: BE212A6668E3C09FCB170B309C604E63F319E5326572A84DBD984CF4A7D22A591FD3B2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3692310e0dc5bf4a201cc028c5efb3209ca7cde0b62c697b5e9c0813eef0fc23
                              • Instruction ID: 6415225579710e88e8a76b254a98579746a6ba28623a30fe4c4e159a82f13997
                              • Opcode Fuzzy Hash: 3692310e0dc5bf4a201cc028c5efb3209ca7cde0b62c697b5e9c0813eef0fc23
                              • Instruction Fuzzy Hash: E031D371A00258DFDF05DFA4E854ADD7FB2EF4A321F0440AAE841AB261C6719D45CBB5
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6bcdcf5e52efe7b6d24be4f0368c245c9a2196c5500494c153984a66eb327ac6
                              • Instruction ID: fb365f4e3d32e659b14a5986b44f4316b292aa70fbd5f247ed0c1b687ac96d99
                              • Opcode Fuzzy Hash: 6bcdcf5e52efe7b6d24be4f0368c245c9a2196c5500494c153984a66eb327ac6
                              • Instruction Fuzzy Hash: E321BD757106108FDB58EB6CD40496E73EAAFC966271540AEE91ACB370DE32DC02CBA0
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 79608b59199db778221a79f2e624779d3f782e86b5c8d313c64818891c2ee91c
                              • Instruction ID: f15ba4e783ab79d18b8cd8afe1af59020c466dd5a9af9d97af302b5435f8f19e
                              • Opcode Fuzzy Hash: 79608b59199db778221a79f2e624779d3f782e86b5c8d313c64818891c2ee91c
                              • Instruction Fuzzy Hash: 71313D70500B01CFC734DF29E84976BB7F2BF49712B108B2DD9A6866E1D730A549CBA2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 143f9a0911d2578ba41a215396e48b3a8595f5512673b2c7375c22af8dea226a
                              • Instruction ID: 27d307bd1ada746f4ed2a4f6442d0c72a4b286c65a8a8719a53219e92515ade8
                              • Opcode Fuzzy Hash: 143f9a0911d2578ba41a215396e48b3a8595f5512673b2c7375c22af8dea226a
                              • Instruction Fuzzy Hash: AE2146327002118FEB34CA65C88097F77E7EFC5321F248429D906D3B90CA38E9818771
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9d6f83cc764c0139b01cedbcb82105e4633018e99fdfcfd9d0acced6e84abae3
                              • Instruction ID: 205507fec4ba31e901ed75ab7f6abf8ecaec1a7307c9ed64e7afed189495f1f1
                              • Opcode Fuzzy Hash: 9d6f83cc764c0139b01cedbcb82105e4633018e99fdfcfd9d0acced6e84abae3
                              • Instruction Fuzzy Hash: 6331C970500B01CFC734DF29E94976BB7F2BF49712B108B2DD9A6866E1D730A549CBA2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4b20566af2dfed3492593208e91a8bb1045aedcae6aa381b9bfb6036f9d09e3d
                              • Instruction ID: 36e784a27e11036c64c2014b6d17f0e0a2e23c275259a77c66f988dc56aebd25
                              • Opcode Fuzzy Hash: 4b20566af2dfed3492593208e91a8bb1045aedcae6aa381b9bfb6036f9d09e3d
                              • Instruction Fuzzy Hash: ED1124B9B003054FDB11DB3998948BB7FF7EEC4261344056AD864C7341DF3199068371
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a30f19036c7bd3fe1a9e6f201314c8f996d77c32a6687bf95f8c6d919f410bfe
                              • Instruction ID: a6d7fc5e58b9b567c90bb41902665b4082438179cc44968d71f27deb11fa4cb8
                              • Opcode Fuzzy Hash: a30f19036c7bd3fe1a9e6f201314c8f996d77c32a6687bf95f8c6d919f410bfe
                              • Instruction Fuzzy Hash: 3D216035B44205CFCB20DFA8D484AAE7FF6AF45211F1540AAE909DB362D734DD41CBA1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ad1b67046e451320c91d16e806c15c28f785f2326d111386a6f9c70c12a3affa
                              • Instruction ID: 0c81486e0e50a704ba94700afc4ab82d634ed60d5e91056424c401dbac99d0e7
                              • Opcode Fuzzy Hash: ad1b67046e451320c91d16e806c15c28f785f2326d111386a6f9c70c12a3affa
                              • Instruction Fuzzy Hash: F1210536B026049FEB21DB28D840EEB7BA6EFD57627058466E414CB235D6719C06CBA0
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412065106.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c3d000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0797b6e7a016a87f35191ebe4bf37dff48393bae93d2735473ed6ce3ad19e7f4
                              • Instruction ID: 538184849d8f8160de496b2dea82b29f2ae2beecc90469287944fe2c87ae340f
                              • Opcode Fuzzy Hash: 0797b6e7a016a87f35191ebe4bf37dff48393bae93d2735473ed6ce3ad19e7f4
                              • Instruction Fuzzy Hash: 6C21F2B1514204EFDB15DF10E9C0B26BBA5FB84314F24C5ADE84A4B296C377DC46CA61
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412065106.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c3d000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 97ca99d344226dd73e2e48e57863f553a3d70e1d3c14c83b84f4949f12fdb4b9
                              • Instruction ID: 7ae09ccfecbd0ebcf0978420835fdd48c01a2634e8fb33c661a128feca23c4b2
                              • Opcode Fuzzy Hash: 97ca99d344226dd73e2e48e57863f553a3d70e1d3c14c83b84f4949f12fdb4b9
                              • Instruction Fuzzy Hash: 482122B1604300DFDB18DF20E9C0B26BBA5FB84714F24C56DE84B0B286C33AD847CA62
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 98317bb9624392b5bc3f6f8af8f8faa16cef552e1299ca48ce932005cedd7fa1
                              • Instruction ID: 70c08b33b005403af2cf1ea360f2cac980567f03327721526ff27a2b00b85233
                              • Opcode Fuzzy Hash: 98317bb9624392b5bc3f6f8af8f8faa16cef552e1299ca48ce932005cedd7fa1
                              • Instruction Fuzzy Hash: 6D217C35700A40CFCB608F14D580AAB77F7EB85721B21446EEA8687752D731E842CBA0
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a0a6830d70fa2d5035af4da55111d3563d022c6a70fc11385524c7302256315a
                              • Instruction ID: b7f42baa77e6945607427cd882f4bb5f9fb18c6889e40f09843769778be3127b
                              • Opcode Fuzzy Hash: a0a6830d70fa2d5035af4da55111d3563d022c6a70fc11385524c7302256315a
                              • Instruction Fuzzy Hash: 00215876700A14CFCB649E19D580A6F73EBFB89722F20442EEA4687751D771E8428BA0
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5d3764a94de23d63be040749f9b76d5b2f199846d36a03791096eb90eb3246ef
                              • Instruction ID: 4193d6076dab5ad79db6167c3c2c3ef0219e5534a9bfed65957a2b16771c64c1
                              • Opcode Fuzzy Hash: 5d3764a94de23d63be040749f9b76d5b2f199846d36a03791096eb90eb3246ef
                              • Instruction Fuzzy Hash: 0F212971E0020A9FCB05DFA9C8449EFFFF6FF99210B11865AE414E7215E770A942CB90
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412065106.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c3d000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8a9c75af66b5b4aa0b80b5770139a1ed2550fdbdf0932c2e0aca7ef3d5948681
                              • Instruction ID: f41a7aaaf6a1bdb1481f31d8fa127ec516e90349839771366197e801f754300f
                              • Opcode Fuzzy Hash: 8a9c75af66b5b4aa0b80b5770139a1ed2550fdbdf0932c2e0aca7ef3d5948681
                              • Instruction Fuzzy Hash: 912180755093808FCB16CF24D990715BF71EB46314F28C5EAD8498F6A7C33A990ACB62
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8b0b6fa56a1dc7946f035c2bf937c660e6a3af1503b568714c0d02e7d80b35c3
                              • Instruction ID: 4e6840ea06b7931c4f97ed3ffbfb0453968de6dfac6f69c198a53868265722b7
                              • Opcode Fuzzy Hash: 8b0b6fa56a1dc7946f035c2bf937c660e6a3af1503b568714c0d02e7d80b35c3
                              • Instruction Fuzzy Hash: 3C21CC71E0020A9F8B04DFADC8448EFFBF9FF99210B11865AE518E7215E770A952CB90
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: da3c94e2809f654603bfe33a9d28aef6f160f9f04d1eda05216b2492f6884a92
                              • Instruction ID: b6eaafaaf42893456e14ae88a56280584fb89ece787d6f8113f3ee58a4b5a0b2
                              • Opcode Fuzzy Hash: da3c94e2809f654603bfe33a9d28aef6f160f9f04d1eda05216b2492f6884a92
                              • Instruction Fuzzy Hash: ED11ACB5A4A3989FCF02EB74E8551DC7F71EF46311B2086D6C845DB262DA341E48CBA2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5bf5460ae4cd1da4e97d2014e9b44884ca85bff8a0b36fb98016aafb727bc938
                              • Instruction ID: b99ca9414618f4fc5f9a5e6331d2b106a5cd42a01c0bd36906542f3c93fdc135
                              • Opcode Fuzzy Hash: 5bf5460ae4cd1da4e97d2014e9b44884ca85bff8a0b36fb98016aafb727bc938
                              • Instruction Fuzzy Hash: D3114C71B002098BCB54EBB9A8106EFBBF2BF98311B604179C915E7354EB329D05CBA0
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3e77d4d05d8ef10a3a5bcdce11c3d81cc30deefb359693e0cb69c0564340627c
                              • Instruction ID: 20fb37c28a13568f2eada1c4649127fa7a30e8d15859ebde7c36e17c2e34f5a3
                              • Opcode Fuzzy Hash: 3e77d4d05d8ef10a3a5bcdce11c3d81cc30deefb359693e0cb69c0564340627c
                              • Instruction Fuzzy Hash: F711043211A3C49FCB138B68D8915967FB9AF43220B4E85CBF4C8CE553C6258999D732
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412065106.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c3d000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                              • Instruction ID: 6f55cef1069585043308e2addee87ebd20b629b55879363dc1272974dd0ce37e
                              • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                              • Instruction Fuzzy Hash: D7118B75504280DFDB16CF10D5C4B16BBB1FB84314F28C6AAD84A4B696C33BD95ACB61
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bd64167256a5b81951fcbb28ccbfe0a60772192595a825d1cacff844bed575f8
                              • Instruction ID: 0c9fa20cc84920baacdea46a4870989db27aee37371930354380169e063f9e10
                              • Opcode Fuzzy Hash: bd64167256a5b81951fcbb28ccbfe0a60772192595a825d1cacff844bed575f8
                              • Instruction Fuzzy Hash: D201DB753006548B9B19BB39D454B7F7397BFC5911704406DE94287390CF759E0183EB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5bc966dd94d95300b00e23edb0ade7ec87957daff3197dff0752452c947e5d82
                              • Instruction ID: 49bb7e72f945b577162354cb04df1977c72c9dacdea40292f9ee803dcacb87e2
                              • Opcode Fuzzy Hash: 5bc966dd94d95300b00e23edb0ade7ec87957daff3197dff0752452c947e5d82
                              • Instruction Fuzzy Hash: A901F530201301CFCB19D719E81092773AAAFC6222714C86FD909CBB63CB71DC42CB61
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 51ce6cb76ef6510f7cb294480a19d42337f6203fbcc1d440407427f071832716
                              • Instruction ID: f7fe55ff152154dfcd83558ee37a78764d9401aadb9b300d5630b26e51031f2b
                              • Opcode Fuzzy Hash: 51ce6cb76ef6510f7cb294480a19d42337f6203fbcc1d440407427f071832716
                              • Instruction Fuzzy Hash: 8401A2303052148BDB59AA26D400B2B73DBAFC5611B54C57DD80A8B341CF70DC0287A1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412003826.0000000000C2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c2d000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6e9061320acf43821f20aa936db172305347d7b69c447a4d290cebd4ed542e8a
                              • Instruction ID: 79aa3a0af761e71e5ca504084d3f5fd2dc1527fe84c4c569be0d5e4f5eab80e6
                              • Opcode Fuzzy Hash: 6e9061320acf43821f20aa936db172305347d7b69c447a4d290cebd4ed542e8a
                              • Instruction Fuzzy Hash: 36017B710083509FF7208F12EC84B66BB98DF52724F28C42AED1B4F68AD27D8840CAB1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a6a589ed7d65fd60a781c348ef77c6ec7479175614c3d6feabac0bf98cbdf37d
                              • Instruction ID: e30153a69fafd77ced2a5226cb9076009cf3d6b1a0b580e9dff37ee33e932d08
                              • Opcode Fuzzy Hash: a6a589ed7d65fd60a781c348ef77c6ec7479175614c3d6feabac0bf98cbdf37d
                              • Instruction Fuzzy Hash: B301D4342052519FCB25DB69D450AA6B7F6EF86221B24C1AED849CB362CB71DC47CB70
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b38830106bd544fc10d8b85646c0c30fda24df197c1273883d71622567cb40fb
                              • Instruction ID: ec29181a4d40229b099190766b3dc7e3ead43095a591d6e0d62d5c6c7bbb53c3
                              • Opcode Fuzzy Hash: b38830106bd544fc10d8b85646c0c30fda24df197c1273883d71622567cb40fb
                              • Instruction Fuzzy Hash: 65018F31705314CFDB19AA25E410B6AB3ABAFC1215B18C56EC8099B791DB71D907CBA1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 64b47519c46dfac4088cb3ec7d5e1ed6af2d003dc06836f6265a7bc6577e2cc5
                              • Instruction ID: fe603d6b345ba607f25b353039197aa20b041d711c36086483ff8d4bccf68c51
                              • Opcode Fuzzy Hash: 64b47519c46dfac4088cb3ec7d5e1ed6af2d003dc06836f6265a7bc6577e2cc5
                              • Instruction Fuzzy Hash: 36F0B4727442645F9301866AEC44DABBFEEEBC96703114076F908CB352D9319C0587F0
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 113791689e53b7d4dedb88d914237574335e7ec3a163bd2f849ab62a76837634
                              • Instruction ID: 302133329537502c93302ba2dc96b42b74b1ab999ce261cb11879361caddaa3d
                              • Opcode Fuzzy Hash: 113791689e53b7d4dedb88d914237574335e7ec3a163bd2f849ab62a76837634
                              • Instruction Fuzzy Hash: FE01F970D182989FCB25CB69D8C49DEBFF2BF4A214F148199E850E7361C6368442CB10
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c460e498271f61840d79aad986a8f35ac39812982b46ef7863d5b238b464cfaf
                              • Instruction ID: f81db7ab6f71f077c2d1b00ae57ec91609121fa189a6d60a84d575b79493b5f1
                              • Opcode Fuzzy Hash: c460e498271f61840d79aad986a8f35ac39812982b46ef7863d5b238b464cfaf
                              • Instruction Fuzzy Hash: 7B016D30301211DFCB64DB69D444E66B3EAEF89211B54C56ED80AC7321DB71ED42CB60
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f3e622fde65bf06535975414fb269120a4f7f8c2d31032fa30bd6d7b09b44c0d
                              • Instruction ID: e835dae756effd8277ee4e1eb57a73777608cace220d709fd9bdb9d933e38d03
                              • Opcode Fuzzy Hash: f3e622fde65bf06535975414fb269120a4f7f8c2d31032fa30bd6d7b09b44c0d
                              • Instruction Fuzzy Hash: 7501F732604A409BEB368E24C8807AE3BD3EB89314F08445EE599C2561C776A8158751
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 504ee55e44f56b795bd63222f029e5095604637394b5232d59ad0fbb7a527ddd
                              • Instruction ID: cc0833905c9b90fa7efd72fa97d6ba303f052a798b04169b33520e8c77517169
                              • Opcode Fuzzy Hash: 504ee55e44f56b795bd63222f029e5095604637394b5232d59ad0fbb7a527ddd
                              • Instruction Fuzzy Hash: 56016D30201211CFC768DB69D844E16B3EAEF85221B65C96ED909C7762DB71EC42CB60
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2175e8132e786c9344afe6ac014df194cba4e11349345f10f89bf1d751300437
                              • Instruction ID: fae626830ebde763943e0cde4fa1d7ab1bfd8f89ef0cc03e057c353cce3f5990
                              • Opcode Fuzzy Hash: 2175e8132e786c9344afe6ac014df194cba4e11349345f10f89bf1d751300437
                              • Instruction Fuzzy Hash: 8CF0F6F63002046BD7015E6A9890BBF7A9BDFC9250B048416FA4AC6651CD74DC5193B1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5c1e0f25e33a77408aaf6e8e037886d9f78beb6b229c51b5a9a5b989460040aa
                              • Instruction ID: 6f29e41ea6242b77df0eb5727d9d3ecfe383db1fb2ce1da087a693e072ae2011
                              • Opcode Fuzzy Hash: 5c1e0f25e33a77408aaf6e8e037886d9f78beb6b229c51b5a9a5b989460040aa
                              • Instruction Fuzzy Hash: 02F0F632600A049BDB35CE15D880AAF7BD7FB88714F14842EF95AC3210CB36E8018760
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 18b6f0c78f0125fee9e7ee94b2e9c98e4a7afb1b112f1ff0dffa2dd8e04db2e4
                              • Instruction ID: d0e58be082f4c3e83127786ddf585e86a4e6dc63546687798284cc80078f4253
                              • Opcode Fuzzy Hash: 18b6f0c78f0125fee9e7ee94b2e9c98e4a7afb1b112f1ff0dffa2dd8e04db2e4
                              • Instruction Fuzzy Hash: 8001BCB4A05258DFCB05EBB4E45519C7FB2EF46300B2046AAD805E7352EB341E48DB96
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412003826.0000000000C2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_c2d000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0278c1248fd49be4482bd516279b4b9de68b9b78af1fbbd5f2508bf8734368a7
                              • Instruction ID: 45a0cd2c642d604f51c03de19e4acf2d728f7a23d17a3c26377eb6044154e278
                              • Opcode Fuzzy Hash: 0278c1248fd49be4482bd516279b4b9de68b9b78af1fbbd5f2508bf8734368a7
                              • Instruction Fuzzy Hash: CBF0C2714083409EE7208E15D884B62FB98EB91734F28C45AED594F68AC2799844CAB1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3a83d49fc269231c450979094c8e9c687e7a76d8d7c40705cd38c4cdd09f1154
                              • Instruction ID: 0cade8616fd93f177ca05ae2e4ba7b37d0b2d4dd16a444af39152436af1add4e
                              • Opcode Fuzzy Hash: 3a83d49fc269231c450979094c8e9c687e7a76d8d7c40705cd38c4cdd09f1154
                              • Instruction Fuzzy Hash: 49F06D719112498FDB91DF68C8417AE7FF1EF05205F0889BAD014D7652E638860A8B40
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 62c4f464a1d4f7f413b171fb758d65ad7d9b082bef0668518fb9356261612b9e
                              • Instruction ID: 661a3feb42fcee0cb3940c619c58c2ed7368ad1531e3d3500d53dd3993fae9f2
                              • Opcode Fuzzy Hash: 62c4f464a1d4f7f413b171fb758d65ad7d9b082bef0668518fb9356261612b9e
                              • Instruction Fuzzy Hash: E2E03976B002286F93149A6AE884D6BBBEDEBCC660321807AF908C7311DA319C0186A0
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e0ddb1e48034a31f907615365df3d1c1867f33c1860e9070edbf56e348caf611
                              • Instruction ID: b56880f60c88ac701924714f05682c74f31381cc8f7b8b66f6790d7ac2314530
                              • Opcode Fuzzy Hash: e0ddb1e48034a31f907615365df3d1c1867f33c1860e9070edbf56e348caf611
                              • Instruction Fuzzy Hash: BAF03CB4A01219DFCB44EFB8E44955C7BB1FF84300B6086A9D806D7351EB745E44DF96
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6e3b342fe135d0ad2de522acfad6cc9c9d44185ea4d44d14e7b91e314e5118cb
                              • Instruction ID: 1de199526ae4a38742f445b360c9fa84f7528dce9d5a4fd4de68ba055995bb26
                              • Opcode Fuzzy Hash: 6e3b342fe135d0ad2de522acfad6cc9c9d44185ea4d44d14e7b91e314e5118cb
                              • Instruction Fuzzy Hash: ADF03A7691010D8FDB90DFA8C8417ADBBF1EB04201F4485BAD418D7641E6389A058B81
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0f72c65e45685e020ce3c1134ae32216a8ac5056056a153b4d674cf1d53094df
                              • Instruction ID: 0c812b979f7287135d66da9dae31618776047eaca38ba84ec6df230546579ccb
                              • Opcode Fuzzy Hash: 0f72c65e45685e020ce3c1134ae32216a8ac5056056a153b4d674cf1d53094df
                              • Instruction Fuzzy Hash: 20F058B9E0420CBFCB02CBA4D8454DEBFB9EA45311B2081E6D805D2221EA301A06DB92
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a730f3e1b3d49f1cea4c7ecde77b0f4fb4b7da438b3b868886585a3fa2d18195
                              • Instruction ID: fa31f65851ba6b946d2eeb0394423e459d50ae3bef03fb8c94ec0197ecb6cb70
                              • Opcode Fuzzy Hash: a730f3e1b3d49f1cea4c7ecde77b0f4fb4b7da438b3b868886585a3fa2d18195
                              • Instruction Fuzzy Hash: 91E0E535605244DFCB211671B84C6DBBFA8DB07261F0040B7EE0187052C6388559C6B1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fbb5461af5cb975b621467cb6045c38d2e428a22cd31ffad0539827870c56a11
                              • Instruction ID: e49153d68e7bf57693ea234260eb3704cda6de3117c02b8e2153bf3971f09f2d
                              • Opcode Fuzzy Hash: fbb5461af5cb975b621467cb6045c38d2e428a22cd31ffad0539827870c56a11
                              • Instruction Fuzzy Hash: 9DF0A0363022099FD714AF29D840EAA3BAAEF853513104429F5048B224CA719C12CF90
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6bc912d79c37de18b73791635a5ca98274f522262ef5249c8421d8ec489d238e
                              • Instruction ID: 267cd626cc977574e9192b045620ba72d2fffbc876cefa3e46022e7d33c597a9
                              • Opcode Fuzzy Hash: 6bc912d79c37de18b73791635a5ca98274f522262ef5249c8421d8ec489d238e
                              • Instruction Fuzzy Hash: 00E06D376419208BCB81EF4CF4814B6B3F9E784A7B328805AF80C8A611D227D862D798
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0ca136505dd2da5cecdabbb4a672ebae7ad464033b28c9343da5ecde5831e742
                              • Instruction ID: e3a1851e2992466c38cd9e13c96578749b8929ff252d8dc2e1c6c2e8b994aab5
                              • Opcode Fuzzy Hash: 0ca136505dd2da5cecdabbb4a672ebae7ad464033b28c9343da5ecde5831e742
                              • Instruction Fuzzy Hash: 13E02BB22087800BD307923CE45044EAB92AED2110344899BC0858B163DA605C0643E9
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a5d571919994548aefd719f9d56172ae5f648981e1ecaab71c877dcbfce11776
                              • Instruction ID: bf5bed15e19b270516012f6079f57ef7bbb8e1b094d9bd435148077cc1903148
                              • Opcode Fuzzy Hash: a5d571919994548aefd719f9d56172ae5f648981e1ecaab71c877dcbfce11776
                              • Instruction Fuzzy Hash: 13E092322001486BCB019E59E800E9FBBEEDFC9351F048516F959C3211CAB59821A7A1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d386fef27f8240f646259619a3cb3c4626c52a04e33d608060772854b8f061c8
                              • Instruction ID: ee9d00a5e813fd35d916a8bdab45aa352e01156647f78f6876f5651d36414aca
                              • Opcode Fuzzy Hash: d386fef27f8240f646259619a3cb3c4626c52a04e33d608060772854b8f061c8
                              • Instruction Fuzzy Hash: 83E0866B10E3906FE643673C94B06DA7FA1DE5311574984DBC5D64B4378411844EC7BB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a96ea3c8d1cd97c5690c85b34b5d16db677ba404080d6dd713aa625258bcd670
                              • Instruction ID: 68aeb8436f38ca5a2d1ecfc359810cbb46a61594f685754d1d0fd05691bacaa2
                              • Opcode Fuzzy Hash: a96ea3c8d1cd97c5690c85b34b5d16db677ba404080d6dd713aa625258bcd670
                              • Instruction Fuzzy Hash: E3E0D8354006A49FD351574CD4C47D2BBE5EB01312F06419BEC88CB802C7A4ACC68FBD
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a5eabef5f74e04b3365d0a133627ed65aed7258f7fee4cb272dc26708d0a0627
                              • Instruction ID: 5905a075589b9fda7c6805b3daf294a05c02864bf14ab141452a04a1d094b493
                              • Opcode Fuzzy Hash: a5eabef5f74e04b3365d0a133627ed65aed7258f7fee4cb272dc26708d0a0627
                              • Instruction Fuzzy Hash: 38E07E75E0020CEFCB44DFA4D9858DDBBB9EB48200F2082AAD809E2254EA346B55DF81
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b7f3ff1130f2d2083e4168f60700b1d9b3d34d7c507667077eb9150a4db19a78
                              • Instruction ID: 311240f7a60bf9d4c7e5ffa4a1cdfe5c794efd5c8f2f14420e70f3a766791629
                              • Opcode Fuzzy Hash: b7f3ff1130f2d2083e4168f60700b1d9b3d34d7c507667077eb9150a4db19a78
                              • Instruction Fuzzy Hash: 64E0C236345340EECB439B74C400D933F615F57224705D487E9488F087C2235853DB21
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7e4d8065684493a4da590e0b0803d07af09ed4b95dfe43124c7cb7d3347366b9
                              • Instruction ID: 189fdfb40b361687dcadb390fa75b9f81cfbb5c94312242bce1140f30cdd5c0f
                              • Opcode Fuzzy Hash: 7e4d8065684493a4da590e0b0803d07af09ed4b95dfe43124c7cb7d3347366b9
                              • Instruction Fuzzy Hash: EAD0A73944F3C10FD317D63084210D7BF60FE6332070551DBC4C089062D905049BC7B2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d6f8324e608684acca7ec6eb1da3e7e8dd02798accb5348f14c00993c1f2595e
                              • Instruction ID: 7dbc92824e24d18caa280eeedd8c39a122754c4c9fc5312193652fde4b28076a
                              • Opcode Fuzzy Hash: d6f8324e608684acca7ec6eb1da3e7e8dd02798accb5348f14c00993c1f2595e
                              • Instruction Fuzzy Hash: C2D0223B009244DEC7134B90D8008C2BFB2AF9360030684D3D0848F873C232941FCBB2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a92dad7970837a6abc52aef05ca23ade9b804fa83c8b4d97848e59174019c644
                              • Instruction ID: e98ca826328e3133bc5b050861218b73f68ffd96a9bc7bde8d27070b6949d335
                              • Opcode Fuzzy Hash: a92dad7970837a6abc52aef05ca23ade9b804fa83c8b4d97848e59174019c644
                              • Instruction Fuzzy Hash: 69C0123A200208EFDB80AA98C800D967769AB48610F60D005BA080E201CA72E862DBA1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e7900bb123616f43fc0e6b31d072d141ab33ee44cf9b071953c0e5df5afe2ca6
                              • Instruction ID: 39f1f92ef427224b06736102811c0af715bf9138f2617250c85d9730b625f152
                              • Opcode Fuzzy Hash: e7900bb123616f43fc0e6b31d072d141ab33ee44cf9b071953c0e5df5afe2ca6
                              • Instruction Fuzzy Hash: D4C0023B040108EFCB425F80E908C95BFAAEB48310705C491F6494A032D772D974FB55
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 49f70d5456acf01ee7b80d249705534842aab217576cbfbc1c4e2470541fb916
                              • Instruction ID: 4b568b184ad9dec5506f1a322914436417747e8cedeab3541c4b7dc2c38d68c0
                              • Opcode Fuzzy Hash: 49f70d5456acf01ee7b80d249705534842aab217576cbfbc1c4e2470541fb916
                              • Instruction Fuzzy Hash: 0EC00236544208BBCB026A85D801E59BF2AAB59694F248059FB080D161DA73D566AB91
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 893909e4d6cbf7c25c23050510a8bc549b446fc122c260763a1bd6647bf95450
                              • Instruction ID: ab0ebb50f06ddf7de75522dfd395c961d87084f308c703973bd2200386f3a39f
                              • Opcode Fuzzy Hash: 893909e4d6cbf7c25c23050510a8bc549b446fc122c260763a1bd6647bf95450
                              • Instruction Fuzzy Hash: 84C08C3504A2808EE706AE70A4523C23F326B02320F9200C7C080DF4A2C72808998322
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1d6f2623337c38ef8749255ff78b3cbedb78fba73e040c9434c39499d8169e63
                              • Instruction ID: 61412fa5721fa0801f19765b42d0f6ac58f054d2697597a3f249e516f761f0d5
                              • Opcode Fuzzy Hash: 1d6f2623337c38ef8749255ff78b3cbedb78fba73e040c9434c39499d8169e63
                              • Instruction Fuzzy Hash: 87C00235140108AFC740DF55D445D95BBA9EB59660B1180A1F9484B722C632E9119A90
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID: .-R$$W=4$$W=4
                              • API String ID: 0-540855882
                              • Opcode ID: 8953533b649b5f0192587895b8aec048b6c2791c342baf90077c1047608412c3
                              • Instruction ID: 7f053fbdcbb58f3dd3244ad9b241be210b70f0235ed6ce013640719aab8633ea
                              • Opcode Fuzzy Hash: 8953533b649b5f0192587895b8aec048b6c2791c342baf90077c1047608412c3
                              • Instruction Fuzzy Hash: 8E41CCB4E0520ADFCB44CFA5C5415EEFBF2BF89200F64D46AC915AB214E7349A41CF94
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID: =2$Yo`
                              • API String ID: 0-205785930
                              • Opcode ID: cb3b18498381753a42c4d9d7afecf333ccaeb0fd89092ebc8036ef1822b77c7c
                              • Instruction ID: 17e9f041d12900d2e281dd808fbe72f325d5b54480a21405a6feb8923b4c6ea7
                              • Opcode Fuzzy Hash: cb3b18498381753a42c4d9d7afecf333ccaeb0fd89092ebc8036ef1822b77c7c
                              • Instruction Fuzzy Hash: 4071C4B5E152098FCB04CFA9C5819DEFBF2FB88210F64942AD815FB218D7359A42CB65
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID: =2$Yo`
                              • API String ID: 0-205785930
                              • Opcode ID: 0d3c116380cfd08a03ab0911f6baaf8d0020481e702d796b3066de7a20aa7faf
                              • Instruction ID: 0deb5a7f39a921ab609e6bcc4cab658eb858fe0a606cf099abf58ac9b0fd8b31
                              • Opcode Fuzzy Hash: 0d3c116380cfd08a03ab0911f6baaf8d0020481e702d796b3066de7a20aa7faf
                              • Instruction Fuzzy Hash: DF61C4B1E152098FCB04CFA9C5859DEFBF2FB88310F64942AD815FB218D7349A46CB65
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID: .-R
                              • API String ID: 0-1152517660
                              • Opcode ID: 0fe7f3d088cb99a1c6a3002d3d4a282e92849869b0bcb0d3df4302b77c2b3f86
                              • Instruction ID: c004b1d855bd58fb422ff1de6d1def96c2e65a9f158fefc04deb93b3f07fcc9c
                              • Opcode Fuzzy Hash: 0fe7f3d088cb99a1c6a3002d3d4a282e92849869b0bcb0d3df4302b77c2b3f86
                              • Instruction Fuzzy Hash: 5D41ECB4E0520A9FCB44CFA5C5815EEFBF2BF88300F64D56AC915AB214E7349A81CF94
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 86864511f9c75047f5cff5eb301a3689f4ad2960773e60bf847f3caf3aa7ba7c
                              • Instruction ID: 7a7c6c0ac5f40f3f5e48adb7735c4ce1f66d732bf039125c9e96351f12a193fb
                              • Opcode Fuzzy Hash: 86864511f9c75047f5cff5eb301a3689f4ad2960773e60bf847f3caf3aa7ba7c
                              • Instruction Fuzzy Hash: 7112F3F8C817458BE39ADF24E8882887BA1F745328FD44A48D2651B2D0E7F5156EEF4C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b1d63a98e8bdbf8bb98779d172fe6b80f51a7423f55a54890cbe2dc6d65ab61a
                              • Instruction ID: 337248d203d51625c2bb1c42a34793b4754f30e4cfb23f7ffbd630c3d11f252a
                              • Opcode Fuzzy Hash: b1d63a98e8bdbf8bb98779d172fe6b80f51a7423f55a54890cbe2dc6d65ab61a
                              • Instruction Fuzzy Hash: 79E11AB4E042198FDB14DFA9C580AAEBBF2FF89301F248169E445AB355D734AD41CFA1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d85367ed25400d9f71640062bea2c3557c947a04dc0b987a50378c5356893f61
                              • Instruction ID: 3e71ea884e8ffb4dfdddab4966a18122a3d796e4918451211508b8bdabffb485
                              • Opcode Fuzzy Hash: d85367ed25400d9f71640062bea2c3557c947a04dc0b987a50378c5356893f61
                              • Instruction Fuzzy Hash: ADE12BB4E002198FDB14DF99C580AAEFBB2FF89300F248269E455AB355C734AD41CF61
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 914008b47c6ea725233ab3c5179c3dec60e17fbc8b1a77d03161befe9d07985f
                              • Instruction ID: 00cab0b09bf466d1b50856bcf60744c302305bd32444598c6f2c12ce9d158f06
                              • Opcode Fuzzy Hash: 914008b47c6ea725233ab3c5179c3dec60e17fbc8b1a77d03161befe9d07985f
                              • Instruction Fuzzy Hash: 72E11BB4E042198FDB14DF99C980AAEFBB2FF89300F248169E455AB355D734AD41CF61
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 214e228b2f3397d062f1ecc2a54f9e40e60983029dd2186311084c4908365ebd
                              • Instruction ID: 2c984b7862c7bd466528b6d59e7f725fa28cc2b74f8200db0582bf787c02e26d
                              • Opcode Fuzzy Hash: 214e228b2f3397d062f1ecc2a54f9e40e60983029dd2186311084c4908365ebd
                              • Instruction Fuzzy Hash: 3BE108B4E002198FDB14DFA9C580AAEFBB2FF89305F248269E454AB355D734AD41CF61
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2270ab7ffe7a63bd84c2c7ab89f572875fe0f6f0e10953647f9d3997cc035f3f
                              • Instruction ID: bd2438d17762a2d6e9143bf4ea0051677ce4a0df773867aa77d3ac42bd66dfe4
                              • Opcode Fuzzy Hash: 2270ab7ffe7a63bd84c2c7ab89f572875fe0f6f0e10953647f9d3997cc035f3f
                              • Instruction Fuzzy Hash: 6DE11AB4E002198FDB14DFA9D590AAEFBB2FF88305F248169E444AB355CB34AD41CF61
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ab0a187062c03d78cdda272ec25c4ba4582ba2f7364dfef85da373dbc3efd730
                              • Instruction ID: 8a8c2588b1faa23a47e995235b77e30c36aa85671a614ac99378f34ea4664364
                              • Opcode Fuzzy Hash: ab0a187062c03d78cdda272ec25c4ba4582ba2f7364dfef85da373dbc3efd730
                              • Instruction Fuzzy Hash: AAD1E571D2075A8ACB10EB64D95469DB7B1FFDA300F508B9AE04A77211EFB06AC4CF91
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: deff142c5539fff7b4dbe6a4990fed42e085a1bb691f7864c33756e82b0e10fb
                              • Instruction ID: 46b650dde9b142e5a5b4f609744bdee23e85b7d7d58272a546707b3298e729a8
                              • Opcode Fuzzy Hash: deff142c5539fff7b4dbe6a4990fed42e085a1bb691f7864c33756e82b0e10fb
                              • Instruction Fuzzy Hash: 31A15DB2E00306CFDF05DFA4C8445DEB7B2FF85310B15866AE805AB2A1DB71A955CB90
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9219665ad294eb95e3a7066f4b8d7bb556a8e4f110f296e50e42ad373789eb7d
                              • Instruction ID: 0182243fceb7ead1adf7be4eab7f2c2fb4282e073b498c4efa759f58792dd8cb
                              • Opcode Fuzzy Hash: 9219665ad294eb95e3a7066f4b8d7bb556a8e4f110f296e50e42ad373789eb7d
                              • Instruction Fuzzy Hash: 1DD1E575D2075A8ACB10EB64D99469DB3B1FFD9300F508B9AE04A77211EFB06AC4CF91
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 704d7d08b32e6f34a09c467a61958137ac07067131134ca9ea8901159c1758d0
                              • Instruction ID: 1cf8d9a3f72dc3323b4120b17e42f8791900089354a712d4f157c5ac0f17c12a
                              • Opcode Fuzzy Hash: 704d7d08b32e6f34a09c467a61958137ac07067131134ca9ea8901159c1758d0
                              • Instruction Fuzzy Hash: 95C146F4C817458BE79ADF24E8882897BB1FB85324FD44B48D1612B2D0E7B5146EEF48
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a534410a7aa57a02bfa586eeb79b67392f91df5825fbfbae2a8f61751be1bfaa
                              • Instruction ID: 1cbc915217e4bde56d6d9ec961abf2c77285d6d657333bbe0ceeba1b24159d8d
                              • Opcode Fuzzy Hash: a534410a7aa57a02bfa586eeb79b67392f91df5825fbfbae2a8f61751be1bfaa
                              • Instruction Fuzzy Hash: E581E074E14219CFCB44CFA9D5849AEFBF1FF88310F14956AD529AB620D334AA82CF50
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 34a4fe6fa88c8e4f9cf4f5e3105b8b4aeb24a4e869f116f58a1a06cae7c7e158
                              • Instruction ID: 458addbfb98bb77e5391194f31f182d539367572f85258c5250e8b96b1536fdd
                              • Opcode Fuzzy Hash: 34a4fe6fa88c8e4f9cf4f5e3105b8b4aeb24a4e869f116f58a1a06cae7c7e158
                              • Instruction Fuzzy Hash: B7810F74A14209CFCB44CFA9C5849AEFBF1FF88310F14956AD529AB760D334AA82CF50
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d20088d6b409ebae19eee21ce643ed17a1197a6be5a03ab28b7f6e2ac598b81a
                              • Instruction ID: 32bf211d54ea6c589362ca1f6169d4b001d9dc798b2284b3180b64b6ed698903
                              • Opcode Fuzzy Hash: d20088d6b409ebae19eee21ce643ed17a1197a6be5a03ab28b7f6e2ac598b81a
                              • Instruction Fuzzy Hash: D871E674E0520ADBCB04CF99D4819EEFBB1FF88310F14956AD925AB314D3749A86CF94
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a46ad880b53eaf3a5daad3bdaaa2ebf1832c76815f50ca48b72edbb47253290a
                              • Instruction ID: 52f395866fc7d79bc47463c57a490f0ffaf05b2fc8d132814a8cb0e970c271ff
                              • Opcode Fuzzy Hash: a46ad880b53eaf3a5daad3bdaaa2ebf1832c76815f50ca48b72edbb47253290a
                              • Instruction Fuzzy Hash: 0D71D1B4D0424ADFCB04CF99D584AEEFBB2FF48310F64955AD825AB204D334A982CF94
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 91480cc48d1040f53f406f392c0198e75db5f4ecd5351a60af60a37e629c0499
                              • Instruction ID: 2ae7c2713c611d11578e9b332fb4055507d731d1d7253f6781bcb9a2749b4422
                              • Opcode Fuzzy Hash: 91480cc48d1040f53f406f392c0198e75db5f4ecd5351a60af60a37e629c0499
                              • Instruction Fuzzy Hash: 9B61F274D0424ADFCB04CF99C585AEEFBB2FF48310F54956AD925AB210D330A982CF95
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 72d6146f549b38dd426efe214d09f6cd0c4d15f439b45205e1658c260630bc1e
                              • Instruction ID: 8759bce5538edc83d28cca02c99b3c640c1d712bdd125811a434a3818ca14833
                              • Opcode Fuzzy Hash: 72d6146f549b38dd426efe214d09f6cd0c4d15f439b45205e1658c260630bc1e
                              • Instruction Fuzzy Hash: 57514D70E152199BDB14CFA9D980AAEFBB7FF88200F24D16AD418A7355D7309942CF61
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a67a605407d097d68f676a6f071fe15831a62c51ec308897f6b361ae94e44a9e
                              • Instruction ID: f075a219ca87dc5a58b5f427151a46718de6bc16e88aec85d63fe58371f532f3
                              • Opcode Fuzzy Hash: a67a605407d097d68f676a6f071fe15831a62c51ec308897f6b361ae94e44a9e
                              • Instruction Fuzzy Hash: CA516E70E112199BDB18CFA9D980AAEFBF7BF88300F24D16AD414A7355D7309942CF61
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4ff2abfbbe359e79b05e44748166b4b7dd752eda63531bd13e6ba632b34451fc
                              • Instruction ID: 1ef900594f355e4f333d6c3ed90af272b1dbac7df0ae2951d6a6ed4e35b97331
                              • Opcode Fuzzy Hash: 4ff2abfbbe359e79b05e44748166b4b7dd752eda63531bd13e6ba632b34451fc
                              • Instruction Fuzzy Hash: BA513AB0E002198FDB14DFA9C5815AEFBF2FF89304F24816AE418AB355D7349942CFA1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c01d3b1a133573b883f6bc36ce32f7d0bb8dfb26f486be398ad92af43f891bdb
                              • Instruction ID: 8ca75617573fe5a0b44880b488502efa08abf66608cedc9d14faf87181f9b11b
                              • Opcode Fuzzy Hash: c01d3b1a133573b883f6bc36ce32f7d0bb8dfb26f486be398ad92af43f891bdb
                              • Instruction Fuzzy Hash: 65512DB0E002198BDB14DFA9C9815AEFBF6FF89300F24816AE419AB355D735A941CF61
                              Memory Dump Source
                              • Source File: 00000001.00000002.1430540192.00000000096C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 096C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_96c0000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 04c82f16975caca114c1636c9bca5f0ec6feb3526a80ed07b7efc4d789cdb8b8
                              • Instruction ID: b8682a68f9d2f265415bc1765b98c3fe6295986fc939972f505302d72d4a487f
                              • Opcode Fuzzy Hash: 04c82f16975caca114c1636c9bca5f0ec6feb3526a80ed07b7efc4d789cdb8b8
                              • Instruction Fuzzy Hash: 16513CB0E042198FDB14CFA9C9805AEFBF2FF89300F24816AE418A7315D735A941CFA1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c6ef8e30e9eb7c79c6e3dda187ab12f9d3ddc7a4aa4602c296f0586951ffb296
                              • Instruction ID: aeda18539d6bf515397d7fc49a9922d44dc032ec0108cd79869486df5f62d9ed
                              • Opcode Fuzzy Hash: c6ef8e30e9eb7c79c6e3dda187ab12f9d3ddc7a4aa4602c296f0586951ffb296
                              • Instruction Fuzzy Hash: 61416270E11219CBDF28CF9AD98079EFBB3FB89201F10C16AD919A7254DB7059418F61
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f75a41e6237074225a4d632d82a053b743bb8ca0dd4b0cb51b25371ea497de72
                              • Instruction ID: 4e9b30c02125a58c446ab9226e064adabbb795d2003951a36e6aaca2ce2e7f9f
                              • Opcode Fuzzy Hash: f75a41e6237074225a4d632d82a053b743bb8ca0dd4b0cb51b25371ea497de72
                              • Instruction Fuzzy Hash: CC415A71E056588BEB18CF6B894479EFBF3AFC9300F14C1BAC54DAA225DB3019868F11
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d02e7fbf6a4e4acc5d2eec019071674ba81f7e32a6e8a93809d1862a9ceb06c1
                              • Instruction ID: fe3ce4da5121295697f5571e2a36dc0fdf40ec66a96d5e481dfed74e80727c25
                              • Opcode Fuzzy Hash: d02e7fbf6a4e4acc5d2eec019071674ba81f7e32a6e8a93809d1862a9ceb06c1
                              • Instruction Fuzzy Hash: AE41F770D1560ACFCB48CF96C9815EEFBB2EB88340F54D46AC425BB254D7349642CF94
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 893389a469427f098c4aa3e68ee75aa46b5bdeded7dbec6906c7326bafb7ffb8
                              • Instruction ID: 05f10dc748237f9687bd43a8bf25b8e65570817025411c45aab252c744c885df
                              • Opcode Fuzzy Hash: 893389a469427f098c4aa3e68ee75aa46b5bdeded7dbec6906c7326bafb7ffb8
                              • Instruction Fuzzy Hash: 1041E770D0560ACFCB48CFAAC9815EEFBB2EB88340F54C56AC825BB254D7349646CF94
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a5da063e4fbb58e0d18d6ef0e5683c46d92ddea086397d9479c32010972ca442
                              • Instruction ID: fd4dfa4f772ef56b45494e8a13eaeb2af03e8bcbd1eb947a7f832ea1a5290b6c
                              • Opcode Fuzzy Hash: a5da063e4fbb58e0d18d6ef0e5683c46d92ddea086397d9479c32010972ca442
                              • Instruction Fuzzy Hash: 35418570E15209CFDB28CF69CD846AFFBB3BF89201F14C16ED915AB255DA7049418B61
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0a9b818aa90e39eb31551ebeb4bf37fc24b540f8f852bf0adbb3113faccd4857
                              • Instruction ID: 0e721178a3af0d62c133aaba9cbcb37e39556df9aae5dd10405d2fccb1b4a1bf
                              • Opcode Fuzzy Hash: 0a9b818aa90e39eb31551ebeb4bf37fc24b540f8f852bf0adbb3113faccd4857
                              • Instruction Fuzzy Hash: 1631CAB9E012189FDB10CFA9E584ADEFBF5BB49310F24902AE814B7310D334A945CFA4
                              Memory Dump Source
                              • Source File: 00000001.00000002.1422067946.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_7000000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ba8486d97a69db90a0b16ecdc16301464e2a75bf990541899eddbeb9dab40363
                              • Instruction ID: 8eaea155704f90ed5ee857a646e6f77ef1b74c6ee7476ad107d7926f1adfeae3
                              • Opcode Fuzzy Hash: ba8486d97a69db90a0b16ecdc16301464e2a75bf990541899eddbeb9dab40363
                              • Instruction Fuzzy Hash: 8631AAB9E012089FDB14DF99E584ADEFBF1BB49310F24902AE818B7350D334A945CFA4
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 67dfdd6cc39320441b59417ac36abdc1785a021f498ffd0a3df589e8d9b598d4
                              • Instruction ID: d7beb33872f42caa1bbe98c11e252220405be5a88ccaa74fb80a30099e71a65d
                              • Opcode Fuzzy Hash: 67dfdd6cc39320441b59417ac36abdc1785a021f498ffd0a3df589e8d9b598d4
                              • Instruction Fuzzy Hash: 9E2195116085C29BD75B8F38C4B67DABFB0FF9221831A82D5C8E649C07D704ACABC740
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 943eac506e6e32403b0507a41562741ba2bf49affa00220390b1278dbe976cc0
                              • Instruction ID: 823b73456ae968cb7c89195a54a2e4bc2d24e1d71f8fe998694de772b91e1d06
                              • Opcode Fuzzy Hash: 943eac506e6e32403b0507a41562741ba2bf49affa00220390b1278dbe976cc0
                              • Instruction Fuzzy Hash: F631E7B0E0165C8BDB58CFAAC8443DEBBF3BF89300F14C06AD458AB255DBB409858F90
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e860b19117791c8b44843ca67e5b62513c9811e7b40d060787d4aa65c6ca0416
                              • Instruction ID: 6d9c9576d75bf93e1c342c30300583ab0aef80b9555dba37ea1d4715e7583197
                              • Opcode Fuzzy Hash: e860b19117791c8b44843ca67e5b62513c9811e7b40d060787d4aa65c6ca0416
                              • Instruction Fuzzy Hash: 6231A7B1E0161C8BEB58CFAAD8443DEFBF2AFC8300F14C16AD518AB254DBB419458F90
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9dfd7ff3460dd83899fca4170d605beb7d7e8cce7da0c62a1f82611a3d513521
                              • Instruction ID: 18d2da9ef6189c0382ab9015616587d063da204e92e7efdedba875976485e488
                              • Opcode Fuzzy Hash: 9dfd7ff3460dd83899fca4170d605beb7d7e8cce7da0c62a1f82611a3d513521
                              • Instruction Fuzzy Hash: FA31B4B1E016188BEB58CFABD84079EFAF3BFC8300F14C5BAD418A6254EB741A458F51
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 91a4ada9f4535629a4260c667b77b87880a5fd1cfe9e8ba1afaa5edd37526e9f
                              • Instruction ID: ea4aa4cfecddd462d575c3062700295b8f4ee500a9a0037e7692ee317206a7f7
                              • Opcode Fuzzy Hash: 91a4ada9f4535629a4260c667b77b87880a5fd1cfe9e8ba1afaa5edd37526e9f
                              • Instruction Fuzzy Hash: 9721F771E116198BEB48CFABD9446DEFBF7AFC9210F14C03AD418A7214DB305A568B51
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b859d0f56997356acc886c949e6ffaf978d45f22e2f17a199d04bcc9e28e9876
                              • Instruction ID: db1246bd4eb7dc5d85aeca4d46edb8b9adfb8c79db80d7cac3734137397ba775
                              • Opcode Fuzzy Hash: b859d0f56997356acc886c949e6ffaf978d45f22e2f17a199d04bcc9e28e9876
                              • Instruction Fuzzy Hash: 5D215C71E116189BEB58CFABD84069EBBF3AFC9210F14C13AD408A7355EB305A41CF91
                              Memory Dump Source
                              • Source File: 00000001.00000002.1425035083.0000000008050000.00000040.00000800.00020000.00000000.sdmp, Offset: 08050000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_8050000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 492db84887ee7c110595efc6adfb4760f0b2184f5b741044a8c2a9bdd4f0123e
                              • Instruction ID: e34ea8e1fba31246ccc704b7de2a91f626a97a3095e1c63fd8fdd9fcb91e4253
                              • Opcode Fuzzy Hash: 492db84887ee7c110595efc6adfb4760f0b2184f5b741044a8c2a9bdd4f0123e
                              • Instruction Fuzzy Hash: F21117B1E11619DBEB58CFAAD84069EFBF7AFC9200F14C03AD908A7215DB305A418F91
                              Memory Dump Source
                              • Source File: 00000001.00000002.1412753315.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_2470000_1evAkYZpwDV0N4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 16f7f6cbdc2a9e6b4a5623ee8aa8ad9c25025a4e41229221b1752cde098c9aa2
                              • Instruction ID: 1b33f552d7ed68c2779636b4f4bc454abdae4608ec8db78784ca5292c6419ee6
                              • Opcode Fuzzy Hash: 16f7f6cbdc2a9e6b4a5623ee8aa8ad9c25025a4e41229221b1752cde098c9aa2
                              • Instruction Fuzzy Hash: AA110770E11A188BEB48CFABD9446AEFAF3AFC9200F14C13AD418B7354DB704A468F51

                              Execution Graph

                              Execution Coverage:2.7%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:13.5%
                              Total number of Nodes:817
                              Total number of Limit Nodes:27
                              execution_graph 47080 446802 47081 44680d RtlFreeHeap 47080->47081 47085 446836 _free 47080->47085 47082 446822 47081->47082 47081->47085 47086 44062d 20 API calls _abort 47082->47086 47084 446828 GetLastError 47084->47085 47086->47084 47087 404e26 WaitForSingleObject 47088 404e40 SetEvent CloseHandle 47087->47088 47089 404e57 closesocket 47087->47089 47090 404ed8 47088->47090 47091 404e64 47089->47091 47092 404e7a 47091->47092 47100 4050e4 83 API calls 47091->47100 47094 404e8c WaitForSingleObject 47092->47094 47095 404ece SetEvent CloseHandle 47092->47095 47101 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47094->47101 47095->47090 47097 404e9b SetEvent WaitForSingleObject 47102 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47097->47102 47099 404eb3 SetEvent CloseHandle CloseHandle 47099->47095 47100->47092 47101->47097 47102->47099 47103 434918 47104 434924 ___DestructExceptionObject 47103->47104 47129 434627 47104->47129 47106 43492b 47108 434954 47106->47108 47423 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 47106->47423 47116 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47108->47116 47424 4442d2 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47108->47424 47110 43496d 47112 434973 ___DestructExceptionObject 47110->47112 47425 444276 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47110->47425 47113 4349f3 47140 434ba5 47113->47140 47116->47113 47426 443487 35 API calls 3 library calls 47116->47426 47124 434a1f 47126 434a28 47124->47126 47427 443462 28 API calls _abort 47124->47427 47428 43479e 13 API calls 2 library calls 47126->47428 47130 434630 47129->47130 47429 434cb6 IsProcessorFeaturePresent 47130->47429 47132 43463c 47430 438fb1 10 API calls 4 library calls 47132->47430 47134 434641 47135 434645 47134->47135 47431 44415f IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47134->47431 47135->47106 47137 43464e 47138 43465c 47137->47138 47432 438fda 8 API calls 3 library calls 47137->47432 47138->47106 47433 436f10 47140->47433 47143 4349f9 47144 444223 47143->47144 47435 44f0d9 47144->47435 47146 434a02 47149 40ea00 47146->47149 47147 44422c 47147->47146 47439 446895 35 API calls 47147->47439 47441 41cbe1 LoadLibraryA GetProcAddress 47149->47441 47151 40ea1c GetModuleFileNameW 47446 40f3fe 47151->47446 47153 40ea38 47461 4020f6 47153->47461 47156 4020f6 28 API calls 47157 40ea56 47156->47157 47467 41beac 47157->47467 47161 40ea68 47493 401e8d 47161->47493 47163 40ea71 47164 40ea84 47163->47164 47165 40eace 47163->47165 47660 40fbee 116 API calls 47164->47660 47499 401e65 47165->47499 47168 40eade 47172 401e65 22 API calls 47168->47172 47169 40ea96 47170 401e65 22 API calls 47169->47170 47171 40eaa2 47170->47171 47661 410f72 36 API calls __EH_prolog 47171->47661 47173 40eafd 47172->47173 47504 40531e 47173->47504 47176 40eb0c 47509 406383 47176->47509 47177 40eab4 47662 40fb9f 77 API calls 47177->47662 47181 40eabd 47663 40f3eb 70 API calls 47181->47663 47186 401fd8 11 API calls 47188 40ef36 47186->47188 47418 443396 GetModuleHandleW 47188->47418 47189 401fd8 11 API calls 47190 40eb36 47189->47190 47191 401e65 22 API calls 47190->47191 47192 40eb3f 47191->47192 47526 401fc0 47192->47526 47194 40eb4a 47195 401e65 22 API calls 47194->47195 47196 40eb63 47195->47196 47197 401e65 22 API calls 47196->47197 47198 40eb7e 47197->47198 47199 40ebe9 47198->47199 47664 406c59 28 API calls 47198->47664 47201 401e65 22 API calls 47199->47201 47206 40ebf6 47201->47206 47202 40ebab 47203 401fe2 28 API calls 47202->47203 47204 40ebb7 47203->47204 47205 401fd8 11 API calls 47204->47205 47208 40ebc0 47205->47208 47207 40ec3d 47206->47207 47530 413584 RegOpenKeyExA 47206->47530 47533 40d0a4 47207->47533 47213 413584 3 API calls 47208->47213 47210 40ec43 47212 40eac6 47210->47212 47536 41b354 47210->47536 47212->47186 47215 40ebdf 47213->47215 47215->47199 47217 40f38a 47215->47217 47216 40ec5e 47219 40ecb1 47216->47219 47553 407751 47216->47553 47708 4139e4 30 API calls 47217->47708 47218 40ec21 47218->47207 47665 4139e4 30 API calls 47218->47665 47221 401e65 22 API calls 47219->47221 47224 40ecba 47221->47224 47234 40ecc6 47224->47234 47235 40eccb 47224->47235 47226 40f3a0 47709 4124b0 65 API calls ___scrt_fastfail 47226->47709 47228 40ec87 47232 401e65 22 API calls 47228->47232 47229 40ec7d 47666 407773 30 API calls 47229->47666 47230 40f388 47233 41bcef 28 API calls 47230->47233 47243 40ec90 47232->47243 47237 40f3ba 47233->47237 47669 407790 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 47234->47669 47240 401e65 22 API calls 47235->47240 47236 40ec82 47667 40729b 97 API calls 47236->47667 47710 413a5e RegOpenKeyExW RegDeleteValueW 47237->47710 47241 40ecd4 47240->47241 47557 41bcef 47241->47557 47243->47219 47247 40ecac 47243->47247 47244 40ecdf 47561 401f13 47244->47561 47668 40729b 97 API calls 47247->47668 47248 40f3cd 47251 401f09 11 API calls 47248->47251 47253 40f3d7 47251->47253 47255 401f09 11 API calls 47253->47255 47257 40f3e0 47255->47257 47256 401e65 22 API calls 47258 40ecfc 47256->47258 47711 40dd7d 27 API calls 47257->47711 47262 401e65 22 API calls 47258->47262 47260 40f3e5 47712 414f65 167 API calls 47260->47712 47264 40ed16 47262->47264 47265 401e65 22 API calls 47264->47265 47266 40ed30 47265->47266 47267 401e65 22 API calls 47266->47267 47268 40ed49 47267->47268 47269 40edb6 47268->47269 47270 401e65 22 API calls 47268->47270 47271 40edc5 47269->47271 47277 40ef41 ___scrt_fastfail 47269->47277 47275 40ed5e _wcslen 47270->47275 47272 40edce 47271->47272 47300 40ee4a ___scrt_fastfail 47271->47300 47273 401e65 22 API calls 47272->47273 47274 40edd7 47273->47274 47276 401e65 22 API calls 47274->47276 47275->47269 47279 401e65 22 API calls 47275->47279 47278 40ede9 47276->47278 47672 413733 RegOpenKeyExA RegQueryValueExA RegCloseKey 47277->47672 47282 401e65 22 API calls 47278->47282 47280 40ed79 47279->47280 47283 401e65 22 API calls 47280->47283 47284 40edfb 47282->47284 47285 40ed8e 47283->47285 47288 401e65 22 API calls 47284->47288 47670 40da6f 31 API calls 47285->47670 47286 40ef8c 47287 401e65 22 API calls 47286->47287 47289 40efb1 47287->47289 47291 40ee24 47288->47291 47673 402093 47289->47673 47294 401e65 22 API calls 47291->47294 47292 40eda1 47293 401f13 28 API calls 47292->47293 47296 40edad 47293->47296 47297 40ee35 47294->47297 47299 401f09 11 API calls 47296->47299 47671 40ce34 45 API calls _wcslen 47297->47671 47298 40efc3 47679 4137aa RegCreateKeyA 47298->47679 47299->47269 47573 413982 47300->47573 47304 40ee45 47304->47300 47306 40eede ctype 47309 401e65 22 API calls 47306->47309 47307 401e65 22 API calls 47308 40efe5 47307->47308 47685 43bb2c 39 API calls _swprintf 47308->47685 47313 40eef5 47309->47313 47311 40eff2 47314 40f01f 47311->47314 47686 41ce2c 86 API calls ___scrt_fastfail 47311->47686 47313->47286 47315 401e65 22 API calls 47313->47315 47319 402093 28 API calls 47314->47319 47317 40ef12 47315->47317 47320 41bcef 28 API calls 47317->47320 47318 40f003 CreateThread 47318->47314 48038 41d4ee 10 API calls 47318->48038 47321 40f034 47319->47321 47322 40ef1e 47320->47322 47323 402093 28 API calls 47321->47323 47583 40f4af GetModuleFileNameW 47322->47583 47325 40f043 47323->47325 47687 41b580 79 API calls 47325->47687 47328 40f048 47329 401e65 22 API calls 47328->47329 47330 40f054 47329->47330 47331 401e65 22 API calls 47330->47331 47332 40f066 47331->47332 47333 401e65 22 API calls 47332->47333 47334 40f086 47333->47334 47688 43bb2c 39 API calls _swprintf 47334->47688 47336 40f093 47337 401e65 22 API calls 47336->47337 47338 40f09e 47337->47338 47339 401e65 22 API calls 47338->47339 47340 40f0af 47339->47340 47341 401e65 22 API calls 47340->47341 47342 40f0c4 47341->47342 47343 401e65 22 API calls 47342->47343 47344 40f0d5 47343->47344 47345 40f0dc StrToIntA 47344->47345 47689 409e1f 168 API calls _wcslen 47345->47689 47347 40f0ee 47348 401e65 22 API calls 47347->47348 47349 40f0f7 47348->47349 47350 40f13c 47349->47350 47690 43455e 47349->47690 47353 401e65 22 API calls 47350->47353 47358 40f14c 47353->47358 47354 401e65 22 API calls 47355 40f11f 47354->47355 47356 40f126 CreateThread 47355->47356 47356->47350 48041 41a045 102 API calls __EH_prolog 47356->48041 47357 40f194 47360 401e65 22 API calls 47357->47360 47358->47357 47359 43455e new 22 API calls 47358->47359 47361 40f161 47359->47361 47365 40f19d 47360->47365 47362 401e65 22 API calls 47361->47362 47363 40f173 47362->47363 47366 40f17a CreateThread 47363->47366 47364 40f207 47367 401e65 22 API calls 47364->47367 47365->47364 47368 401e65 22 API calls 47365->47368 47366->47357 48039 41a045 102 API calls __EH_prolog 47366->48039 47372 40f210 47367->47372 47369 40f1b9 47368->47369 47370 401e65 22 API calls 47369->47370 47374 40f1ce 47370->47374 47371 40f255 47700 41b69e 79 API calls 47371->47700 47372->47371 47373 401e65 22 API calls 47372->47373 47376 40f225 47373->47376 47697 40da23 31 API calls 47374->47697 47382 401e65 22 API calls 47376->47382 47377 40f25e 47378 401f13 28 API calls 47377->47378 47380 40f269 47378->47380 47381 401f09 11 API calls 47380->47381 47384 40f272 CreateThread 47381->47384 47385 40f23a 47382->47385 47383 40f1e1 47386 401f13 28 API calls 47383->47386 47389 40f293 CreateThread 47384->47389 47390 40f29f 47384->47390 48040 40f7e2 120 API calls 47384->48040 47698 43bb2c 39 API calls _swprintf 47385->47698 47388 40f1ed 47386->47388 47391 401f09 11 API calls 47388->47391 47389->47390 48042 412132 144 API calls 47389->48042 47392 40f2b4 47390->47392 47393 40f2a8 CreateThread 47390->47393 47395 40f1f6 CreateThread 47391->47395 47397 40f307 47392->47397 47399 402093 28 API calls 47392->47399 47393->47392 48036 412716 38 API calls ___scrt_fastfail 47393->48036 47395->47364 48037 401be9 49 API calls 47395->48037 47396 40f247 47699 40c19d 7 API calls 47396->47699 47702 41353a RegOpenKeyExA RegQueryValueExA RegCloseKey 47397->47702 47400 40f2d7 47399->47400 47701 4052fd 28 API calls 47400->47701 47404 40f31f 47404->47257 47407 41bcef 28 API calls 47404->47407 47409 40f338 47407->47409 47703 413656 RegOpenKeyExW 47409->47703 47414 401f09 11 API calls 47416 40f359 47414->47416 47415 40f381 DeleteFileW 47415->47230 47415->47416 47416->47230 47416->47415 47417 40f36f Sleep 47416->47417 47417->47416 47419 434a15 47418->47419 47419->47124 47420 4434bf 47419->47420 48044 44323c 47420->48044 47423->47106 47424->47110 47425->47116 47426->47113 47427->47126 47428->47112 47429->47132 47430->47134 47431->47137 47432->47135 47434 434bb8 GetStartupInfoW 47433->47434 47434->47143 47436 44f0eb 47435->47436 47437 44f0e2 47435->47437 47436->47147 47440 44efd8 48 API calls 4 library calls 47437->47440 47439->47147 47440->47436 47442 41cc20 LoadLibraryA GetProcAddress 47441->47442 47443 41cc10 GetModuleHandleA GetProcAddress 47441->47443 47444 41cc49 44 API calls 47442->47444 47445 41cc39 LoadLibraryA GetProcAddress 47442->47445 47443->47442 47444->47151 47445->47444 47713 41b539 FindResourceA 47446->47713 47450 40f428 ctype 47723 4020b7 47450->47723 47453 401fe2 28 API calls 47454 40f44e 47453->47454 47455 401fd8 11 API calls 47454->47455 47456 40f457 47455->47456 47457 43bda0 new 21 API calls 47456->47457 47458 40f468 ctype 47457->47458 47729 406e13 47458->47729 47460 40f49b 47460->47153 47462 40210c 47461->47462 47463 4023ce 11 API calls 47462->47463 47464 402126 47463->47464 47465 402569 28 API calls 47464->47465 47466 402134 47465->47466 47466->47156 47793 4020df 47467->47793 47469 41bf2f 47470 401fd8 11 API calls 47469->47470 47471 41bf61 47470->47471 47473 401fd8 11 API calls 47471->47473 47472 41bf31 47809 4041a2 28 API calls 47472->47809 47475 41bf69 47473->47475 47478 401fd8 11 API calls 47475->47478 47477 41bf3d 47479 401fe2 28 API calls 47477->47479 47481 40ea5f 47478->47481 47482 41bf46 47479->47482 47480 401fe2 28 API calls 47488 41bebf 47480->47488 47489 40fb52 47481->47489 47483 401fd8 11 API calls 47482->47483 47485 41bf4e 47483->47485 47484 401fd8 11 API calls 47484->47488 47486 41cec5 28 API calls 47485->47486 47486->47469 47488->47469 47488->47472 47488->47480 47488->47484 47797 4041a2 28 API calls 47488->47797 47798 41cec5 47488->47798 47490 40fb5e 47489->47490 47492 40fb65 47489->47492 47835 402163 11 API calls 47490->47835 47492->47161 47494 402163 47493->47494 47495 40219f 47494->47495 47836 402730 11 API calls 47494->47836 47495->47163 47497 402184 47837 402712 11 API calls std::_Deallocate 47497->47837 47501 401e6d 47499->47501 47500 401e75 47500->47168 47501->47500 47838 402158 22 API calls 47501->47838 47505 4020df 11 API calls 47504->47505 47506 40532a 47505->47506 47839 4032a0 47506->47839 47508 405346 47508->47176 47843 4051ef 47509->47843 47511 406391 47847 402055 47511->47847 47514 401fe2 47515 401ff1 47514->47515 47516 402039 47514->47516 47517 4023ce 11 API calls 47515->47517 47523 401fd8 47516->47523 47518 401ffa 47517->47518 47519 40203c 47518->47519 47521 402015 47518->47521 47520 40267a 11 API calls 47519->47520 47520->47516 47862 403098 28 API calls 47521->47862 47524 4023ce 11 API calls 47523->47524 47525 401fe1 47524->47525 47525->47189 47527 401fd2 47526->47527 47528 401fc9 47526->47528 47527->47194 47863 4025e0 28 API calls 47528->47863 47531 4135db 47530->47531 47532 4135ae RegQueryValueExA RegCloseKey 47530->47532 47531->47218 47532->47531 47864 401fab 47533->47864 47535 40d0ae CreateMutexA GetLastError 47535->47210 47865 41c048 47536->47865 47541 401fe2 28 API calls 47542 41b390 47541->47542 47543 401fd8 11 API calls 47542->47543 47544 41b398 47543->47544 47545 41b3ee 47544->47545 47546 4135e1 31 API calls 47544->47546 47545->47216 47547 41b3c1 47546->47547 47548 41b3cc StrToIntA 47547->47548 47549 41b3e3 47548->47549 47550 41b3da 47548->47550 47552 401fd8 11 API calls 47549->47552 47873 41cffa 22 API calls 47550->47873 47552->47545 47554 407765 47553->47554 47555 413584 3 API calls 47554->47555 47556 40776c 47555->47556 47556->47228 47556->47229 47558 41bd03 47557->47558 47874 40b93f 47558->47874 47560 41bd0b 47560->47244 47562 401f22 47561->47562 47563 401f6a 47561->47563 47564 402252 11 API calls 47562->47564 47570 401f09 47563->47570 47565 401f2b 47564->47565 47566 401f6d 47565->47566 47568 401f46 47565->47568 47907 402336 11 API calls 47566->47907 47906 40305c 28 API calls 47568->47906 47571 402252 11 API calls 47570->47571 47572 401f12 47571->47572 47572->47256 47574 4139a0 47573->47574 47575 406e13 28 API calls 47574->47575 47576 4139b5 47575->47576 47577 4020f6 28 API calls 47576->47577 47578 4139c5 47577->47578 47579 4137aa 14 API calls 47578->47579 47580 4139cf 47579->47580 47581 401fd8 11 API calls 47580->47581 47582 4139dc 47581->47582 47582->47306 47584 40f4e0 47583->47584 47585 40f669 47584->47585 47908 401f86 47584->47908 47927 41b71b 47585->47927 47590 401f13 28 API calls 47592 40f67f 47590->47592 47591 40f586 Process32NextW 47593 40f59d CloseHandle 47591->47593 47610 40f518 47591->47610 47595 401f09 11 API calls 47592->47595 47596 40f5b2 47593->47596 47597 40f688 47595->47597 47598 40f660 47596->47598 47599 40f5be 47596->47599 47603 40f6a3 CloseHandle 47597->47603 47604 40f611 47597->47604 47600 401f09 11 API calls 47598->47600 47601 401f09 11 API calls 47599->47601 47600->47585 47602 40f5c3 47601->47602 47602->47603 47606 4020df 11 API calls 47603->47606 47605 401f09 11 API calls 47604->47605 47607 40ef23 47605->47607 47608 40f6b8 47606->47608 47607->47212 47607->47286 47950 41c516 CreateFileW 47608->47950 47611 40f5c8 47610->47611 47614 401f09 11 API calls 47610->47614 47912 40417e 47610->47912 47918 41c26e OpenProcess 47611->47918 47612 40f6cd 47958 4185a3 47612->47958 47614->47591 47617 401f13 28 API calls 47619 40f5e2 47617->47619 47618 40f6ed 47620 40f7a2 47618->47620 47622 40417e 28 API calls 47618->47622 47621 401f09 11 API calls 47619->47621 47961 4138b2 RegCreateKeyA 47620->47961 47623 40f5eb 47621->47623 47624 40f707 47622->47624 47627 40f5ff 47623->47627 47635 40f616 47623->47635 47966 409196 28 API calls 47624->47966 47626 40f797 47631 401fd8 11 API calls 47626->47631 47629 401f09 11 API calls 47627->47629 47630 40f608 47629->47630 47633 401f09 11 API calls 47630->47633 47631->47604 47632 40f724 47638 4185a3 31 API calls 47632->47638 47633->47604 47634 40f657 47637 401f09 11 API calls 47634->47637 47635->47634 47964 41c076 OpenProcess 47635->47964 47637->47598 47640 40f735 47638->47640 47639 40f634 47639->47634 47641 40f638 47639->47641 47642 401f09 11 API calls 47640->47642 47965 40b9a7 28 API calls 47641->47965 47649 40f742 47642->47649 47644 40f649 47646 401f09 11 API calls 47644->47646 47645 40f799 47647 401f09 11 API calls 47645->47647 47648 40f652 47646->47648 47647->47620 47648->47593 47649->47645 47967 409196 28 API calls 47649->47967 47651 40f765 47652 4185a3 31 API calls 47651->47652 47653 40f776 47652->47653 47654 401f09 11 API calls 47653->47654 47655 40f783 47654->47655 47655->47645 47656 40f789 47655->47656 47657 40d0a4 2 API calls 47656->47657 47658 40f78e 47657->47658 47659 401f09 11 API calls 47658->47659 47659->47626 47660->47169 47661->47177 47662->47181 47664->47202 47665->47207 47666->47236 47667->47228 47668->47219 47669->47235 47670->47292 47671->47304 47672->47286 47674 40209b 47673->47674 47675 4023ce 11 API calls 47674->47675 47676 4020a6 47675->47676 48028 4024ed 47676->48028 47680 4137fa 47679->47680 47681 4137c3 47679->47681 47682 401fd8 11 API calls 47680->47682 47684 4137d5 RegSetValueExA RegCloseKey 47681->47684 47683 40efd9 47682->47683 47683->47307 47684->47680 47685->47311 47686->47318 47687->47328 47688->47336 47689->47347 47692 434563 47690->47692 47691 43bda0 new 21 API calls 47691->47692 47692->47691 47693 40f10c 47692->47693 48032 443001 7 API calls 2 library calls 47692->48032 48033 434c99 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47692->48033 48034 4352fb RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47692->48034 47693->47354 47697->47383 47698->47396 47699->47371 47700->47377 47702->47404 47704 413682 RegQueryValueExW RegCloseKey 47703->47704 47705 4136af 47703->47705 47704->47705 47706 40417e 28 API calls 47705->47706 47707 40f34e 47706->47707 47707->47414 47708->47226 47710->47248 47711->47260 48035 41ada8 103 API calls 47712->48035 47714 41b556 LoadResource LockResource SizeofResource 47713->47714 47715 40f419 47713->47715 47714->47715 47716 43bda0 47715->47716 47721 4461b8 ___crtLCMapStringA 47716->47721 47717 4461f6 47733 44062d 20 API calls _abort 47717->47733 47718 4461e1 RtlAllocateHeap 47720 4461f4 47718->47720 47718->47721 47720->47450 47721->47717 47721->47718 47732 443001 7 API calls 2 library calls 47721->47732 47724 4020bf 47723->47724 47734 4023ce 47724->47734 47726 4020ca 47738 40250a 47726->47738 47728 4020d9 47728->47453 47730 4020b7 28 API calls 47729->47730 47731 406e27 47730->47731 47731->47460 47732->47721 47733->47720 47735 402428 47734->47735 47736 4023d8 47734->47736 47735->47726 47736->47735 47745 4027a7 47736->47745 47739 40251a 47738->47739 47740 402520 47739->47740 47741 402535 47739->47741 47756 402569 47740->47756 47766 4028e8 47741->47766 47744 402533 47744->47728 47746 402e21 47745->47746 47749 4016b4 47746->47749 47748 402e30 47748->47735 47750 4016cb 47749->47750 47754 4016c6 47749->47754 47751 4016f3 47750->47751 47750->47754 47751->47748 47753 43bd67 47755 43bd68 11 API calls _abort 47754->47755 47755->47753 47777 402888 47756->47777 47758 40257d 47759 402592 47758->47759 47760 4025a7 47758->47760 47782 402a34 22 API calls 47759->47782 47762 4028e8 28 API calls 47760->47762 47765 4025a5 47762->47765 47763 40259b 47783 4029da 22 API calls 47763->47783 47765->47744 47767 4028f1 47766->47767 47768 402953 47767->47768 47769 4028fb 47767->47769 47791 4028a4 22 API calls 47768->47791 47772 402904 47769->47772 47774 402917 47769->47774 47785 402cae 47772->47785 47775 402915 47774->47775 47776 4023ce 11 API calls 47774->47776 47775->47744 47776->47775 47778 402890 47777->47778 47779 402898 47778->47779 47784 402ca3 22 API calls 47778->47784 47779->47758 47782->47763 47783->47765 47786 402cb8 __EH_prolog 47785->47786 47792 402e54 22 API calls 47786->47792 47788 4023ce 11 API calls 47790 402d92 47788->47790 47789 402d24 47789->47788 47790->47775 47792->47789 47794 4020e7 47793->47794 47795 4023ce 11 API calls 47794->47795 47796 4020f2 47795->47796 47796->47488 47797->47488 47799 41ced2 47798->47799 47800 41cf31 47799->47800 47804 41cee2 47799->47804 47801 41cf4b 47800->47801 47802 41d071 28 API calls 47800->47802 47819 41d1d7 28 API calls 47801->47819 47802->47801 47805 41cf1a 47804->47805 47810 41d071 47804->47810 47818 41d1d7 28 API calls 47805->47818 47806 41cf2d 47806->47488 47809->47477 47812 41d079 47810->47812 47811 41d0ab 47811->47805 47812->47811 47813 41d0af 47812->47813 47816 41d093 47812->47816 47830 402725 22 API calls 47813->47830 47820 41d0e2 47816->47820 47818->47806 47819->47806 47821 41d0ec __EH_prolog 47820->47821 47831 402717 22 API calls 47821->47831 47823 41d0ff 47832 41d1ee 11 API calls 47823->47832 47825 41d125 47826 41d15d 47825->47826 47833 402730 11 API calls 47825->47833 47826->47811 47828 41d144 47834 402712 11 API calls std::_Deallocate 47828->47834 47831->47823 47832->47825 47833->47828 47834->47826 47835->47492 47836->47497 47837->47495 47840 4032aa 47839->47840 47841 4028e8 28 API calls 47840->47841 47842 4032c9 47840->47842 47841->47842 47842->47508 47844 4051fb 47843->47844 47853 405274 47844->47853 47846 405208 47846->47511 47848 402061 47847->47848 47849 4023ce 11 API calls 47848->47849 47850 40207b 47849->47850 47858 40267a 47850->47858 47854 405282 47853->47854 47857 4028a4 22 API calls 47854->47857 47859 40268b 47858->47859 47860 4023ce 11 API calls 47859->47860 47861 40208d 47860->47861 47861->47514 47862->47516 47863->47527 47866 41b362 47865->47866 47867 41c055 GetCurrentProcess 47865->47867 47868 4135e1 RegOpenKeyExA 47866->47868 47867->47866 47869 41360f RegQueryValueExA RegCloseKey 47868->47869 47870 413639 47868->47870 47869->47870 47871 402093 28 API calls 47870->47871 47872 41364e 47871->47872 47872->47541 47873->47549 47875 40b947 47874->47875 47880 402252 47875->47880 47877 40b952 47884 40b967 47877->47884 47879 40b961 47879->47560 47881 4022ac 47880->47881 47882 40225c 47880->47882 47881->47877 47882->47881 47891 402779 11 API calls std::_Deallocate 47882->47891 47885 40b9a1 47884->47885 47886 40b973 47884->47886 47903 4028a4 22 API calls 47885->47903 47892 4027e6 47886->47892 47889 40b97d 47889->47879 47891->47881 47893 4027ef 47892->47893 47894 402851 47893->47894 47895 4027f9 47893->47895 47905 4028a4 22 API calls 47894->47905 47898 402802 47895->47898 47899 402815 47895->47899 47904 402aea 28 API calls __EH_prolog 47898->47904 47901 402813 47899->47901 47902 402252 11 API calls 47899->47902 47901->47889 47902->47901 47904->47901 47906->47563 47907->47563 47909 401f8e 47908->47909 47910 402252 11 API calls 47909->47910 47911 401f99 CreateToolhelp32Snapshot Process32FirstW 47910->47911 47911->47591 47913 404186 47912->47913 47914 402252 11 API calls 47913->47914 47915 404191 47914->47915 47968 4041bc 47915->47968 47919 41c292 OpenProcess 47918->47919 47920 41c2ac K32GetProcessImageFileNameW 47918->47920 47919->47920 47924 41c2a5 47919->47924 47921 41c2c4 CloseHandle 47920->47921 47922 41c2cc CloseHandle 47920->47922 47921->47924 47980 41c0ac lstrlenW 47922->47980 47925 40417e 28 API calls 47924->47925 47926 40f5d8 47925->47926 47926->47617 47928 413656 31 API calls 47927->47928 47929 41b737 47928->47929 47997 445825 37 API calls 2 library calls 47929->47997 47931 41b746 47998 409049 28 API calls 47931->47998 47933 41b763 47934 401f13 28 API calls 47933->47934 47935 41b76b 47934->47935 47936 401f09 11 API calls 47935->47936 47937 41b773 47936->47937 47999 409097 28 API calls 47937->47999 47939 41b77e 48000 41bdd3 28 API calls 47939->48000 47941 41b787 47942 401f13 28 API calls 47941->47942 47943 41b792 47942->47943 47944 401f09 11 API calls 47943->47944 47945 41b79a 47944->47945 47946 41c048 GetCurrentProcess 47945->47946 47948 41b7d5 _wcslen 47946->47948 47947 40f672 47947->47590 47948->47947 48001 41cfd5 28 API calls 47948->48001 47951 41c540 GetFileSize 47950->47951 47952 41c53c 47950->47952 48002 40244e 47951->48002 47952->47612 47954 41c554 47955 41c566 ReadFile 47954->47955 47956 41c573 47955->47956 47957 41c575 CloseHandle 47955->47957 47956->47957 47957->47952 48007 41812a 47958->48007 47962 4138f4 47961->47962 47963 4138ca RegSetValueExA RegCloseKey 47961->47963 47962->47626 47963->47962 47964->47639 47965->47644 47966->47632 47967->47651 47969 4041c8 47968->47969 47972 4041d9 47969->47972 47971 40419c 47971->47610 47973 4041e9 47972->47973 47974 404206 47973->47974 47975 4041ef 47973->47975 47976 4027e6 28 API calls 47974->47976 47979 404267 28 API calls 47975->47979 47978 404204 47976->47978 47978->47971 47979->47978 47981 41c108 ctype 47980->47981 47986 41c0d1 _memcmp 47980->47986 47982 41c126 FindFirstVolumeW 47981->47982 47983 41c146 GetLastError 47982->47983 47987 41c153 _wcslen 47982->47987 47984 41c1f9 47983->47984 47984->47924 47985 41c0f1 lstrlenW 47985->47981 47985->47986 47986->47981 47986->47985 47988 41c1e3 47987->47988 47990 41c174 QueryDosDeviceW 47987->47990 47989 41c1e8 FindVolumeClose 47988->47989 47989->47984 47991 41c261 GetLastError 47990->47991 47992 41c19c lstrcmpW 47990->47992 47991->47989 47993 41c213 GetVolumePathNamesForVolumeNameW 47992->47993 47994 41c1af FindNextVolumeW 47992->47994 47993->47991 47995 41c23b lstrcatW lstrcpyW 47993->47995 47994->47987 47996 41c204 GetLastError 47994->47996 47995->47989 47996->47988 47996->47989 47997->47931 47998->47933 47999->47939 48000->47941 48001->47947 48003 402456 48002->48003 48005 402460 48003->48005 48006 402a51 28 API calls 48003->48006 48005->47954 48006->48005 48008 418157 8 API calls 48007->48008 48009 4181c4 ___scrt_fastfail 48008->48009 48027 41847b CloseHandle CloseHandle 48008->48027 48010 41822a CreateProcessW 48009->48010 48009->48027 48011 418260 VirtualAlloc Wow64GetThreadContext 48010->48011 48012 4184b5 GetLastError 48010->48012 48013 41847f VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 48011->48013 48014 41828e ReadProcessMemory 48011->48014 48012->48027 48013->48027 48014->48013 48015 4182b4 NtCreateSection 48014->48015 48015->48013 48016 4182dc 48015->48016 48017 4182eb NtUnmapViewOfSection 48016->48017 48018 4182fc NtMapViewOfSection 48016->48018 48017->48018 48019 418320 VirtualFree NtClose TerminateProcess 48018->48019 48020 418368 GetCurrentProcess NtMapViewOfSection 48018->48020 48019->48008 48021 418363 48019->48021 48020->48013 48024 418395 ctype 48020->48024 48021->48027 48022 418431 WriteProcessMemory 48022->48013 48025 418450 48022->48025 48023 418454 Wow64SetThreadContext 48023->48013 48026 41846d ResumeThread 48023->48026 48024->48022 48024->48023 48025->48023 48026->48013 48026->48027 48027->47618 48029 4024f9 48028->48029 48030 40250a 28 API calls 48029->48030 48031 4020b1 48030->48031 48031->47298 48032->47692 48043 412829 61 API calls 48042->48043 48045 443248 _abort 48044->48045 48047 443396 _abort GetModuleHandleW 48045->48047 48054 443260 48045->48054 48049 443254 48047->48049 48048 443306 48067 443346 48048->48067 48049->48054 48078 4433da GetModuleHandleExW 48049->48078 48053 4432dd 48058 4432f5 48053->48058 48087 444276 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 48053->48087 48066 445909 EnterCriticalSection 48054->48066 48055 443268 48055->48048 48055->48053 48086 443ff0 20 API calls _abort 48055->48086 48056 443323 48070 443355 48056->48070 48057 44334f 48089 4577a9 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 48057->48089 48088 444276 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 48058->48088 48066->48055 48090 445951 LeaveCriticalSection 48067->48090 48069 44331f 48069->48056 48069->48057 48091 448d49 48070->48091 48073 443383 48076 4433da _abort 8 API calls 48073->48076 48074 443363 GetPEB 48074->48073 48075 443373 GetCurrentProcess TerminateProcess 48074->48075 48075->48073 48077 44338b ExitProcess 48076->48077 48079 443404 GetProcAddress 48078->48079 48080 443427 48078->48080 48083 443419 48079->48083 48081 443436 48080->48081 48082 44342d FreeLibrary 48080->48082 48084 43502b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 48081->48084 48082->48081 48083->48080 48085 443440 48084->48085 48085->48054 48086->48053 48087->48058 48088->48048 48090->48069 48092 448d6e 48091->48092 48096 448d64 48091->48096 48097 44854a 48092->48097 48095 44335f 48095->48073 48095->48074 48104 43502b 48096->48104 48098 44857a 48097->48098 48100 448576 48097->48100 48098->48096 48100->48098 48102 44859a 48100->48102 48111 4485e6 48100->48111 48101 4485a6 GetProcAddress 48103 4485b6 __crt_fast_encode_pointer 48101->48103 48102->48098 48102->48101 48103->48098 48105 435036 IsProcessorFeaturePresent 48104->48105 48106 435034 48104->48106 48108 435078 48105->48108 48106->48095 48118 43503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 48108->48118 48110 43515b 48110->48095 48112 448607 LoadLibraryExW 48111->48112 48117 4485fc 48111->48117 48113 448624 GetLastError 48112->48113 48114 44863c 48112->48114 48113->48114 48115 44862f LoadLibraryExW 48113->48115 48116 448653 FreeLibrary 48114->48116 48114->48117 48115->48114 48116->48117 48117->48100 48118->48110 48119 40165e 48120 401666 48119->48120 48121 401669 48119->48121 48122 4016a8 48121->48122 48125 401696 48121->48125 48123 43455e new 22 API calls 48122->48123 48124 40169c 48123->48124 48126 43455e new 22 API calls 48125->48126 48126->48124

                              Control-flow Graph

                              APIs
                              • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                              • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                              • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                              • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                              • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                              • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                              • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                              • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                              • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                              • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                              • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                              • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                              • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD17
                              • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040EA1C), ref: 0041CD28
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD2B
                              • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD3B
                              • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD4B
                              • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040EA1C), ref: 0041CD5D
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD60
                              • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040EA1C), ref: 0041CD6D
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD70
                              • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD84
                              • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD98
                              • LoadLibraryA.KERNELBASE(Rstrtmgr,RmStartSession,?,?,?,?,0040EA1C), ref: 0041CDAA
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CDAD
                              • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040EA1C), ref: 0041CDBA
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CDBD
                              • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040EA1C), ref: 0041CDCA
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CDCD
                              • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040EA1C), ref: 0041CDDA
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CDDD
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$LibraryLoad$HandleModule
                              • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                              • API String ID: 4236061018-3687161714
                              • Opcode ID: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                              • Instruction ID: 87b5fa294a9840a4da0a94e675c49188b16ea4214af7843bc20054d8537ab592
                              • Opcode Fuzzy Hash: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                              • Instruction Fuzzy Hash: 06419AA0E8035879DA107BB65D8DE3B3E5CD9857953614837B05C93550FBBCDC408EAE

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 448 41812a-418153 449 418157-4181be GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 448->449 450 4181c4-4181cb 449->450 451 4184bb 449->451 450->451 452 4181d1-4181d8 450->452 453 4184bd-4184c7 451->453 452->451 454 4181de-4181e0 452->454 454->451 455 4181e6-418213 call 436f10 * 2 454->455 455->451 460 418219-418224 455->460 460->451 461 41822a-41825a CreateProcessW 460->461 462 418260-418288 VirtualAlloc Wow64GetThreadContext 461->462 463 4184b5 GetLastError 461->463 464 41847f-4184b3 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 462->464 465 41828e-4182ae ReadProcessMemory 462->465 463->451 464->451 465->464 466 4182b4-4182d6 NtCreateSection 465->466 466->464 467 4182dc-4182e9 466->467 468 4182eb-4182f6 NtUnmapViewOfSection 467->468 469 4182fc-41831e NtMapViewOfSection 467->469 468->469 470 418320-41835d VirtualFree NtClose TerminateProcess 469->470 471 418368-41838f GetCurrentProcess NtMapViewOfSection 469->471 470->449 472 418363 470->472 471->464 473 418395-418399 471->473 472->451 474 4183a2-4183c0 call 436990 473->474 475 41839b-41839f 473->475 478 418402-41840b 474->478 479 4183c2-4183d0 474->479 475->474 481 41842b-41842f 478->481 482 41840d-418413 478->482 480 4183d2-4183f5 call 436990 479->480 493 4183f7-4183fe 480->493 484 418431-41844e WriteProcessMemory 481->484 485 418454-41846b Wow64SetThreadContext 481->485 482->481 483 418415-418428 call 41853e 482->483 483->481 484->464 488 418450 484->488 485->464 489 41846d-418479 ResumeThread 485->489 488->485 489->464 492 41847b-41847d 489->492 492->453 493->478
                              APIs
                              • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                              • GetProcAddress.KERNEL32(00000000), ref: 00418174
                              • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                              • GetProcAddress.KERNEL32(00000000), ref: 00418188
                              • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                              • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                              • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                              • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                              • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                              • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 0041826A
                              • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,?), ref: 004182A6
                              • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 004182CE
                              • NtUnmapViewOfSection.NTDLL(?,?), ref: 004182F6
                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418316
                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418328
                              • NtClose.NTDLL(?), ref: 00418332
                              • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                              • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                              • NtMapViewOfSection.NTDLL(?,00000000), ref: 00418387
                              • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00418446
                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                              • ResumeThread.KERNELBASE(?), ref: 00418470
                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                              • GetCurrentProcess.KERNEL32(?), ref: 00418492
                              • NtUnmapViewOfSection.NTDLL(00000000), ref: 00418499
                              • NtClose.NTDLL(?), ref: 004184A3
                              • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                              • GetLastError.KERNEL32 ref: 004184B5
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmapWow64$AllocErrorLastReadResumeWrite
                              • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$`Mw$ntdll
                              • API String ID: 3150337530-1701449367
                              • Opcode ID: 270f6f13d6fde63ba60b02dc59acd4711bf4d0802e0e8c14fb5fe4b704ceb149
                              • Instruction ID: d7ba82c79e3f17b97bd8f2c1aaed993f07984c16d96ff77cb9dc1491e823fc6f
                              • Opcode Fuzzy Hash: 270f6f13d6fde63ba60b02dc59acd4711bf4d0802e0e8c14fb5fe4b704ceb149
                              • Instruction Fuzzy Hash: 69A15FB0604305AFDB209F64DD85B6B7BE8FF48705F00482EF685D6291EB78D844CB59

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 542 40f4af-40f4e2 GetModuleFileNameW call 407801 545 40f4e8-40f516 call 401f86 CreateToolhelp32Snapshot Process32FirstW 542->545 546 40f669-40f66d call 41b71b 542->546 552 40f586-40f597 Process32NextW 545->552 549 40f672-40f69d call 401f13 call 401f09 call 411190 546->549 572 40f6a3-40f6f3 CloseHandle call 4020df call 401f04 call 41c516 call 401fab call 401f04 call 4185a3 549->572 573 40f7c9-40f7e1 call 401f09 549->573 554 40f518-40f57b call 40417e call 402305 call 4022ca call 402305 call 409c16 call 40ba07 552->554 555 40f59d-40f5b8 CloseHandle call 407801 552->555 591 40f5c8-40f5d3 call 41c26e 554->591 592 40f57d-40f581 call 401f09 554->592 563 40f664 call 401f09 555->563 564 40f5be-40f5c3 call 401f09 555->564 563->546 564->572 602 40f7a2-40f7b5 call 401fab call 4138b2 572->602 603 40f6f9-40f746 call 40417e call 401fab call 409196 call 401f04 call 4185a3 call 401f09 572->603 597 40f5d8-40f5fd call 401f13 call 401f09 call 407801 591->597 592->552 616 40f616-40f626 call 407801 597->616 617 40f5ff-40f611 call 401f09 * 2 597->617 614 40f7ba-40f7bf 602->614 643 40f748-40f787 call 401fab call 409196 call 401f04 call 4185a3 call 401f09 603->643 644 40f799-40f79d call 401f09 603->644 619 40f7c0-40f7c4 call 401fd8 614->619 628 40f657-40f660 call 401f09 616->628 629 40f628-40f636 call 41c076 616->629 617->573 619->573 628->563 629->628 638 40f638-40f652 call 40b9a7 call 401f09 629->638 638->555 643->644 658 40f789-40f797 call 40d0a4 call 401f09 643->658 644->602 658->619
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F4C9
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00475338), ref: 0040F4F4
                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                              • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F59E
                                • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                              • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F6A9
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                              • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                              • API String ID: 3756808967-1743721670
                              • Opcode ID: da443440b28f1eae5c7b0155bbdce7f5ca32cb0f0e1642a96bb257d71490179a
                              • Instruction ID: 73d50abc618c2a3d6a57d9d5b79267519347fdb4c989691d2635b3abfd1995a7
                              • Opcode Fuzzy Hash: da443440b28f1eae5c7b0155bbdce7f5ca32cb0f0e1642a96bb257d71490179a
                              • Instruction Fuzzy Hash: B5712E705083419AC724FB21D8959AEB7E4AF90348F40483FF586631E3EF79994DCB9A

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 752 443355-443361 call 448d49 755 443383-44338f call 4433da ExitProcess 752->755 756 443363-443371 GetPEB 752->756 756->755 757 443373-44337d GetCurrentProcess TerminateProcess 756->757 757->755
                              APIs
                              • GetCurrentProcess.KERNEL32(00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002,00000000,PkGNG,004461B7,00000003), ref: 00443376
                              • TerminateProcess.KERNEL32(00000000), ref: 0044337D
                              • ExitProcess.KERNEL32 ref: 0044338F
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CurrentExitTerminate
                              • String ID: PkGNG
                              • API String ID: 1703294689-263838557
                              • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                              • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                              • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                              • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 5 40ea00-40ea82 call 41cbe1 GetModuleFileNameW call 40f3fe call 4020f6 * 2 call 41beac call 40fb52 call 401e8d call 43fd50 22 40ea84-40eac9 call 40fbee call 401e65 call 401fab call 410f72 call 40fb9f call 40f3eb 5->22 23 40eace-40eb96 call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->23 48 40ef2d-40ef3e call 401fd8 22->48 69 40eb98-40ebe3 call 406c59 call 401fe2 call 401fd8 call 401fab call 413584 23->69 70 40ebe9-40ec04 call 401e65 call 40b9f8 23->70 69->70 102 40f38a-40f3a5 call 401fab call 4139e4 call 4124b0 69->102 80 40ec06-40ec1c call 401fab call 413584 70->80 81 40ec3e-40ec45 call 40d0a4 70->81 92 40ec21-40ec25 80->92 90 40ec47-40ec49 81->90 91 40ec4e-40ec55 81->91 94 40ef2c 90->94 95 40ec57 91->95 96 40ec59-40ec65 call 41b354 91->96 92->81 98 40ec27-40ec3d call 401fab call 4139e4 92->98 94->48 95->96 103 40ec67-40ec69 96->103 104 40ec6e-40ec72 96->104 98->81 123 40f3aa-40f3db call 41bcef call 401f04 call 413a5e call 401f09 * 2 102->123 103->104 107 40ecb1-40ecc4 call 401e65 call 401fab 104->107 108 40ec74 call 407751 104->108 129 40ecc6 call 407790 107->129 130 40eccb-40ed53 call 401e65 call 41bcef call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 107->130 117 40ec79-40ec7b 108->117 121 40ec87-40ec9a call 401e65 call 401fab 117->121 122 40ec7d-40ec82 call 407773 call 40729b 117->122 121->107 141 40ec9c-40eca2 121->141 122->121 157 40f3e0-40f3ea call 40dd7d call 414f65 123->157 129->130 177 40ed55-40ed6e call 401e65 call 401fab call 43bb56 130->177 178 40edbb-40edbf 130->178 141->107 144 40eca4-40ecaa 141->144 144->107 147 40ecac call 40729b 144->147 147->107 177->178 205 40ed70-40edb6 call 401e65 call 401fab call 401e65 call 401fab call 40da6f call 401f13 call 401f09 177->205 180 40ef41-40efa1 call 436f10 call 40247c call 401fab * 2 call 413733 call 409092 178->180 181 40edc5-40edcc 178->181 236 40efa6-40effa call 401e65 call 401fab call 402093 call 401fab call 4137aa call 401e65 call 401fab call 43bb2c 180->236 184 40ee4a-40ee54 call 409092 181->184 185 40edce-40ee48 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40ce34 181->185 192 40ee59-40ee7d call 40247c call 434829 184->192 185->192 213 40ee8c 192->213 214 40ee7f-40ee8a call 436f10 192->214 205->178 216 40ee8e-40ef03 call 401f04 call 43f859 call 40247c call 401fab call 40247c call 401fab call 413982 call 434832 call 401e65 call 40b9f8 213->216 214->216 216->236 288 40ef09-40ef1e call 401e65 call 41bcef call 40f4af 216->288 286 40f017-40f019 236->286 287 40effc 236->287 290 40f01b-40f01d 286->290 291 40f01f 286->291 289 40effe-40f015 call 41ce2c CreateThread 287->289 304 40ef23-40ef28 288->304 294 40f025-40f101 call 402093 * 2 call 41b580 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409e1f call 401e65 call 401fab 289->294 290->289 291->294 344 40f103-40f13a call 43455e call 401e65 call 401fab CreateThread 294->344 345 40f13c 294->345 304->236 306 40ef2a 304->306 306->94 347 40f13e-40f156 call 401e65 call 401fab 344->347 345->347 357 40f194-40f1a7 call 401e65 call 401fab 347->357 358 40f158-40f18f call 43455e call 401e65 call 401fab CreateThread 347->358 368 40f207-40f21a call 401e65 call 401fab 357->368 369 40f1a9-40f202 call 401e65 call 401fab call 401e65 call 401fab call 40da23 call 401f13 call 401f09 CreateThread 357->369 358->357 380 40f255-40f279 call 41b69e call 401f13 call 401f09 368->380 381 40f21c-40f250 call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 40c19d 368->381 369->368 400 40f27b 380->400 401 40f27e-40f291 CreateThread 380->401 381->380 400->401 404 40f293-40f29d CreateThread 401->404 405 40f29f-40f2a6 401->405 404->405 408 40f2b4-40f2bb 405->408 409 40f2a8-40f2b2 CreateThread 405->409 412 40f2c9 408->412 413 40f2bd-40f2c0 408->413 409->408 418 40f2ce-40f302 call 402093 call 4052fd call 402093 call 41b580 call 401fd8 412->418 415 40f2c2-40f2c7 413->415 416 40f307-40f322 call 401fab call 41353a 413->416 415->418 416->157 428 40f328-40f368 call 41bcef call 401f04 call 413656 call 401f09 call 401f04 416->428 418->416 443 40f381-40f386 DeleteFileW 428->443 444 40f388 443->444 445 40f36a-40f36d 443->445 444->123 445->123 446 40f36f-40f37c Sleep call 401f04 445->446 446->443
                              APIs
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe,00000104), ref: 0040EA29
                                • Part of subcall function 00410F72: __EH_prolog.LIBCMT ref: 00410F77
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                              • String ID: SG$ SG$8SG$8SG$Access Level: $Administrator$C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                              • API String ID: 2830904901-2899466454
                              • Opcode ID: 79650459e22489881e20bfb84aff53065de22de1d9738bf9362af192fed69384
                              • Instruction ID: f870588dacc207cf398a21a9077505b2b75b96970711a81e27f166ce8512e3fa
                              • Opcode Fuzzy Hash: 79650459e22489881e20bfb84aff53065de22de1d9738bf9362af192fed69384
                              • Instruction Fuzzy Hash: 9B32F960B043412BDA24B7729C57B7E26994F80748F50483FB9467B2E3EEBC8D45839E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 494 41c0ac-41c0cf lstrlenW 495 41c0d1-41c0d3 494->495 496 41c10a-41c140 call 436990 FindFirstVolumeW 494->496 498 41c0d7-41c0e9 call 43706a 495->498 501 41c1c7-41c1dd call 43bb56 496->501 502 41c146-41c14e GetLastError 496->502 506 41c0f1-41c100 lstrlenW 498->506 507 41c0eb-41c0ef 498->507 511 41c153-41c158 501->511 512 41c1e3 501->512 504 41c1f9-41c203 502->504 506->496 510 41c102-41c106 506->510 507->506 509 41c108 507->509 509->496 510->498 511->512 513 41c15e-41c164 511->513 514 41c1e8-41c1f6 FindVolumeClose 512->514 513->512 515 41c166-41c16b 513->515 514->504 515->512 516 41c16d-41c172 515->516 516->512 517 41c174-41c196 QueryDosDeviceW 516->517 518 41c261-41c269 GetLastError 517->518 519 41c19c-41c1ad lstrcmpW 517->519 518->514 520 41c213-41c239 GetVolumePathNamesForVolumeNameW 519->520 521 41c1af-41c1c5 FindNextVolumeW 519->521 520->518 522 41c23b-41c25f lstrcatW lstrcpyW 520->522 521->501 523 41c204-41c20f GetLastError 521->523 522->514 523->514 524 41c211 523->524 524->512
                              APIs
                              • lstrlenW.KERNEL32(?), ref: 0041C0C7
                              • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                              • lstrlenW.KERNEL32(?), ref: 0041C0F8
                              • FindFirstVolumeW.KERNELBASE(?,00000104,?), ref: 0041C133
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                              • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                              • lstrcmpW.KERNELBASE(?,?), ref: 0041C1A5
                              • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                              • _wcslen.LIBCMT ref: 0041C1CC
                              • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                              • GetLastError.KERNEL32 ref: 0041C204
                              • GetVolumePathNamesForVolumeNameW.KERNELBASE(?,?,?,?), ref: 0041C231
                              • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                              • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                              • GetLastError.KERNEL32 ref: 0041C261
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                              • String ID: ?
                              • API String ID: 3941738427-1684325040
                              • Opcode ID: a0ce836f87bdb73d1aed96e44626d16fc1f948222461cff8e144d7328d36a715
                              • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                              • Opcode Fuzzy Hash: a0ce836f87bdb73d1aed96e44626d16fc1f948222461cff8e144d7328d36a715
                              • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96

                              Control-flow Graph

                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                              • SetEvent.KERNEL32(?), ref: 00404E43
                              • CloseHandle.KERNELBASE(?), ref: 00404E4C
                              • closesocket.WS2_32(?), ref: 00404E5A
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404E91
                              • SetEvent.KERNEL32(?), ref: 00404EA2
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404EA9
                              • SetEvent.KERNEL32(?), ref: 00404EBA
                              • CloseHandle.KERNEL32(?), ref: 00404EBF
                              • CloseHandle.KERNEL32(?), ref: 00404EC4
                              • SetEvent.KERNEL32(?), ref: 00404ED1
                              • CloseHandle.KERNEL32(?), ref: 00404ED6
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                              • String ID: PkGNG
                              • API String ID: 3658366068-263838557
                              • Opcode ID: 1684f4f73009feb69d70dfcf302ee3e014c0b3edf4bc9f5cbab22c6bf1399946
                              • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                              • Opcode Fuzzy Hash: 1684f4f73009feb69d70dfcf302ee3e014c0b3edf4bc9f5cbab22c6bf1399946
                              • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00413656: RegOpenKeyExW.KERNELBASE(80000001,00000400,00000000,00020019,?,004750E4), ref: 00413678
                                • Part of subcall function 00413656: RegQueryValueExW.KERNELBASE(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                • Part of subcall function 00413656: RegCloseKey.KERNELBASE(?), ref: 004136A0
                                • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                              • _wcslen.LIBCMT ref: 0041B7F4
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                              • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                              • API String ID: 37874593-122982132
                              • Opcode ID: 18828d22db6dc901264db0d68ca479bae690019708f44dbb349cd718a6751edd
                              • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                              • Opcode Fuzzy Hash: 18828d22db6dc901264db0d68ca479bae690019708f44dbb349cd718a6751edd
                              • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D

                              Control-flow Graph

                              APIs
                                • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                • Part of subcall function 004135E1: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00413605
                                • Part of subcall function 004135E1: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00413622
                                • Part of subcall function 004135E1: RegCloseKey.KERNELBASE(?), ref: 0041362D
                              • StrToIntA.SHLWAPI(00000000,0046CA08,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0041B3CD
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCurrentOpenProcessQueryValue
                              • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                              • API String ID: 1866151309-2070987746
                              • Opcode ID: c98b1087101755a38b82246d9aa98e7144fe1c3d7bc526724a740bbc80c710b4
                              • Instruction ID: f33cb4008a08c387480eb48f471200dcc92f04aa72c22424ac0a9b44a4c1d04d
                              • Opcode Fuzzy Hash: c98b1087101755a38b82246d9aa98e7144fe1c3d7bc526724a740bbc80c710b4
                              • Instruction Fuzzy Hash: 8811C47064014926C704B7658C97EFE76198790344F94413BF806A61D3FB6C598683EE

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 731 41c26e-41c290 OpenProcess 732 41c292-41c2a3 OpenProcess 731->732 733 41c2ac-41c2c2 K32GetProcessImageFileNameW 731->733 732->733 734 41c2a5-41c2aa 732->734 735 41c2c4-41c2ca CloseHandle 733->735 736 41c2cc-41c2d8 CloseHandle call 41c0ac 733->736 737 41c2e4-41c2f3 call 40417e 734->737 735->734 739 41c2dd-41c2e3 736->739 739->737
                              APIs
                              • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                              • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                              • K32GetProcessImageFileNameW.KERNEL32(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041C2B9
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2C4
                              • CloseHandle.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 0041C2CC
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseHandleOpen$FileImageName
                              • String ID:
                              • API String ID: 2951400881-0
                              • Opcode ID: 81942e7addce2a1bdc39bfb83f2669cd8d6753e4bd6c5855ff2ce9cbe7850470
                              • Instruction ID: 82f86893bb8475317186349f6084970b7a3011258d8579340058f5d8518f4318
                              • Opcode Fuzzy Hash: 81942e7addce2a1bdc39bfb83f2669cd8d6753e4bd6c5855ff2ce9cbe7850470
                              • Instruction Fuzzy Hash: 9C01F231680215ABD61066949C8AFA7B66C8B84756F0001ABFA08D22A2EF74CD81466A

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 742 4137aa-4137c1 RegCreateKeyA 743 4137c3-4137f8 call 40247c call 401fab RegSetValueExA RegCloseKey 742->743 744 4137fa 742->744 746 4137fc-41380a call 401fd8 743->746 744->746
                              APIs
                              • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046612C), ref: 004137B9
                              • RegSetValueExA.KERNELBASE(0046612C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000), ref: 004137E1
                              • RegCloseKey.ADVAPI32(0046612C,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000,?,00408798,00000001), ref: 004137EC
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: Control Panel\Desktop
                              • API String ID: 1818849710-27424756
                              • Opcode ID: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                              • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                              • Opcode Fuzzy Hash: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                              • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 760 4485e6-4485fa 761 448607-448622 LoadLibraryExW 760->761 762 4485fc-448605 760->762 764 448624-44862d GetLastError 761->764 765 44864b-448651 761->765 763 44865e-448660 762->763 766 44863c 764->766 767 44862f-44863a LoadLibraryExW 764->767 768 448653-448654 FreeLibrary 765->768 769 44865a 765->769 770 44863e-448640 766->770 767->770 768->769 771 44865c-44865d 769->771 770->765 772 448642-448649 770->772 771->763 772->771
                              APIs
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                              • GetLastError.KERNEL32(?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad$ErrorLast
                              • String ID:
                              • API String ID: 3177248105-0
                              • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                              • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                              • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                              • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 773 41c516-41c53a CreateFileW 774 41c540-41c571 GetFileSize call 40244e call 401fab ReadFile 773->774 775 41c53c-41c53e 773->775 781 41c573 774->781 782 41c575-41c57c CloseHandle 774->782 776 41c57e-41c582 775->776 781->782 782->776
                              APIs
                              • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                              • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C543
                              • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C568
                              • CloseHandle.KERNELBASE(00000000,?,00000000,0040412F,00465E84), ref: 0041C576
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleReadSize
                              • String ID:
                              • API String ID: 3919263394-0
                              • Opcode ID: 253de0e05f1e183a51722a251bf095503662c065c08e6289a01aaeef394dcb57
                              • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                              • Opcode Fuzzy Hash: 253de0e05f1e183a51722a251bf095503662c065c08e6289a01aaeef394dcb57
                              • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 783 40d0a4-40d0d0 call 401fab CreateMutexA GetLastError
                              APIs
                              • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                              • GetLastError.KERNEL32 ref: 0040D0BE
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateErrorLastMutex
                              • String ID: SG
                              • API String ID: 1925916568-3189917014
                              • Opcode ID: eabddf02165d7cb7ab60b975d5c9d75332e346c4e6257b5baf50d4a4f7034b19
                              • Instruction ID: 57749e379dff282fb0cfe370275dd79dddcb706c5168e3a31171962593876721
                              • Opcode Fuzzy Hash: eabddf02165d7cb7ab60b975d5c9d75332e346c4e6257b5baf50d4a4f7034b19
                              • Instruction Fuzzy Hash: 0DD012B0605700EBDB186770ED5975839559744702F40487AB50FD99F1CBBC88908519

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 786 4135e1-41360d RegOpenKeyExA 787 413642 786->787 788 41360f-413637 RegQueryValueExA RegCloseKey 786->788 789 413644 787->789 788->789 790 413639-413640 788->790 791 413649-413655 call 402093 789->791 790->791
                              APIs
                              • RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00413605
                              • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00413622
                              • RegCloseKey.KERNELBASE(?), ref: 0041362D
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: 859e64f62c27df18338a46db6ec3b0787647947da56704c1ae6da14bd80b9033
                              • Instruction ID: 0661f39b514c0023b6096d8878825bbc81d19e8e8981dfb5b132c5fecbfe39b6
                              • Opcode Fuzzy Hash: 859e64f62c27df18338a46db6ec3b0787647947da56704c1ae6da14bd80b9033
                              • Instruction Fuzzy Hash: 4A01D676900228FBCB209B91DC08DEF7F7DDB44B51F004066BB05A2240DA748E45DBA4
                              APIs
                              • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,00000000), ref: 004135A4
                              • RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004135C2
                              • RegCloseKey.ADVAPI32(00000000), ref: 004135CD
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                              • Instruction ID: 3ea041f737baa467864e73cd7e114674dd940ed34319bd14b5ec79364d8ab256
                              • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                              • Instruction Fuzzy Hash: 39F01D76900218FFDF109FA09C45FEE7BBDEB04B11F1044A5BA04E6191D6359F549B94
                              APIs
                              • RegOpenKeyExW.KERNELBASE(80000001,00000400,00000000,00020019,?,004750E4), ref: 00413678
                              • RegQueryValueExW.KERNELBASE(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                              • RegCloseKey.KERNELBASE(?), ref: 004136A0
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: 65d225e62495b603b94ecda2ada9fe67bc436a3b870d946b60a27cc720c1bdd3
                              • Instruction ID: b2ddc0a972744091932d43abea1e646d3cdf78111d27e2b843060007377f7c4f
                              • Opcode Fuzzy Hash: 65d225e62495b603b94ecda2ada9fe67bc436a3b870d946b60a27cc720c1bdd3
                              • Instruction Fuzzy Hash: B7F04F75600218FBDF209B90DC05FDD7B7CEB04B15F1040A2BA45B5291DB749F949BA8
                              APIs
                              • RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                              • RegSetValueExA.KERNELBASE(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                              • RegCloseKey.KERNELBASE(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID:
                              • API String ID: 1818849710-0
                              • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                              • Instruction ID: 04d77b696783773a8a307df6842786532c8303179302b097fa31242bc3118ae5
                              • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                              • Instruction Fuzzy Hash: 1EE06D72500318FBDF109FA0DC06FEA7BACEF04B62F104565BF09A6191D6358E14E7A8
                              APIs
                              • GetProcAddress.KERNEL32(00000000,?), ref: 004485AA
                              • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004485B7
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc__crt_fast_encode_pointer
                              • String ID:
                              • API String ID: 2279764990-0
                              • Opcode ID: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                              • Instruction ID: be9fc4cf4793659cabcfb8eeb6b3f823a3a139bea871a56029073562aa2b3f0c
                              • Opcode Fuzzy Hash: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                              • Instruction Fuzzy Hash: 4B110637A00220BBFB229F1DDC4096F7395AB84364716866AFD19EB354DF34EC4186D9
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                              • Instruction ID: 1e9d0a06bdb6e9f7b23a96960dfc4b712b0be9606a3b942e14a6d4fe6a34620f
                              • Opcode Fuzzy Hash: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                              • Instruction Fuzzy Hash: EBF0E2706042016BCB0C8B34CD50B2A37954B84325F248F7FF02BD61E0C73EC8918A0D
                              APIs
                              • RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                              • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                              • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                              • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                              APIs
                              • std::_Deallocate.LIBCONCRT ref: 00402E2B
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Deallocatestd::_
                              • String ID:
                              • API String ID: 1323251999-0
                              • Opcode ID: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                              • Instruction ID: a1ed0c2070530d0d1545540182683da5b3cb4a6c90a46b83737b9b29f97d9faa
                              • Opcode Fuzzy Hash: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                              • Instruction Fuzzy Hash: FFB092364442007ACA026640AC86F5EB762ABA4710F14C92ABA9A281E2D6B74268A647
                              APIs
                              • SetEvent.KERNEL32(?,?), ref: 00407CF4
                              • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                              • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                                • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C37D
                                • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C3AD
                                • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C402
                                • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C463
                                • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C46A
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                              • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004082B3
                              • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                              • DeleteFileA.KERNEL32(?), ref: 0040868D
                                • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                                • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                              • Sleep.KERNEL32(000007D0), ref: 00408733
                              • StrToIntA.SHLWAPI(00000000,00000000), ref: 00408775
                                • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                              • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                              • API String ID: 1067849700-181434739
                              • Opcode ID: 386568ea35fe2c71690d1af1043c536d771b930e6ed81d06046e5373954323ac
                              • Instruction ID: f533dcafa702064eae222fc9ff54aa9327b172b3479e3db69e1c842a3252ef64
                              • Opcode Fuzzy Hash: 386568ea35fe2c71690d1af1043c536d771b930e6ed81d06046e5373954323ac
                              • Instruction Fuzzy Hash: F04293716043016BC604FB76C9579AE77A9AF91348F80483FF542671E2EF7C9908879B
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 004056E6
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              • __Init_thread_footer.LIBCMT ref: 00405723
                              • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660CC,00000000), ref: 004057B6
                              • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                              • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                              • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                              • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660D0,00000062,004660B4), ref: 004059E4
                              • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                              • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                              • CloseHandle.KERNEL32 ref: 00405A23
                              • CloseHandle.KERNEL32 ref: 00405A2B
                              • CloseHandle.KERNEL32 ref: 00405A3D
                              • CloseHandle.KERNEL32 ref: 00405A45
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                              • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                              • API String ID: 2994406822-18413064
                              • Opcode ID: f51e1e407a3c6e3a44d55a1067086f8f81688e0a34343b3d0a2006916af40dd3
                              • Instruction ID: feb7c3e087fbbfe745e3798ef664df189eb35a760580a6c3fca7c2e5343dee52
                              • Opcode Fuzzy Hash: f51e1e407a3c6e3a44d55a1067086f8f81688e0a34343b3d0a2006916af40dd3
                              • Instruction Fuzzy Hash: 1A91C271604604AFD711FB36ED42A6B369AEB84308F01443FF589A62E2DB7D9C448F6D
                              APIs
                              • GetCurrentProcessId.KERNEL32 ref: 00412141
                                • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                • Part of subcall function 004138B2: RegSetValueExA.KERNELBASE(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                • Part of subcall function 004138B2: RegCloseKey.KERNELBASE(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                              • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412181
                              • CloseHandle.KERNEL32(00000000), ref: 00412190
                              • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                              • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                              • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                              • API String ID: 3018269243-13974260
                              • Opcode ID: 992cc6f92d6e85284a8e701518c9770b8fd1494ee384fb4326f65339fdeae364
                              • Instruction ID: f1b014459f2de55ad39b9ce4e2eab06dd530905b6b6ad57ecd0cf2e75cce6712
                              • Opcode Fuzzy Hash: 992cc6f92d6e85284a8e701518c9770b8fd1494ee384fb4326f65339fdeae364
                              • Instruction Fuzzy Hash: B971A23160430167C614FB72CD579AE77A4AE94308F40097FF586A21E2FFBC9A49C69E
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                              • FindClose.KERNEL32(00000000), ref: 0040BC04
                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                              • FindClose.KERNEL32(00000000), ref: 0040BD4D
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                              • API String ID: 1164774033-3681987949
                              • Opcode ID: b41a8e288d6c781c84b11b836a0024b7a118f79960b3641b573c725179fdc384
                              • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                              • Opcode Fuzzy Hash: b41a8e288d6c781c84b11b836a0024b7a118f79960b3641b573c725179fdc384
                              • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                              APIs
                              • OpenClipboard.USER32 ref: 004168FD
                              • EmptyClipboard.USER32 ref: 0041690B
                              • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                              • GlobalLock.KERNEL32(00000000), ref: 00416934
                              • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                              • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                              • CloseClipboard.USER32 ref: 00416990
                              • OpenClipboard.USER32 ref: 00416997
                              • GetClipboardData.USER32(0000000D), ref: 004169A7
                              • GlobalLock.KERNEL32(00000000), ref: 004169B0
                              • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                              • CloseClipboard.USER32 ref: 004169BF
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                              • String ID: !D@
                              • API String ID: 3520204547-604454484
                              • Opcode ID: 22014e37a0533ad6d5301b9a6db5ea665297cd973015afcf0188733ddc164352
                              • Instruction ID: 548dc4d81477911aad8e8b192ef25fd2d65b79b2884d290c2f7190e4363fe536
                              • Opcode Fuzzy Hash: 22014e37a0533ad6d5301b9a6db5ea665297cd973015afcf0188733ddc164352
                              • Instruction Fuzzy Hash: 23215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                              • FindClose.KERNEL32(00000000), ref: 0040BE04
                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                              • FindClose.KERNEL32(00000000), ref: 0040BEEA
                              • FindClose.KERNEL32(00000000), ref: 0040BF0B
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$Close$File$FirstNext
                              • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                              • API String ID: 3527384056-432212279
                              • Opcode ID: 957e4b9f77f0127c971f2cbaa54e22c6f4c97dcdb1298e2b7e9e5f591e6deb8c
                              • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                              • Opcode Fuzzy Hash: 957e4b9f77f0127c971f2cbaa54e22c6f4c97dcdb1298e2b7e9e5f591e6deb8c
                              • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                              APIs
                              • __EH_prolog.LIBCMT ref: 0041A04A
                              • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 0041A07C
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                              • Sleep.KERNEL32(000003E8), ref: 0041A18E
                              • GetLocalTime.KERNEL32(?), ref: 0041A196
                              • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                              • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                              • API String ID: 489098229-1431523004
                              • Opcode ID: 2b4183d8bba473354f186d6fd22040c2ea42666b5de8bb998ac3c21ef9cf795b
                              • Instruction ID: 12d64888f2a2aa40a87de1a625a26b3edd7a2139bf4817292c9f8cf1352d8a2d
                              • Opcode Fuzzy Hash: 2b4183d8bba473354f186d6fd22040c2ea42666b5de8bb998ac3c21ef9cf795b
                              • Instruction Fuzzy Hash: 7A517D70A002159ACB14BBB5C8529FD77A9AF54308F40407FF509AB1E2EF7C9D85C799
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0$1$2$3$4$5$6$7$VG
                              • API String ID: 0-1861860590
                              • Opcode ID: 23e062be4493d8f612a0f73d7cec249050aa78cf65a3b1cbc455386ce95aeb4f
                              • Instruction ID: 7133b754bba813e7b371628f59950815dc208a5c28e1558ec9b3f3725e93ffbd
                              • Opcode Fuzzy Hash: 23e062be4493d8f612a0f73d7cec249050aa78cf65a3b1cbc455386ce95aeb4f
                              • Instruction Fuzzy Hash: 9171E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                              APIs
                              • _wcslen.LIBCMT ref: 0040755C
                              • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Object_wcslen
                              • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                              • API String ID: 240030777-3166923314
                              • Opcode ID: ee0c587a1dfa56a4776c25ed63fc93c62e7d4b1650b4331978f6b80fa64f11fb
                              • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                              • Opcode Fuzzy Hash: ee0c587a1dfa56a4776c25ed63fc93c62e7d4b1650b4331978f6b80fa64f11fb
                              • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                              APIs
                              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A7EF
                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                              • GetLastError.KERNEL32 ref: 0041A84C
                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: EnumServicesStatus$ErrorLastManagerOpen
                              • String ID:
                              • API String ID: 3587775597-0
                              • Opcode ID: b4f2e3a96ffad31793e55c3957a9d7d505f7fea0f7d1b1d8364ea5c68624dc3d
                              • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                              • Opcode Fuzzy Hash: b4f2e3a96ffad31793e55c3957a9d7d505f7fea0f7d1b1d8364ea5c68624dc3d
                              • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                              • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045279C
                              • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                              • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                              • GetLocaleInfoW.KERNEL32(?,00001001,JD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                              • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 0045286D
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                              • String ID: JD$JD$JD
                              • API String ID: 745075371-3517165026
                              • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                              • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                              • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                              • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                              • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                              • FindClose.KERNEL32(00000000), ref: 0040C4B8
                              • FindClose.KERNEL32(00000000), ref: 0040C4E3
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                              • API String ID: 1164774033-405221262
                              • Opcode ID: 4169ffd3f28e2297937e5de7748edea37615030425ded00ed2c5c169ca4bc7f2
                              • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                              • Opcode Fuzzy Hash: 4169ffd3f28e2297937e5de7748edea37615030425ded00ed2c5c169ca4bc7f2
                              • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                              • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                              • GetLastError.KERNEL32 ref: 0040A328
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A376
                              • TranslateMessage.USER32(?), ref: 0040A385
                              • DispatchMessageA.USER32(?), ref: 0040A390
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                              • String ID: Keylogger initialization failure: error $`Mw
                              • API String ID: 3219506041-1277971878
                              • Opcode ID: d8c8387710f3476d83fdaf4ec3d7d354e2c1b68a13aa6285ca24eae745b098e4
                              • Instruction ID: 8743f2250fb8cae6a99ae5fb3d4b34fe2baf279f6720e4878f05ffc9670b3ffc
                              • Opcode Fuzzy Hash: d8c8387710f3476d83fdaf4ec3d7d354e2c1b68a13aa6285ca24eae745b098e4
                              • Instruction Fuzzy Hash: 6011BF31510301EBC710BB769D0986B77ACEA95715B20097EFC82E22D1EB34C910CBAA
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C37D
                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C3AD
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00474EE0,?), ref: 0041C41F
                              • DeleteFileW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C42C
                                • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C402
                              • GetLastError.KERNEL32(?,?,?,?,?,00474EE0,?), ref: 0041C44D
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C463
                              • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C46A
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C473
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                              • String ID:
                              • API String ID: 2341273852-0
                              • Opcode ID: 62a2abd498f26ce669d7ffff052401bb4e8331d26592ec8f44b35c1b9ec2a307
                              • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                              • Opcode Fuzzy Hash: 62a2abd498f26ce669d7ffff052401bb4e8331d26592ec8f44b35c1b9ec2a307
                              • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                              • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                                • Part of subcall function 0041C516: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Find$CreateFirstNext
                              • String ID: 8SG$PXG$PXG$NG$PG
                              • API String ID: 341183262-3812160132
                              • Opcode ID: cd9425940f8db8ef2b08a2b33307d693326731427aae5be40ce922e7e20f00f0
                              • Instruction ID: 0eaaaed992bec346a468a6d62c1d6888972f0568f5be94e2eef244f320132bd5
                              • Opcode Fuzzy Hash: cd9425940f8db8ef2b08a2b33307d693326731427aae5be40ce922e7e20f00f0
                              • Instruction Fuzzy Hash: 998151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                              APIs
                              • GetForegroundWindow.USER32 ref: 0040A451
                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                              • GetKeyboardLayout.USER32(00000000), ref: 0040A464
                              • GetKeyState.USER32(00000010), ref: 0040A46E
                              • GetKeyboardState.USER32(?), ref: 0040A479
                              • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                              • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                              • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A535
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                              • String ID:
                              • API String ID: 1888522110-0
                              • Opcode ID: 6b13a39d4d7102bd722f9bbc25ae7d3563ebcd6996124b6635e543b06ec7d5c4
                              • Instruction ID: fd17a64e9e4f7f825196359ceba3421c6f582a70c0a4c9d277f8a97da3dc7bda
                              • Opcode Fuzzy Hash: 6b13a39d4d7102bd722f9bbc25ae7d3563ebcd6996124b6635e543b06ec7d5c4
                              • Instruction Fuzzy Hash: 1E316D72504308BFD700DF90DC45F9B7BECBB88744F00083AB645D61A0D7B5E9498BA6
                              APIs
                              • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140D8
                              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140E4
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004142A5
                              • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressCloseCreateLibraryLoadProcsend
                              • String ID: SHDeleteKeyW$Shlwapi.dll
                              • API String ID: 2127411465-314212984
                              • Opcode ID: 79fdb5d939c4fda9ab65d5331e207ccd9125177c2b07759bb8af03fe36f6d8de
                              • Instruction ID: 51cedef5a77654bf04fe1bae55708f30d4330cefe0c145b830acf249c6506b6e
                              • Opcode Fuzzy Hash: 79fdb5d939c4fda9ab65d5331e207ccd9125177c2b07759bb8af03fe36f6d8de
                              • Instruction Fuzzy Hash: 16B1F671A0430066CA14FB76DC579AF36A85F91788F40053FB906771E2EE7D8A48C6DA
                              APIs
                              • _free.LIBCMT ref: 00449292
                              • _free.LIBCMT ref: 004492B6
                              • _free.LIBCMT ref: 0044943D
                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                              • _free.LIBCMT ref: 00449609
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ByteCharMultiWide$InformationTimeZone
                              • String ID:
                              • API String ID: 314583886-0
                              • Opcode ID: 99b9f95825b3d3947f98974b62c5657870841952fc290d3d865075dfb712b2e8
                              • Instruction ID: 020e1479f4dc59d8c1013f8997fe2690be381d41ecad25fd3e4808fcef6bdafa
                              • Opcode Fuzzy Hash: 99b9f95825b3d3947f98974b62c5657870841952fc290d3d865075dfb712b2e8
                              • Instruction Fuzzy Hash: E0C13A71900205ABFB24DF79CD41AAF7BA8EF46314F2405AFE884D7291E7788D42D758
                              APIs
                                • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                              • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                              • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 004168A6
                              • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                              • String ID: !D@$PowrProf.dll$SetSuspendState
                              • API String ID: 1589313981-2876530381
                              • Opcode ID: ee499d4d47afde6cc3500bc760edfd9f3d73b5503f1d67301f657f5df503f6e6
                              • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                              • Opcode Fuzzy Hash: ee499d4d47afde6cc3500bc760edfd9f3d73b5503f1d67301f657f5df503f6e6
                              • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                              APIs
                              • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                              • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                              • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                              • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                              • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                              Strings
                              • http://geoplugin.net/json.gp, xrefs: 0041B448
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internet$CloseHandleOpen$FileRead
                              • String ID: http://geoplugin.net/json.gp
                              • API String ID: 3121278467-91888290
                              • Opcode ID: b01590e2803785cbe291e15456c0bc7acaef33a62877e88be574051367ac5976
                              • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                              • Opcode Fuzzy Hash: b01590e2803785cbe291e15456c0bc7acaef33a62877e88be574051367ac5976
                              • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA
                              APIs
                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                              • GetLastError.KERNEL32 ref: 0040BA93
                              Strings
                              • [Chrome StoredLogins not found], xrefs: 0040BAAD
                              • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                              • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                              • UserProfile, xrefs: 0040BA59
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteErrorFileLast
                              • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                              • API String ID: 2018770650-1062637481
                              • Opcode ID: d6312413c91956911aeebdf781d371ca6745e6f6be180b60b08b021ffbe32e09
                              • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                              • Opcode Fuzzy Hash: d6312413c91956911aeebdf781d371ca6745e6f6be180b60b08b021ffbe32e09
                              • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                              APIs
                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                              • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                              • GetLastError.KERNEL32 ref: 004179D8
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                              • String ID: SeShutdownPrivilege
                              • API String ID: 3534403312-3733053543
                              • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                              • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                              • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                              • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                              APIs
                              • __EH_prolog.LIBCMT ref: 00409293
                                • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                              • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                              • FindClose.KERNEL32(00000000), ref: 004093FC
                                • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                                • Part of subcall function 00404E26: SetEvent.KERNEL32(?), ref: 00404E43
                                • Part of subcall function 00404E26: CloseHandle.KERNELBASE(?), ref: 00404E4C
                              • FindClose.KERNEL32(00000000), ref: 004095F4
                                • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                              • String ID:
                              • API String ID: 1824512719-0
                              • Opcode ID: a810edf30761c72987c4cb58374515ca85b7de027ac2e2c904d565530509331a
                              • Instruction ID: 89df7f8b75d3b77417eb58d09b4f39b7dfb13bde992cfd9524fc7595df83f5be
                              • Opcode Fuzzy Hash: a810edf30761c72987c4cb58374515ca85b7de027ac2e2c904d565530509331a
                              • Instruction Fuzzy Hash: 34B19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: FSE$FSE$PkGNG
                              • API String ID: 0-1266307253
                              • Opcode ID: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                              • Instruction ID: f88ef0336175cd1615890b4a552d96ffb4623b3c947145a2eaf1ae153763923c
                              • Opcode Fuzzy Hash: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                              • Instruction Fuzzy Hash: AA025D71E002199BEF14CFA9D8806AEFBF1FF49314F26816AD819E7384D734AD418B85
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                              • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                              • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                              • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                              • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ManagerStart
                              • String ID:
                              • API String ID: 276877138-0
                              • Opcode ID: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                              • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                              • Opcode Fuzzy Hash: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                              • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                              APIs
                                • Part of subcall function 00413584: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,00000000), ref: 004135A4
                                • Part of subcall function 00413584: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004135C2
                                • Part of subcall function 00413584: RegCloseKey.ADVAPI32(00000000), ref: 004135CD
                              • Sleep.KERNEL32(00000BB8), ref: 0040F896
                              • ExitProcess.KERNEL32 ref: 0040F905
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseExitOpenProcessQuerySleepValue
                              • String ID: 5.1.3 Pro$override$pth_unenc
                              • API String ID: 2281282204-1392497409
                              • Opcode ID: b03823e6d7a1939832695edbca538e9326227c7cb22747d0e4ffc58481ea478f
                              • Instruction ID: d275b5d15c9ff05a0ec0da3c9587874d7690dc7fa5d0ec02d6e8a4ede61593ab
                              • Opcode Fuzzy Hash: b03823e6d7a1939832695edbca538e9326227c7cb22747d0e4ffc58481ea478f
                              • Instruction Fuzzy Hash: 5921E171B0420127D6087676885B6AE399A9B80708F50453FF409672D7FF7C8E0483AF
                              APIs
                              • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 00452555
                              • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 0045257E
                              • GetACP.KERNEL32(?,?,004527DB,?,00000000), ref: 00452593
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID: ACP$OCP
                              • API String ID: 2299586839-711371036
                              • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                              • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                              • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                              • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                              APIs
                              • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B54A
                              • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                              • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                              • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Resource$FindLoadLockSizeof
                              • String ID: SETTINGS
                              • API String ID: 3473537107-594951305
                              • Opcode ID: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                              • Instruction ID: d04f7a3eece584ab18b37ce022e38df3785cd6d6757b7dd0dc659012c7d5cbc3
                              • Opcode Fuzzy Hash: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                              • Instruction Fuzzy Hash: 8EE01A76600B22EBEB211BB1AC4CD863E29F7C97637140075F90586231CB798840DA98
                              APIs
                              • __EH_prolog.LIBCMT ref: 004096A5
                              • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                              • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseFirstH_prologNext
                              • String ID:
                              • API String ID: 1157919129-0
                              • Opcode ID: dd0421224294bb62472ab89505622d6763c67607e6c73e6d1c5958e8fabc376b
                              • Instruction ID: 8e52766585a78a9bd0f7e398a9017c7fe376444e683812dd136b20495b515571
                              • Opcode Fuzzy Hash: dd0421224294bb62472ab89505622d6763c67607e6c73e6d1c5958e8fabc376b
                              • Instruction Fuzzy Hash: 7F814C328001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                              APIs
                              • __EH_prolog.LIBCMT ref: 0040884C
                              • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                              • String ID:
                              • API String ID: 1771804793-0
                              • Opcode ID: 3108295a3ea490f6f4279643bcf91a98a4e8460a72a47f708dfbc03d5f7be2ca
                              • Instruction ID: 0d5560aa06bbfb8d15084ed76e809f646cede1ce68103026aeaac9ba950e1e68
                              • Opcode Fuzzy Hash: 3108295a3ea490f6f4279643bcf91a98a4e8460a72a47f708dfbc03d5f7be2ca
                              • Instruction Fuzzy Hash: 9D517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB89
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                              • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: DownloadExecuteFileShell
                              • String ID: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe$open
                              • API String ID: 2825088817-3706671650
                              • Opcode ID: 25f93c1eb8c7c2b3408b92261e90d72d92bad6cdb28d287bebca9ae006ad5217
                              • Instruction ID: 89f65c5a2840bfed21b3c91f130df949caec66636536da5e2ea9f2eef63816fc
                              • Opcode Fuzzy Hash: 25f93c1eb8c7c2b3408b92261e90d72d92bad6cdb28d287bebca9ae006ad5217
                              • Instruction Fuzzy Hash: 5261B371A0830166CA14FB76C8569BE37A59F81758F40093FB9427B2D3EE3C9905C69B
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                              • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$FirstNextsend
                              • String ID: XPG$XPG
                              • API String ID: 4113138495-1962359302
                              • Opcode ID: f1a52394f1a986f7dbfcef978ba307d27b987f60840b982f2ffdd03438d5e8df
                              • Instruction ID: fedc3c23448d2be437c2d68ef58725aa3c97e5c0e74d328490a6b39f64eed896
                              • Opcode Fuzzy Hash: f1a52394f1a986f7dbfcef978ba307d27b987f60840b982f2ffdd03438d5e8df
                              • Instruction Fuzzy Hash: 2D21A4315083015BC714FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA098A5B
                              APIs
                              • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046612C), ref: 004137B9
                                • Part of subcall function 004137AA: RegSetValueExA.KERNELBASE(0046612C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000), ref: 004137E1
                                • Part of subcall function 004137AA: RegCloseKey.ADVAPI32(0046612C,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000,?,00408798,00000001), ref: 004137EC
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateInfoParametersSystemValue
                              • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                              • API String ID: 4127273184-3576401099
                              • Opcode ID: 151fde30394074386c3475a809e11d1a6336c1573d3ef2cd27d1ca554eb4e09d
                              • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                              • Opcode Fuzzy Hash: 151fde30394074386c3475a809e11d1a6336c1573d3ef2cd27d1ca554eb4e09d
                              • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444AF4,?,?,?,?,?,?,00000004), ref: 00451E3A
                              • _wcschr.LIBVCRUNTIME ref: 00451ECA
                              • _wcschr.LIBVCRUNTIME ref: 00451ED8
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00444AF4,00000000,00444C14), ref: 00451F7B
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                              • String ID:
                              • API String ID: 4212172061-0
                              • Opcode ID: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                              • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                              • Opcode Fuzzy Hash: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                              • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • EnumSystemLocalesW.KERNEL32(00452143,00000001,00000000,?,JD,?,00452770,00000000,?,?,?), ref: 0045208D
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID: p'E$JD
                              • API String ID: 1084509184-908320845
                              • Opcode ID: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                              • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                              • Opcode Fuzzy Hash: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                              • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorInfoLastLocale$_free$_abort
                              • String ID:
                              • API String ID: 2829624132-0
                              • Opcode ID: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                              • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                              • Opcode Fuzzy Hash: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                              • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 0043BC69
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC73
                              • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC80
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                              • String ID:
                              • API String ID: 3906539128-0
                              • Opcode ID: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                              • Instruction ID: 25e88f5a56b9fbea854716c485460a06fbe33a825339a9765be54c88dd7cea35
                              • Opcode Fuzzy Hash: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                              • Instruction Fuzzy Hash: 0431D374901218ABCB21DF65D9887CDBBB8EF0C311F5051EAE81CA7251EB749F818F48
                              APIs
                              • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,?,00433550,00000034,?,?,00000000), ref: 004338DA
                              • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,PkGNG,004335E3,?,?,?), ref: 004338F0
                              • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,PkGNG,004335E3,?,?,?,0041E2E2), ref: 00433902
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Crypt$Context$AcquireRandomRelease
                              • String ID:
                              • API String ID: 1815803762-0
                              • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                              • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                              • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                              • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                              APIs
                              • OpenClipboard.USER32(00000000), ref: 0040B74C
                              • GetClipboardData.USER32(0000000D), ref: 0040B758
                              • CloseClipboard.USER32 ref: 0040B760
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$CloseDataOpen
                              • String ID:
                              • API String ID: 2058664381-0
                              • Opcode ID: 26d649817908997ada01c7e81b47d9ed8d660a846a8981428adfc510ab3c4a2f
                              • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                              • Opcode Fuzzy Hash: 26d649817908997ada01c7e81b47d9ed8d660a846a8981428adfc510ab3c4a2f
                              • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                              APIs
                              • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434CCF
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: FeaturePresentProcessor
                              • String ID:
                              • API String ID: 2325560087-3916222277
                              • Opcode ID: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                              • Instruction ID: 5e37b39ef68b784d6588b9ddffa6793edf4c3ade0924e8be62ba08be237937aa
                              • Opcode Fuzzy Hash: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                              • Instruction Fuzzy Hash: E4515B71D002488FEB24CF69D98579EBBF4FB88314F24956BD419EB264D378A940CF98
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: .
                              • API String ID: 0-248832578
                              • Opcode ID: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                              • Instruction ID: 7baa6cf80f4bdea99dbc4d330b45aada8194c6230f36d830dc1b60d3871032d3
                              • Opcode Fuzzy Hash: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                              • Instruction Fuzzy Hash: DF3107B1900259AFEB24DE7ACC84EFB7BBDEB46318F0401AEF41897291E6349D418B54
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • EnumSystemLocalesW.KERNEL32(00452393,00000001,?,?,JD,?,00452734,JD,?,?,?,?,?,00444AED,?,?), ref: 00452102
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID: JD
                              • API String ID: 1084509184-2669065882
                              • Opcode ID: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                              • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                              • Opcode Fuzzy Hash: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                              • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                              APIs
                              • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID: GetLocaleInfoEx
                              • API String ID: 2299586839-2904428671
                              • Opcode ID: 110c46932bfbdc71483985bf7c59ae7b5a80d23a28ef7d8b7feaf75df53ed1b9
                              • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                              • Opcode Fuzzy Hash: 110c46932bfbdc71483985bf7c59ae7b5a80d23a28ef7d8b7feaf75df53ed1b9
                              • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,00000000), ref: 00412122
                              • HeapFree.KERNEL32(00000000,?,?,?,?,00000000), ref: 00412129
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$FreeProcess
                              • String ID:
                              • API String ID: 3859560861-0
                              • Opcode ID: 95356b50ae1c40d028bb7c10486cf6eec28d3cbd66e590edfc92b155960a397c
                              • Instruction ID: dd486cb6b879bf1be37f4e59d5b3b18419fca2aff5c7e471244091183f2ba527
                              • Opcode Fuzzy Hash: 95356b50ae1c40d028bb7c10486cf6eec28d3cbd66e590edfc92b155960a397c
                              • Instruction Fuzzy Hash: 0D113632000B11AFC7309F54DE85957BBEAFF08715305892EF29682922CB75FCA0CB48
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free$InfoLocale_abort
                              • String ID:
                              • API String ID: 1663032902-0
                              • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                              • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                              • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                              • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$InfoLocale_abort_free
                              • String ID:
                              • API String ID: 2692324296-0
                              • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                              • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                              • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                              • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                              APIs
                              • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: NameUser
                              • String ID:
                              • API String ID: 2645101109-0
                              • Opcode ID: 6f8df8ca086827d3b7a07e2ceec29cc063485458526563a8914dedb1098b546b
                              • Instruction ID: 8360233331794fbd8bccde093e114755ab2a7c2896376219b9d5f45c8fb32f7b
                              • Opcode Fuzzy Hash: 6f8df8ca086827d3b7a07e2ceec29cc063485458526563a8914dedb1098b546b
                              • Instruction Fuzzy Hash: 90014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E88CBA8
                              APIs
                                • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(?,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                              • EnumSystemLocalesW.KERNEL32(0044843E,00000001,0046EAE0,0000000C), ref: 004484BC
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalEnterEnumLocalesSectionSystem
                              • String ID:
                              • API String ID: 1272433827-0
                              • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                              • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                              • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                              • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • EnumSystemLocalesW.KERNEL32(00451F27,00000001,?,?,?,00452792,JD,?,?,?,?,?,00444AED,?,?,?), ref: 00452007
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID:
                              • API String ID: 1084509184-0
                              • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                              • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                              • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                              • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                              APIs
                              • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.3 Pro), ref: 0040F920
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID:
                              • API String ID: 2299586839-0
                              • Opcode ID: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                              • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                              • Opcode Fuzzy Hash: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                              • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_00034BE4,0043490B), ref: 00434BDD
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                              • Instruction ID: 702e07acd891e046c8aea5fc6397425f5e3bd38ef0af78e1c7fed93ac6412050
                              • Opcode Fuzzy Hash: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                              • Instruction Fuzzy Hash:
                              APIs
                              • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                              • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                                • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                              • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                              • DeleteDC.GDI32(00000000), ref: 00418F65
                              • DeleteDC.GDI32(00000000), ref: 00418F68
                              • DeleteObject.GDI32(00000000), ref: 00418F6B
                              • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                              • DeleteDC.GDI32(00000000), ref: 00418F9D
                              • DeleteDC.GDI32(00000000), ref: 00418FA0
                              • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                              • GetIconInfo.USER32(?,?), ref: 00418FF8
                              • DeleteObject.GDI32(?), ref: 00419027
                              • DeleteObject.GDI32(?), ref: 00419034
                              • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                              • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00419077
                              • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                              • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                              • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                              • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                              • DeleteDC.GDI32(?), ref: 004191B7
                              • DeleteDC.GDI32(00000000), ref: 004191BA
                              • DeleteObject.GDI32(00000000), ref: 004191BD
                              • GlobalFree.KERNEL32(?), ref: 004191C8
                              • DeleteObject.GDI32(00000000), ref: 0041927C
                              • GlobalFree.KERNEL32(?), ref: 00419283
                              • DeleteDC.GDI32(?), ref: 00419293
                              • DeleteDC.GDI32(00000000), ref: 0041929E
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                              • String ID: DISPLAY
                              • API String ID: 479521175-865373369
                              • Opcode ID: a3a4741cb06b3bb280ebd52fb29a8cd3e9580c118e1ba6673d441af15fd395ed
                              • Instruction ID: e1b8f987aa81746083de8242de432fb1856ba331ec6d7e725e66c1191a76d441
                              • Opcode Fuzzy Hash: a3a4741cb06b3bb280ebd52fb29a8cd3e9580c118e1ba6673d441af15fd395ed
                              • Instruction Fuzzy Hash: 64C14C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                              APIs
                                • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                              • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                                • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,00000000,?,0040D47D,?,00000000), ref: 0040B8F6
                                • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,0040D47D,?,00000000), ref: 0040B910
                                • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                              • ExitProcess.KERNEL32 ref: 0040D80B
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                              • String ID: """, 0$")$8SG$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                              • API String ID: 1861856835-1447701601
                              • Opcode ID: 794eba10b69094c6990f25edb43bc5f181c5c90267341265794d1b1851e37820
                              • Instruction ID: 9f807323933333198641953f201c1fc8368d74e19fdabe041c5449f7db564f80
                              • Opcode Fuzzy Hash: 794eba10b69094c6990f25edb43bc5f181c5c90267341265794d1b1851e37820
                              • Instruction Fuzzy Hash: 8791B0716082005AC315FB62D8529AF77A8AFD4309F10443FB64AA71E3EF7C9D49C65E
                              APIs
                                • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E0
                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                              • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D223
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D232
                                • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,00000000,?,0040D47D,?,00000000), ref: 0040B8F6
                                • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,0040D47D,?,00000000), ref: 0040B910
                                • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                              • ExitProcess.KERNEL32 ref: 0040D454
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                              • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xpF
                              • API String ID: 3797177996-2483056239
                              • Opcode ID: ec03f19f21437d373cc1d96c9dd98b1915d83cb06e604dc6ef52706e93ab3566
                              • Instruction ID: f7f00373e35faeae073ffedb9d5543756e5675edee5c5b567d0d61755fae189b
                              • Opcode Fuzzy Hash: ec03f19f21437d373cc1d96c9dd98b1915d83cb06e604dc6ef52706e93ab3566
                              • Instruction Fuzzy Hash: 6181AF716082405AC315FB62D8529AF77A8AFD0308F10483FB58A671E3EF7C9E49C65E
                              APIs
                              • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 004124CF
                              • ExitProcess.KERNEL32(00000000), ref: 004124DB
                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                              • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                              • CloseHandle.KERNEL32(00000000), ref: 00412576
                              • GetCurrentProcessId.KERNEL32 ref: 0041257C
                              • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                              • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                              • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                              • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                                • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                              • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                              • Sleep.KERNEL32(000001F4), ref: 004126BD
                              • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                              • CloseHandle.KERNEL32(00000000), ref: 004126E4
                              • GetCurrentProcessId.KERNEL32 ref: 004126EA
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                              • String ID: .exe$8SG$WDH$exepath$open$temp_
                              • API String ID: 2649220323-436679193
                              • Opcode ID: 644260e79740abdb38bbef940962979a92695f68f317ec5f9d18976e4df820c3
                              • Instruction ID: ea0e71dbd1735df2f0ffa6a76a18ae54bfb239dee3d1740714ca762960b89f4c
                              • Opcode Fuzzy Hash: 644260e79740abdb38bbef940962979a92695f68f317ec5f9d18976e4df820c3
                              • Instruction Fuzzy Hash: 4C51C871A00215BBDB10ABA09C99EFE336D9B04715F1041ABF501E71D2EF7C8E858A5D
                              APIs
                              • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                              • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B21F
                              • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                              • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                              • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                              • SetEvent.KERNEL32 ref: 0041B2AA
                              • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                              • CloseHandle.KERNEL32 ref: 0041B2CB
                              • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                              • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                              • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                              • API String ID: 738084811-2094122233
                              • Opcode ID: d561e535e20e94d4d32498695f90d41e23c390ecef7d03d0c81b33d87c062984
                              • Instruction ID: 904a2ea9ee052b7cd0d2885f28b370526ea16529c5f4723dacad6ab52bd59ce6
                              • Opcode Fuzzy Hash: d561e535e20e94d4d32498695f90d41e23c390ecef7d03d0c81b33d87c062984
                              • Instruction Fuzzy Hash: 015193B12842056ED314B731DC96ABF779CDB80359F10053FB246621E2EF789D498AAE
                              APIs
                              • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                              • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                              • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                              • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                              • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                              • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                              • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                              • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                              • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                              • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Write$Create
                              • String ID: RIFF$WAVE$data$fmt
                              • API String ID: 1602526932-4212202414
                              • Opcode ID: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                              • Instruction ID: e437df56db769974f3bb03b9acf3047b6271bea3308615ff466a61b001f8e6b8
                              • Opcode Fuzzy Hash: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                              • Instruction Fuzzy Hash: D1413F72644218BAE210DB51DD85FBB7FECEB89B50F40441AFA44D60C0E7A5E909DBB3
                              APIs
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe,00000001,00407688,C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe,00000003,004076B0,004752D8,00407709), ref: 004072BF
                              • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                              • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                              • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                              • GetProcAddress.KERNEL32(00000000), ref: 00407308
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                              • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                              • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                              • GetProcAddress.KERNEL32(00000000), ref: 00407330
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                              • API String ID: 1646373207-2635131121
                              • Opcode ID: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                              • Instruction ID: 405170eedd050388d8f538cead316ce70cca9a1d875d15a5a69166cce564cbe9
                              • Opcode Fuzzy Hash: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                              • Instruction Fuzzy Hash: 0A0152A0E4431676D711AF7AAC44D577E9D9E41351311487BB405E2292EEBCE800CD6E
                              APIs
                              • _wcslen.LIBCMT ref: 0040CE42
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CF0B
                              • _wcslen.LIBCMT ref: 0040CF21
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe,00000000,00000000), ref: 0040CFBF
                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                              • _wcslen.LIBCMT ref: 0040D001
                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D068
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                              • ExitProcess.KERNEL32 ref: 0040D09D
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                              • String ID: 6$C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe$del$open
                              • API String ID: 1579085052-2100890954
                              • Opcode ID: cf3ade877b167e70c46e53b810f9fed9df6f55308ddf96a6d8fe48dcf536bada
                              • Instruction ID: 98553dc1b0994f0aa09194d7cf3a18af63584d9ff732256a229fdfb73b573f5c
                              • Opcode Fuzzy Hash: cf3ade877b167e70c46e53b810f9fed9df6f55308ddf96a6d8fe48dcf536bada
                              • Instruction Fuzzy Hash: 3151E820208302ABD615B7359C92A6F679D9F8471DF00443FF60AA61E3EF7C9D05866E
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                              • LoadLibraryA.KERNEL32(?), ref: 00414E52
                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                              • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                              • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                              • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                              • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Library$AddressFreeProc$Load$DirectorySystem
                              • String ID: EIA$\ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                              • API String ID: 2490988753-3346362794
                              • Opcode ID: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                              • Instruction ID: 3d65f6a93fba2a0b2eac8854c7d2b2934d6e6a161d7d6dc9994b6ec54a408268
                              • Opcode Fuzzy Hash: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                              • Instruction Fuzzy Hash: 5E31C4B1905315A7D7209F65CC84DDF76DCAB84754F004A2AF944A3210D738D985CBAE
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$EnvironmentVariable$_wcschr
                              • String ID:
                              • API String ID: 3899193279-0
                              • Opcode ID: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                              • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                              • Opcode Fuzzy Hash: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                              • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                                • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                              • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                              • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                              • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                              • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                              • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                              • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                              • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                              • Sleep.KERNEL32(00000064), ref: 00412ECF
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                              • String ID: /stext "$0TG$0TG$NG$NG
                              • API String ID: 1223786279-2576077980
                              • Opcode ID: 8b5758fc960045b70db6b1621d1f1f5248a15739f774e2f35fdd395e03aad00d
                              • Instruction ID: 10d3359c81a21c2239512d2238f4034584c87ebec4848cfd83014516dee20f06
                              • Opcode Fuzzy Hash: 8b5758fc960045b70db6b1621d1f1f5248a15739f774e2f35fdd395e03aad00d
                              • Instruction Fuzzy Hash: 2F0268315083414AC325FB62D891AEFB3E5AFD4348F50483FF58A931E2EF785A49C65A
                              APIs
                              • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C742
                              • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C786
                              • RegCloseKey.ADVAPI32(?), ref: 0041CA50
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnumOpen
                              • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                              • API String ID: 1332880857-3714951968
                              • Opcode ID: f13192da4e66231cc3a913cdaba6528dc2f099d68fe13da123ac92ab36a9ee38
                              • Instruction ID: 8204223968f620e226549da85b9b34a309c849e8d9bbed411749b7727356edba
                              • Opcode Fuzzy Hash: f13192da4e66231cc3a913cdaba6528dc2f099d68fe13da123ac92ab36a9ee38
                              • Instruction Fuzzy Hash: 3E8133311082459BC325EF11D851EEFB7E8BF94309F10492FB589921A2FF74AE49CA5A
                              APIs
                              • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                              • GetCursorPos.USER32(?), ref: 0041D67A
                              • SetForegroundWindow.USER32(?), ref: 0041D683
                              • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                              • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D6EE
                              • ExitProcess.KERNEL32 ref: 0041D6F6
                              • CreatePopupMenu.USER32 ref: 0041D6FC
                              • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                              • String ID: Close
                              • API String ID: 1657328048-3535843008
                              • Opcode ID: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                              • Instruction ID: ffebe08b42ddc2cad69fc5dc181b4667ce265f065f51bc56e4a7814a85689449
                              • Opcode Fuzzy Hash: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                              • Instruction Fuzzy Hash: 2D213BB1544209FFDF155FA4ED0EAAA3F35EB08302F000125F909951B2D779EDA1EB19
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$Info
                              • String ID:
                              • API String ID: 2509303402-0
                              • Opcode ID: d11cf9d75a9b095113a5c4e7a536203a51778a2c4217635f9f2315e0a594c0ce
                              • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                              • Opcode Fuzzy Hash: d11cf9d75a9b095113a5c4e7a536203a51778a2c4217635f9f2315e0a594c0ce
                              • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408D1E
                              • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                              • __aulldiv.LIBCMT ref: 00408D88
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                              • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                              • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                              • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FE9
                              • CloseHandle.KERNEL32(00000000), ref: 00409037
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                              • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                              • API String ID: 3086580692-2582957567
                              • Opcode ID: 2a6cbd74b7f1d7262aabe967babe0c7563b8d160d0352d0a7d413315700012c3
                              • Instruction ID: 3fce176daff91a8ac67d7e00268aa6ddaa8eb0a69c3dc15cdf5b3728eb075172
                              • Opcode Fuzzy Hash: 2a6cbd74b7f1d7262aabe967babe0c7563b8d160d0352d0a7d413315700012c3
                              • Instruction Fuzzy Hash: CCB1A1316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB8B
                              APIs
                              • Sleep.KERNEL32(00001388), ref: 0040A77B
                                • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                • Part of subcall function 0040A6B0: CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                              • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                              • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A859
                                • Part of subcall function 0041C516: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                              • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,00000000,00000000,00000000), ref: 0040A962
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                              • String ID: 8SG$8SG$pQG$pQG$PG$PG
                              • API String ID: 3795512280-1152054767
                              • Opcode ID: ff793148450d5445b41cee081077762d1b1ae7bc4452be26425da9ad383290d3
                              • Instruction ID: 2a79d88b44a8fc0b04dcb000ea34af81e4c48788ca5147296d011aa32960a087
                              • Opcode Fuzzy Hash: ff793148450d5445b41cee081077762d1b1ae7bc4452be26425da9ad383290d3
                              • Instruction Fuzzy Hash: B6516E716043015ACB15BB72C866ABE77AA9F80349F00483FF646B71E2DF7C9D09865E
                              APIs
                              • connect.WS2_32(?,?,?), ref: 004048E0
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                              • WSAGetLastError.WS2_32 ref: 00404A21
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateEvent$ErrorLastLocalTimeconnect
                              • String ID: Connection Failed: $Connection Refused$PkGNG$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                              • API String ID: 994465650-3229884001
                              • Opcode ID: f8a90a434b368baa81854eed5f01dc5ff272a353476d3d54f953a4ddd85b29a4
                              • Instruction ID: 8b7d3ad86a52f8452b0ebae4faff6649d271d562dba2871a89d137605d3bb54b
                              • Opcode Fuzzy Hash: f8a90a434b368baa81854eed5f01dc5ff272a353476d3d54f953a4ddd85b29a4
                              • Instruction Fuzzy Hash: CE41E8B57506017BC61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF
                              APIs
                              • ___free_lconv_mon.LIBCMT ref: 0045138A
                                • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                                • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                                • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                                • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                                • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                                • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                                • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                                • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                                • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                                • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                                • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                                • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                                • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                              • _free.LIBCMT ref: 0045137F
                                • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 004513A1
                              • _free.LIBCMT ref: 004513B6
                              • _free.LIBCMT ref: 004513C1
                              • _free.LIBCMT ref: 004513E3
                              • _free.LIBCMT ref: 004513F6
                              • _free.LIBCMT ref: 00451404
                              • _free.LIBCMT ref: 0045140F
                              • _free.LIBCMT ref: 00451447
                              • _free.LIBCMT ref: 0045144E
                              • _free.LIBCMT ref: 0045146B
                              • _free.LIBCMT ref: 00451483
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                              • String ID:
                              • API String ID: 161543041-0
                              • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                              • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                              • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                              • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                              APIs
                                • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                                • Part of subcall function 00413733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 0041374F
                                • Part of subcall function 00413733: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00413768
                                • Part of subcall function 00413733: RegCloseKey.ADVAPI32(?), ref: 00413773
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                              • ExitProcess.KERNEL32 ref: 0040D9FF
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                              • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                              • API String ID: 1913171305-3159800282
                              • Opcode ID: f9fb1c58427f12af755a52ca3692b6cbef369107a25d9b00b3b70057595488dd
                              • Instruction ID: 6f299f75ad759bd4c56b3f4cab90e5e1fe41ff60d22e8747b975e3d2bb757992
                              • Opcode Fuzzy Hash: f9fb1c58427f12af755a52ca3692b6cbef369107a25d9b00b3b70057595488dd
                              • Instruction Fuzzy Hash: 9B4129719001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E8ACA98
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                              • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                              • Opcode Fuzzy Hash: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                              • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                              APIs
                                • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000,?,00455D04,00000000,0000000C), ref: 00455946
                              • GetLastError.KERNEL32 ref: 00455D6F
                              • __dosmaperr.LIBCMT ref: 00455D76
                              • GetFileType.KERNEL32(00000000), ref: 00455D82
                              • GetLastError.KERNEL32 ref: 00455D8C
                              • __dosmaperr.LIBCMT ref: 00455D95
                              • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                              • CloseHandle.KERNEL32(?), ref: 00455EFF
                              • GetLastError.KERNEL32 ref: 00455F31
                              • __dosmaperr.LIBCMT ref: 00455F38
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                              • String ID: H
                              • API String ID: 4237864984-2852464175
                              • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                              • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                              • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                              • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,tC,0043EA74,?,?,PkGNG,0044AF1A,00000001,00000001,A4E85006), ref: 0044AD23
                              • __alloca_probe_16.LIBCMT ref: 0044AD5B
                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,PkGNG,0044AF1A,00000001,00000001,A4E85006,?,?,?), ref: 0044ADA9
                              • __alloca_probe_16.LIBCMT ref: 0044AE40
                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,A4E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                              • __freea.LIBCMT ref: 0044AEB0
                                • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                              • __freea.LIBCMT ref: 0044AEB9
                              • __freea.LIBCMT ref: 0044AEDE
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                              • String ID: PkGNG$tC
                              • API String ID: 3864826663-4196309852
                              • Opcode ID: a3cbb47ee8d45342a2f0fb6a002504832f0ae0c467949e665f7c3dc78735deda
                              • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                              • Opcode Fuzzy Hash: a3cbb47ee8d45342a2f0fb6a002504832f0ae0c467949e665f7c3dc78735deda
                              • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID: \&G$\&G$`&G
                              • API String ID: 269201875-253610517
                              • Opcode ID: f361c4fdd0f35bb0b590f5a399794b5d5c57f6d7c3c5bbd0b76040d27d65b4a3
                              • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                              • Opcode Fuzzy Hash: f361c4fdd0f35bb0b590f5a399794b5d5c57f6d7c3c5bbd0b76040d27d65b4a3
                              • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 65535$udp
                              • API String ID: 0-1267037602
                              • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                              • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                              • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                              • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 0040AD73
                              • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                              • GetForegroundWindow.USER32 ref: 0040AD84
                              • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                              • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040ADC1
                              • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                                • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                              • String ID: [${ User has been idle for $ minutes }$]
                              • API String ID: 911427763-3954389425
                              • Opcode ID: a9d80c92317e710bb0ee7b8060ee11baa7f71990c7fa4e3373d3f7fac537cda3
                              • Instruction ID: 479ab846abdc3ffa357cf8cfb056c4a9d7a1c57035fbb5610920680a3dc8d5cf
                              • Opcode Fuzzy Hash: a9d80c92317e710bb0ee7b8060ee11baa7f71990c7fa4e3373d3f7fac537cda3
                              • Instruction Fuzzy Hash: 1251E2716043419BD714FB22D856AAE7795AF84308F10093FF986A22E2EF7C9D44C69F
                              APIs
                              • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DBD5
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: LongNamePath
                              • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                              • API String ID: 82841172-425784914
                              • Opcode ID: 9fc837d8cdd91ddad254a0e7a0cf26b33e0d7c4ac323512d933d46fc1d77c410
                              • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                              • Opcode Fuzzy Hash: 9fc837d8cdd91ddad254a0e7a0cf26b33e0d7c4ac323512d933d46fc1d77c410
                              • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B
                              APIs
                              • SetEvent.KERNEL32(?,?), ref: 004054BF
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                              • TranslateMessage.USER32(?), ref: 0040557E
                              • DispatchMessageA.USER32(?), ref: 00405589
                              • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                              • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                              • String ID: CloseChat$DisplayMessage$GetMessage
                              • API String ID: 2956720200-749203953
                              • Opcode ID: 92a42e6f76523c23ad071d277faa5832b5c30b25a00b0af7c670b91f71b4b998
                              • Instruction ID: d37e718accd843302ceacc2187c81124e04698433963f5de03abd71ab6b9016f
                              • Opcode Fuzzy Hash: 92a42e6f76523c23ad071d277faa5832b5c30b25a00b0af7c670b91f71b4b998
                              • Instruction Fuzzy Hash: 39419071A04301ABCB14FB76DC5A86F37A9AB85704F40493EF516A31E1EF3C8905CB9A
                              APIs
                                • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                              • CloseHandle.KERNEL32(00000000), ref: 00417E20
                              • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                              • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                              • String ID: 0VG$0VG$<$@$Temp
                              • API String ID: 1704390241-2575729100
                              • Opcode ID: 770267ec3d45abc508c60553e0d69256dfd3bd3466962ea0f4637c0737b4c84d
                              • Instruction ID: 01f79aac078c9204ae4226344def03f9678a0966abb138ad227abf0e83d93267
                              • Opcode Fuzzy Hash: 770267ec3d45abc508c60553e0d69256dfd3bd3466962ea0f4637c0737b4c84d
                              • Instruction Fuzzy Hash: 18417E319002099ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                              APIs
                              • OpenClipboard.USER32 ref: 0041697C
                              • EmptyClipboard.USER32 ref: 0041698A
                              • CloseClipboard.USER32 ref: 00416990
                              • OpenClipboard.USER32 ref: 00416997
                              • GetClipboardData.USER32(0000000D), ref: 004169A7
                              • GlobalLock.KERNEL32(00000000), ref: 004169B0
                              • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                              • CloseClipboard.USER32 ref: 004169BF
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                              • String ID: !D@
                              • API String ID: 2172192267-604454484
                              • Opcode ID: da78ba80ec0729aaebbd7618c01a60a0d67124b513bef4f543176b1e835a0158
                              • Instruction ID: c3dc955394dadbf9cb8fa72aed918e4e170398eafb94270add22466952777bd7
                              • Opcode Fuzzy Hash: da78ba80ec0729aaebbd7618c01a60a0d67124b513bef4f543176b1e835a0158
                              • Instruction Fuzzy Hash: AA014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                              APIs
                              • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                              • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                              • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                              • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                              • CloseHandle.KERNEL32(00000000), ref: 0041349A
                              • CloseHandle.KERNEL32(?), ref: 004134A0
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                              • String ID:
                              • API String ID: 297527592-0
                              • Opcode ID: 574f29b59094fb47ce71c879203f8806fd1a71798bcc0508934a1059045681f6
                              • Instruction ID: 84c8eec30da1abd4ec43dfc3561b6153623c17c5959ee0fa3a13cc5c00e14cc2
                              • Opcode Fuzzy Hash: 574f29b59094fb47ce71c879203f8806fd1a71798bcc0508934a1059045681f6
                              • Instruction Fuzzy Hash: F041F331104301BBD7119F25EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                              • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                              • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                              • Opcode Fuzzy Hash: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                              • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                              APIs
                              • _free.LIBCMT ref: 004481B5
                                • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 004481C1
                              • _free.LIBCMT ref: 004481CC
                              • _free.LIBCMT ref: 004481D7
                              • _free.LIBCMT ref: 004481E2
                              • _free.LIBCMT ref: 004481ED
                              • _free.LIBCMT ref: 004481F8
                              • _free.LIBCMT ref: 00448203
                              • _free.LIBCMT ref: 0044820E
                              • _free.LIBCMT ref: 0044821C
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                              • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                              • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                              • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Eventinet_ntoa
                              • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                              • API String ID: 3578746661-3604713145
                              • Opcode ID: a7da0e03d27dfd4f061563b37853281ba9d59ca7803a508e71efe6cf15854c11
                              • Instruction ID: 5b49fc9f60f15aadef5e91219dcc0d557585a55aed20fbc46105045b647f8dc0
                              • Opcode Fuzzy Hash: a7da0e03d27dfd4f061563b37853281ba9d59ca7803a508e71efe6cf15854c11
                              • Instruction Fuzzy Hash: 5351D531A042015BC714FB36D95AAAE36A5AB84344F40453FFA06676F2EF7C8985C7CE
                              APIs
                              • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0045707F), ref: 00455FA7
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: DecodePointer
                              • String ID: acos$asin$exp$log$log10$pow$sqrt
                              • API String ID: 3527080286-3064271455
                              • Opcode ID: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                              • Instruction ID: a80f67f54703b8f0c72b4cfac69ffbb6288a0afb30985e2ab5cebdbe3ffe6fde
                              • Opcode Fuzzy Hash: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                              • Instruction Fuzzy Hash: BB515071900909DBCF10DF58E9481BDBBB0FF49306F924197D841A7396DB798928CB1E
                              APIs
                              • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,PkGNG,0044BBB1,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B47E
                              • __fassign.LIBCMT ref: 0044B4F9
                              • __fassign.LIBCMT ref: 0044B514
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                              • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BBB1,?), ref: 0044B559
                              • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BBB1,?), ref: 0044B592
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                              • String ID: PkGNG
                              • API String ID: 1324828854-263838557
                              • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                              • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                              • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                              • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                                • Part of subcall function 0041C516: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                              • Sleep.KERNEL32(00000064), ref: 0041755C
                              • DeleteFileW.KERNEL32(00000000), ref: 00417590
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CreateDeleteExecuteShellSleep
                              • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                              • API String ID: 1462127192-2001430897
                              • Opcode ID: 0d67962283f2148fab1b3333e93946e14c4c28236009ab2eda98070440fecb3d
                              • Instruction ID: 6598d36db715e58345e35b35962d03aab6dacf30af49f41f33489dbeb2d48940
                              • Opcode Fuzzy Hash: 0d67962283f2148fab1b3333e93946e14c4c28236009ab2eda98070440fecb3d
                              • Instruction Fuzzy Hash: 17313F71940119AADB04FB61DC96DED7735AF50309F00017EF606731E2EF785A8ACA9C
                              APIs
                              • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 00407418
                              • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe), ref: 004074D9
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CurrentProcess
                              • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                              • API String ID: 2050909247-4242073005
                              • Opcode ID: fabc3931959a25f7a31d3ecd74c529253d596e7bbbcd6e820e444b19b129e129
                              • Instruction ID: c8d37550e6f1e63eabf3c93e4c9511e0cbcdb01d3c289a22ccdf2b55afca88d7
                              • Opcode Fuzzy Hash: fabc3931959a25f7a31d3ecd74c529253d596e7bbbcd6e820e444b19b129e129
                              • Instruction Fuzzy Hash: DE317EB1A44300ABD314EF65DD46F1677B8BB04705F10087EF509A6692EBB8B8458B6F
                              APIs
                              • _strftime.LIBCMT ref: 00401D50
                                • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                              • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                              • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                              • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                              • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                              • API String ID: 3809562944-243156785
                              • Opcode ID: 5ca57e464fc48cfd7ac60de242ae16507c8b77f4a1a81d17ad6b6b7cf7425d61
                              • Instruction ID: 12771182903f202c4b9d99511a6abf0f0559d076e6e3c56183b1657b5f9df8bc
                              • Opcode Fuzzy Hash: 5ca57e464fc48cfd7ac60de242ae16507c8b77f4a1a81d17ad6b6b7cf7425d61
                              • Instruction Fuzzy Hash: AA318F315043019FC324EB22DC56A9E77A8FB84315F40443EF189A21F2EFB89A49CB5E
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                              • int.LIBCPMT ref: 00410EBC
                                • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                              • std::_Facet_Register.LIBCPMT ref: 00410EFC
                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                              • __Init_thread_footer.LIBCMT ref: 00410F64
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                              • String ID: ,kG$0kG
                              • API String ID: 3815856325-2015055088
                              • Opcode ID: 9b6f417909eb5cd4a3a9238d92eaca8e17f16862a4fd72c37d6a1f751429c824
                              • Instruction ID: 6b7561e6e5701aa818233467e21ea388c72e3112cb5a37ed7db11c94fdfc7bf8
                              • Opcode Fuzzy Hash: 9b6f417909eb5cd4a3a9238d92eaca8e17f16862a4fd72c37d6a1f751429c824
                              • Instruction Fuzzy Hash: 682129329005249BCB14FB6AD8429DE77A9DF48324F21416FF404E72D1DFB9AD818B9D
                              APIs
                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                              • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                              • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                              • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                              • waveInStart.WINMM ref: 00401CFE
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                              • String ID: dMG$|MG$PG
                              • API String ID: 1356121797-532278878
                              • Opcode ID: eef3d83c920f1a8878cb9ae4af55a885980d63effcab8dea3858d63941c1ab5b
                              • Instruction ID: 1e392cdedf79dd274444ae0cc0b76d6cc185fd36309c60cea9b16e967c73269b
                              • Opcode Fuzzy Hash: eef3d83c920f1a8878cb9ae4af55a885980d63effcab8dea3858d63941c1ab5b
                              • Instruction Fuzzy Hash: 51212A71604201AFC7399F66EE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                                • Part of subcall function 0041D5A0: RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                • Part of subcall function 0041D5A0: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                              • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                              • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D558
                              • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D56E
                              • TranslateMessage.USER32(?), ref: 0041D57A
                              • DispatchMessageA.USER32(?), ref: 0041D584
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D591
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                              • String ID: Remcos
                              • API String ID: 1970332568-165870891
                              • Opcode ID: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                              • Instruction ID: 0a96d410cd687733bc2db9baaca44b2a156926270a6f860d3af68fdb0bcdced8
                              • Opcode Fuzzy Hash: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                              • Instruction Fuzzy Hash: CA0152B1840244EBD7109FA5EC4CFABBB7CEBC5705F00406AF515931A1D778D885CB58
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 41332500f0008602d77d1c660e50033fd15bda36b9a02a1f3ccc300d02d52732
                              • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                              • Opcode Fuzzy Hash: 41332500f0008602d77d1c660e50033fd15bda36b9a02a1f3ccc300d02d52732
                              • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                              APIs
                              • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,004540DC,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453EAF
                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F32
                              • __alloca_probe_16.LIBCMT ref: 00453F6A
                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,004540DC,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FC5
                              • __alloca_probe_16.LIBCMT ref: 00454014
                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FDC
                                • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00454058
                              • __freea.LIBCMT ref: 00454083
                              • __freea.LIBCMT ref: 0045408F
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                              • String ID:
                              • API String ID: 201697637-0
                              • Opcode ID: 3cd8063f553076ce798424c5fc2191fe96cf15845bda9c8b0815eea935c1a584
                              • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                              • Opcode Fuzzy Hash: 3cd8063f553076ce798424c5fc2191fe96cf15845bda9c8b0815eea935c1a584
                              • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • _memcmp.LIBVCRUNTIME ref: 004454A4
                              • _free.LIBCMT ref: 00445515
                              • _free.LIBCMT ref: 0044552E
                              • _free.LIBCMT ref: 00445560
                              • _free.LIBCMT ref: 00445569
                              • _free.LIBCMT ref: 00445575
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorLast$_abort_memcmp
                              • String ID: C
                              • API String ID: 1679612858-1037565863
                              • Opcode ID: 57e83dca3a851dc1354698b3345e0422ed2f7d5811d10dab12b85ea15fb2e044
                              • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                              • Opcode Fuzzy Hash: 57e83dca3a851dc1354698b3345e0422ed2f7d5811d10dab12b85ea15fb2e044
                              • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: tcp$udp
                              • API String ID: 0-3725065008
                              • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                              • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                              • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                              • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 004018BE
                              • ExitThread.KERNEL32 ref: 004018F6
                              • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                              • String ID: PkG$XMG$NG$NG
                              • API String ID: 1649129571-3151166067
                              • Opcode ID: 49aca21aedc77406ad6ecb676b3e8f12959c6e3be557b7633b64e8435ff40de0
                              • Instruction ID: 94ec9d015e3317cd6a1a8c0f3f0e5257b1b149af30ff9c9aaa6ade548e88cebb
                              • Opcode Fuzzy Hash: 49aca21aedc77406ad6ecb676b3e8f12959c6e3be557b7633b64e8435ff40de0
                              • Instruction Fuzzy Hash: 7441D5312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D4AC71D
                              APIs
                              • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FB4,?,00000000,00408037,00000000), ref: 00407A00
                              • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A48
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              • CloseHandle.KERNEL32(00000000,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A88
                              • MoveFileW.KERNEL32(00000000,00000000), ref: 00407AA5
                              • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AD0
                              • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                                • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                                • Part of subcall function 00404B96: SetEvent.KERNEL32(?), ref: 00404BC3
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                              • String ID: .part
                              • API String ID: 1303771098-3499674018
                              • Opcode ID: c438b6c3ad66c49b0c8fac277bcd0795076709a98bb5b529a829fc4e1ae4dc70
                              • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                              • Opcode Fuzzy Hash: c438b6c3ad66c49b0c8fac277bcd0795076709a98bb5b529a829fc4e1ae4dc70
                              • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                              APIs
                              • SendInput.USER32 ref: 00419A25
                              • SendInput.USER32(00000001,?,0000001C,00000000), ref: 00419A4D
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                              • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                                • Part of subcall function 004199CE: MapVirtualKeyA.USER32(00000000,00000000), ref: 004199D4
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: InputSend$Virtual
                              • String ID:
                              • API String ID: 1167301434-0
                              • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                              • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                              • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                              • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: __freea$__alloca_probe_16_free
                              • String ID: a/p$am/pm$h{D
                              • API String ID: 2936374016-2303565833
                              • Opcode ID: 4ddb7e6ff69264204235b909ea28f14837368a743d4617b198cabd7c05983ebc
                              • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                              • Opcode Fuzzy Hash: 4ddb7e6ff69264204235b909ea28f14837368a743d4617b198cabd7c05983ebc
                              • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                              APIs
                                • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                              • _free.LIBCMT ref: 00444E87
                              • _free.LIBCMT ref: 00444E9E
                              • _free.LIBCMT ref: 00444EBD
                              • _free.LIBCMT ref: 00444ED8
                              • _free.LIBCMT ref: 00444EEF
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$AllocateHeap
                              • String ID: KED
                              • API String ID: 3033488037-2133951994
                              • Opcode ID: 4e35ff1e2d87e21165085a9225b40beb0941a1a7db736cbd5727a613c3eec6b7
                              • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                              • Opcode Fuzzy Hash: 4e35ff1e2d87e21165085a9225b40beb0941a1a7db736cbd5727a613c3eec6b7
                              • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                              APIs
                              • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                              • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413BC6
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Enum$InfoQueryValue
                              • String ID: [regsplt]$xUG$TG
                              • API String ID: 3554306468-1165877943
                              • Opcode ID: 0915e5250acf3bea082794a31251f109dca26ef8e60840e512c7265f34e5d9a1
                              • Instruction ID: 25111a67c66830bda9a991cbd11294aa9b1843c944dfd5f4caafe5fa1545c2ae
                              • Opcode Fuzzy Hash: 0915e5250acf3bea082794a31251f109dca26ef8e60840e512c7265f34e5d9a1
                              • Instruction Fuzzy Hash: 05512D71900219AADB11EB95DC86EEEB77DAF04305F10007AE505B6191EF746B48CBA9
                              APIs
                              • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D81
                                • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              • RegCloseKey.ADVAPI32(00000000,004660B4,004660B4,00466478,00466478,00000071), ref: 00413EEF
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnumInfoOpenQuerysend
                              • String ID: xUG$NG$NG$TG
                              • API String ID: 3114080316-2811732169
                              • Opcode ID: 7a7e2ed596e912e6ef42e947eeb9eb1de9ee6fb09b7a4cfd1d5d0db7cb7d7a08
                              • Instruction ID: 39136fa66a1b3d14a29046baa0c8a2124f92290552efa608aac098e6c3039c27
                              • Opcode Fuzzy Hash: 7a7e2ed596e912e6ef42e947eeb9eb1de9ee6fb09b7a4cfd1d5d0db7cb7d7a08
                              • Instruction Fuzzy Hash: 03419F316042005AC324F726D852AEF76A99FD1384F40883FF549671D2EF7C5949866E
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,000000FF,?,00000000,00000000,0043F918,?,00000000,?,00000001,?,000000FF,00000001,0043F918,?), ref: 004511F9
                              • __alloca_probe_16.LIBCMT ref: 00451231
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00451282
                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00451294
                              • __freea.LIBCMT ref: 0045129D
                                • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                              • String ID: PkGNG
                              • API String ID: 313313983-263838557
                              • Opcode ID: 9f5a2a67851111230ceb537eb1b7ccf29ba8faad681cfee17df3cfbc13bcf043
                              • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                              • Opcode Fuzzy Hash: 9f5a2a67851111230ceb537eb1b7ccf29ba8faad681cfee17df3cfbc13bcf043
                              • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                              APIs
                                • Part of subcall function 004135E1: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00413605
                                • Part of subcall function 004135E1: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00413622
                                • Part of subcall function 004135E1: RegCloseKey.KERNELBASE(?), ref: 0041362D
                              • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                              • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                              • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                              • API String ID: 1133728706-4073444585
                              • Opcode ID: 82f3536f7391415d25674f0736c327500bde81d48cd9b738ac55359f41ca632d
                              • Instruction ID: a06d8339010b4a31413dea3cf8b7af81beee50618fccc2c871009a62ab4f9f33
                              • Opcode Fuzzy Hash: 82f3536f7391415d25674f0736c327500bde81d48cd9b738ac55359f41ca632d
                              • Instruction Fuzzy Hash: BC215230A40219A6CB14F7F1CC969EE77299F50744F80017FE502B71D1EB7D6945C6DA
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6348a53403ba44e76667cab5d3d4b8c4f90ca5e92cff7b4211fa09d26e343de5
                              • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                              • Opcode Fuzzy Hash: 6348a53403ba44e76667cab5d3d4b8c4f90ca5e92cff7b4211fa09d26e343de5
                              • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                              APIs
                                • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                              • _free.LIBCMT ref: 00450FC8
                                • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 00450FD3
                              • _free.LIBCMT ref: 00450FDE
                              • _free.LIBCMT ref: 00451032
                              • _free.LIBCMT ref: 0045103D
                              • _free.LIBCMT ref: 00451048
                              • _free.LIBCMT ref: 00451053
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                              • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                              • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                              • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                              • int.LIBCPMT ref: 004111BE
                                • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                              • std::_Facet_Register.LIBCPMT ref: 004111FE
                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                              • String ID: (mG
                              • API String ID: 2536120697-4059303827
                              • Opcode ID: 4fb09889b2dc78d6b9bc341806ed1c893def47308d87ec9f5bd5aa626124b671
                              • Instruction ID: b4facbf35e110c19f3eede998f69f9310dce987b63f856d60fe44c7d5fb17b17
                              • Opcode Fuzzy Hash: 4fb09889b2dc78d6b9bc341806ed1c893def47308d87ec9f5bd5aa626124b671
                              • Instruction Fuzzy Hash: 42112732900114A7CB14EB9AD8018DEB7699F44364F11456FF904F72E1DB789E45CBC8
                              APIs
                              • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                              • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastValue___vcrt_
                              • String ID:
                              • API String ID: 3852720340-0
                              • Opcode ID: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                              • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                              • Opcode Fuzzy Hash: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                              • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                              APIs
                              • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe), ref: 0040760B
                                • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                                • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                              • CoUninitialize.OLE32 ref: 00407664
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: InitializeObjectUninitialize_wcslen
                              • String ID: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                              • API String ID: 3851391207-3413348446
                              • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                              • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                              • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                              • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                              APIs
                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                              • GetLastError.KERNEL32 ref: 0040BB22
                              Strings
                              • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                              • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                              • UserProfile, xrefs: 0040BAE8
                              • [Chrome Cookies not found], xrefs: 0040BB3C
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteErrorFileLast
                              • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                              • API String ID: 2018770650-304995407
                              • Opcode ID: d4592947abf79dc324386ffcaf4b9b591dee499912662422a1d7ea612805fe04
                              • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                              • Opcode Fuzzy Hash: d4592947abf79dc324386ffcaf4b9b591dee499912662422a1d7ea612805fe04
                              • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                              APIs
                              • AllocConsole.KERNEL32(00475338), ref: 0041CE35
                              • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                              • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Console$AllocOutputShowWindow
                              • String ID: Remcos v$5.1.3 Pro$CONOUT$
                              • API String ID: 2425139147-2212855755
                              • Opcode ID: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                              • Instruction ID: 6efa3de70d430de9448838496adf33c47162c0890a3ad1875f095e209401f165
                              • Opcode Fuzzy Hash: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                              • Instruction Fuzzy Hash: A90144B1A80304BBD610F7F19C8BF9E77AC9B14B05F500527BA04A70D2EB6DD944466E
                              APIs
                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,PkGNG,0044338B,00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002), ref: 004433FA
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044340D
                              • FreeLibrary.KERNEL32(00000000,?,?,PkGNG,0044338B,00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002,00000000,PkGNG), ref: 00443430
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$PkGNG$mscoree.dll
                              • API String ID: 4061214504-213444651
                              • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                              • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                              • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                              • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                              APIs
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                              • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                              • Sleep.KERNEL32(00002710), ref: 0041AE98
                              • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: PlaySound$HandleLocalModuleSleepTime
                              • String ID: Alarm triggered$`Mw
                              • API String ID: 614609389-968373943
                              • Opcode ID: fc1dfc3d80636db02bd80d67f349f84282c1adb2487fd06cf6dad27e320cdf65
                              • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                              • Opcode Fuzzy Hash: fc1dfc3d80636db02bd80d67f349f84282c1adb2487fd06cf6dad27e320cdf65
                              • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                              APIs
                              • __allrem.LIBCMT ref: 0043ACE9
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                              • __allrem.LIBCMT ref: 0043AD1C
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                              • __allrem.LIBCMT ref: 0043AD51
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                              • String ID:
                              • API String ID: 1992179935-0
                              • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                              • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                              • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                              • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                              APIs
                              • Sleep.KERNEL32(00000000,?), ref: 004044C4
                                • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prologSleep
                              • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                              • API String ID: 3469354165-3054508432
                              • Opcode ID: 320c67068b3b288db2e993e88ff11ad854d39230f6bbd9045a2096c25c2dffa0
                              • Instruction ID: df1e58e957a7578ae16e417911435538e3341edc64810737793f4aa4f8849b6c
                              • Opcode Fuzzy Hash: 320c67068b3b288db2e993e88ff11ad854d39230f6bbd9045a2096c25c2dffa0
                              • Instruction Fuzzy Hash: A751E171A042106BCA14FB369D0A66E3755ABC4748F00443FFA0A676E2DF7D8E45839E
                              APIs
                                • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                              • SetLastError.KERNEL32(000000C1,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                              • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411DE0
                              • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,00000000), ref: 00411E04
                                • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,00000000), ref: 00411CEE
                              • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,00000000), ref: 00411E4B
                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000), ref: 00411E52
                              • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00411F65
                                • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,00000000), ref: 00412122
                                • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000,?,?,?,?,00000000), ref: 00412129
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                              • String ID:
                              • API String ID: 3950776272-0
                              • Opcode ID: 0997a6c101f2dd0e8850336bac1793923a5345a50e97098554ef69f44a303648
                              • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                              • Opcode Fuzzy Hash: 0997a6c101f2dd0e8850336bac1793923a5345a50e97098554ef69f44a303648
                              • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: __cftoe
                              • String ID:
                              • API String ID: 4189289331-0
                              • Opcode ID: 30f97a14dd6f87c9245b8e0b778041a74f07a421c1ac77e9beff42b74887127b
                              • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                              • Opcode Fuzzy Hash: 30f97a14dd6f87c9245b8e0b778041a74f07a421c1ac77e9beff42b74887127b
                              • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                              • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ChangeConfigManager
                              • String ID:
                              • API String ID: 493672254-0
                              • Opcode ID: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                              • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                              • Opcode Fuzzy Hash: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                              • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: __alldvrm$_strrchr
                              • String ID: PkGNG
                              • API String ID: 1036877536-263838557
                              • Opcode ID: 8f78adc186be73fa66820e99e070c83f6be0ee509df7c4dfd67e0dde8c439993
                              • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                              • Opcode Fuzzy Hash: 8f78adc186be73fa66820e99e070c83f6be0ee509df7c4dfd67e0dde8c439993
                              • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                              APIs
                              • GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                              • _free.LIBCMT ref: 004482CC
                              • _free.LIBCMT ref: 004482F4
                              • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                              • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                              • _abort.LIBCMT ref: 00448313
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free$_abort
                              • String ID:
                              • API String ID: 3160817290-0
                              • Opcode ID: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                              • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                              • Opcode Fuzzy Hash: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                              • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                              • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                              • Opcode Fuzzy Hash: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                              • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                              • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                              • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                              • Opcode Fuzzy Hash: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                              • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                              • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                              • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                              • Opcode Fuzzy Hash: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                              • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: PkGNG
                              • API String ID: 0-263838557
                              • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                              • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                              • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                              • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                              • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404DD2
                              • CloseHandle.KERNEL32(?), ref: 00404DDB
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$CloseEventHandleObjectSingleThreadWait
                              • String ID: PkGNG
                              • API String ID: 3360349984-263838557
                              • Opcode ID: 77a6d032992f3495e2e52a01d2ead9a1ebcb79a8041a0f526cc04fc7fe31482d
                              • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                              • Opcode Fuzzy Hash: 77a6d032992f3495e2e52a01d2ead9a1ebcb79a8041a0f526cc04fc7fe31482d
                              • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                              APIs
                              • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                              • wsprintfW.USER32 ref: 0040B22E
                                • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: EventLocalTimewsprintf
                              • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                              • API String ID: 1497725170-248792730
                              • Opcode ID: b92970106d7d5ed65003fb4f3b7a0e91fd1e2f7406e6a9ff2526561c329a63fb
                              • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                              • Opcode Fuzzy Hash: b92970106d7d5ed65003fb4f3b7a0e91fd1e2f7406e6a9ff2526561c329a63fb
                              • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                              • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                              • CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleSizeSleep
                              • String ID: XQG
                              • API String ID: 1958988193-3606453820
                              • Opcode ID: 09b71735cca9286fb237afdc81f34cc8b89fa37515d8f2a58262fc809d9c95cd
                              • Instruction ID: fa029248b1ac628aedb802b18ed81a98d1a4018e107c0b234daa3009ae89debe
                              • Opcode Fuzzy Hash: 09b71735cca9286fb237afdc81f34cc8b89fa37515d8f2a58262fc809d9c95cd
                              • Instruction Fuzzy Hash: 96110130600740AADA31A734988961F7BA9DB45356F44483EF1866B6D3C67DDC64C71F
                              APIs
                              • RegisterClassExA.USER32(00000030), ref: 0041D5EC
                              • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                              • GetLastError.KERNEL32 ref: 0041D611
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ClassCreateErrorLastRegisterWindow
                              • String ID: 0$MsgWindowClass
                              • API String ID: 2877667751-2410386613
                              • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                              • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                              • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                              • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                              APIs
                              • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                              • CloseHandle.KERNEL32(?), ref: 004077E5
                              • CloseHandle.KERNEL32(?), ref: 004077EA
                              Strings
                              • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                              • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandle$CreateProcess
                              • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                              • API String ID: 2922976086-4183131282
                              • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                              • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                              • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                              • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: SG$C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe
                              • API String ID: 0-3953627298
                              • Opcode ID: 534232ae4986bc0cd44d5d9dbb6e579f37bf6e7b645008295a27304146529b35
                              • Instruction ID: 5ffff352cfcc2e87221e4fa572a01d73507d198e899e6baa5594ec663d9dd15d
                              • Opcode Fuzzy Hash: 534232ae4986bc0cd44d5d9dbb6e579f37bf6e7b645008295a27304146529b35
                              • Instruction Fuzzy Hash: 8DF02BB0E04600EBCB1477345D296AA3656A780397F40487BF507EB2F2EBBD5C41871E
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EF8), ref: 00405120
                              • SetEvent.KERNEL32(?), ref: 0040512C
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00405137
                              • CloseHandle.KERNEL32(?), ref: 00405140
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                              • String ID: KeepAlive | Disabled
                              • API String ID: 2993684571-305739064
                              • Opcode ID: 260c2b08e01b5d66b359e99273a0c89895ec309b6af50f33d4504d26b953d9d7
                              • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                              • Opcode Fuzzy Hash: 260c2b08e01b5d66b359e99273a0c89895ec309b6af50f33d4504d26b953d9d7
                              • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                              APIs
                              • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                              • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE00
                              • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CE7E), ref: 0041CE0D
                              • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE20
                              Strings
                              • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Console$AttributeText$BufferHandleInfoScreen
                              • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                              • API String ID: 3024135584-2418719853
                              • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                              • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                              • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                              • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                              APIs
                              • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                              • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: GetCursorInfo$User32.dll$`Mw
                              • API String ID: 1646373207-2986171508
                              • Opcode ID: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                              • Instruction ID: 8b26e8b19aea132afe7ec2793fcae50f4a2deac5c44528798ee909e27cd98dc2
                              • Opcode Fuzzy Hash: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                              • Instruction Fuzzy Hash: 6BB092B4981740FB8F102BB0AE4EA193A25B614703B1008B6F046961A2EBB888009A2E
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3500d967bf213ad3b95b014004bc41782de99095ad53c5e0f3d0147f9504bf37
                              • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                              • Opcode Fuzzy Hash: 3500d967bf213ad3b95b014004bc41782de99095ad53c5e0f3d0147f9504bf37
                              • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                              APIs
                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                              • _free.LIBCMT ref: 0044943D
                                • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 00449609
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                              • String ID:
                              • API String ID: 1286116820-0
                              • Opcode ID: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                              • Instruction ID: 45cf5ea20785abb2a7eec221213eb08c1b8584214e6df16efc40294c4842d026
                              • Opcode Fuzzy Hash: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                              • Instruction Fuzzy Hash: 1B51EC71900205ABEB14EF69DD819AFB7B8EF44724F20066FE418D3291EB789D41DB58
                              APIs
                                • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                              • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                              • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                                • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475338), ref: 0041C08B
                                • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                              • String ID:
                              • API String ID: 4269425633-0
                              • Opcode ID: 73b334f8cf36ed71725f842c358092b271b71775af86fb3c9ec045b7f77a6464
                              • Instruction ID: d02cab962e177bd28921c4f9a71df23b762ba7d31cecf8da060328e0f3db66c6
                              • Opcode Fuzzy Hash: 73b334f8cf36ed71725f842c358092b271b71775af86fb3c9ec045b7f77a6464
                              • Instruction Fuzzy Hash: 5F4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                              • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                              • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                              • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                              APIs
                              • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                                • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                              • _free.LIBCMT ref: 0044F43F
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                              • String ID:
                              • API String ID: 336800556-0
                              • Opcode ID: 7d1f56057eec42b9e44eaca7954531e52edb8e618f6c0f5134274d299c642649
                              • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                              • Opcode Fuzzy Hash: 7d1f56057eec42b9e44eaca7954531e52edb8e618f6c0f5134274d299c642649
                              • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                              APIs
                              • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4DE
                              • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4EA
                              • WriteFile.KERNEL32(00000000,00000000,00000000,00406FC0,00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4FB
                              • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C508
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreatePointerWrite
                              • String ID:
                              • API String ID: 1852769593-0
                              • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                              • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                              • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                              • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639
                              APIs
                              • GetLastError.KERNEL32(?,00000000,?,0043BCD6,00000000,?,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0044831E
                              • _free.LIBCMT ref: 00448353
                              • _free.LIBCMT ref: 0044837A
                              • SetLastError.KERNEL32(00000000), ref: 00448387
                              • SetLastError.KERNEL32(00000000), ref: 00448390
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free
                              • String ID:
                              • API String ID: 3170660625-0
                              • Opcode ID: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                              • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                              • Opcode Fuzzy Hash: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                              • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                              APIs
                              • _free.LIBCMT ref: 00450A54
                                • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 00450A66
                              • _free.LIBCMT ref: 00450A78
                              • _free.LIBCMT ref: 00450A8A
                              • _free.LIBCMT ref: 00450A9C
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                              • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                              • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                              • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                              APIs
                              • _free.LIBCMT ref: 00444106
                                • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 00444118
                              • _free.LIBCMT ref: 0044412B
                              • _free.LIBCMT ref: 0044413C
                              • _free.LIBCMT ref: 0044414D
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                              • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                              • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                              • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: PkGNG
                              • API String ID: 0-263838557
                              • Opcode ID: 5e00ae4c16f04a5a408ad6ef1dd4f82ff0aaed16414488ba1079334ecebbb015
                              • Instruction ID: da8fb74aa53f7b39327717419ea6793f6800af9799f3d5c2cf6102f7e15971fb
                              • Opcode Fuzzy Hash: 5e00ae4c16f04a5a408ad6ef1dd4f82ff0aaed16414488ba1079334ecebbb015
                              • Instruction Fuzzy Hash: 1451C171D00209AAEF109FA5D885BAFBBB8EF45314F14015FE905A7291CB38D911CBA9
                              APIs
                              • _strpbrk.LIBCMT ref: 0044E7B8
                              • _free.LIBCMT ref: 0044E8D5
                                • Part of subcall function 0043BD68: IsProcessorFeaturePresent.KERNEL32(00000017,0043BD3A,?,?,?,?,?,00000000,?,?,0043BD5A,00000000,00000000,00000000,00000000,00000000), ref: 0043BD6A
                                • Part of subcall function 0043BD68: GetCurrentProcess.KERNEL32(C0000417), ref: 0043BD8C
                                • Part of subcall function 0043BD68: TerminateProcess.KERNEL32(00000000), ref: 0043BD93
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                              • String ID: *?$.
                              • API String ID: 2812119850-3972193922
                              • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                              • Instruction ID: bbc13fc8ee10fdca904a4e9292213e09ebfa005f106ef5a16faeda3ce4fd08f7
                              • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                              • Instruction Fuzzy Hash: C251B175E00209AFEF14DFAAC881AAEF7B5FF58314F24416EE844E7341E6399A018B54
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CountEventTick
                              • String ID: !D@$NG
                              • API String ID: 180926312-2721294649
                              • Opcode ID: 1409f91683eb0d13268e59a75ed27cf67ebd121d06af2735119167055e625867
                              • Instruction ID: 3ac9408315e1e6036cedb879f74fb80cbd33a95067926c5a5f9e9f7d680cff10
                              • Opcode Fuzzy Hash: 1409f91683eb0d13268e59a75ed27cf67ebd121d06af2735119167055e625867
                              • Instruction Fuzzy Hash: 3E51A5315082019AC724FB32D852AFF73A5AF94304F50483FF54A671E2EF3C5945C68A
                              APIs
                              • GetKeyboardLayoutNameA.USER32(?), ref: 00409F0E
                                • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                • Part of subcall function 0041C5A6: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F96,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C5BB
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFileKeyboardLayoutNameconnectsend
                              • String ID: XQG$NG$PG
                              • API String ID: 1634807452-3565412412
                              • Opcode ID: fd0e2637303639c3914413e18f481dca8088ebaee1bdd9cde4e16d3ac9440c52
                              • Instruction ID: 86122f73fea86c9dce3a8c8dcd7d10d1556e7c038dfd98f63e082762e027ad1b
                              • Opcode Fuzzy Hash: fd0e2637303639c3914413e18f481dca8088ebaee1bdd9cde4e16d3ac9440c52
                              • Instruction Fuzzy Hash: 955120315082419BC328FB32D851AEFB3E5AFD4348F50493FF54AA71E2EF78594A8649
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe,00000104), ref: 00443515
                              • _free.LIBCMT ref: 004435E0
                              • _free.LIBCMT ref: 004435EA
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$FileModuleName
                              • String ID: C:\Users\user\Desktop\1evAkYZpwDV0N4v.exe
                              • API String ID: 2506810119-253678951
                              • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                              • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                              • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                              • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                              APIs
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000,FF8BC35D,00000000,?,PkGNG,0044BBFE,?,00000000,FF8BC35D), ref: 0044B952
                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0044B980
                              • GetLastError.KERNEL32 ref: 0044B9B1
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharErrorFileLastMultiWideWrite
                              • String ID: PkGNG
                              • API String ID: 2456169464-263838557
                              • Opcode ID: f851102e1cc74a1ce765c461dca65e8698d1b877b070f44673effa5d02d51bb5
                              • Instruction ID: 31ac96f82a5847659344ef20b41dc67af7a50504b34fbd786f6314a6cc22fa3b
                              • Opcode Fuzzy Hash: f851102e1cc74a1ce765c461dca65e8698d1b877b070f44673effa5d02d51bb5
                              • Instruction Fuzzy Hash: B13161B5A102199FDB14CF59DD819EAB7B9FB08305F0444BEE90AD7251D734ED80CBA4
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                • Part of subcall function 0041C516: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                              • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                              • String ID: /sort "Visit Time" /stext "$0NG
                              • API String ID: 368326130-3219657780
                              • Opcode ID: e78c06b9bf7766e7fe0f8007d50d57f34ca1e93f8206c7928855f49078e072bb
                              • Instruction ID: 7a7c83aa22bf4ff3424ba87d95d637a61540eed1193ecfb54830ab602693969f
                              • Opcode Fuzzy Hash: e78c06b9bf7766e7fe0f8007d50d57f34ca1e93f8206c7928855f49078e072bb
                              • Instruction Fuzzy Hash: 2C316371A0011956CB15FBA6DC569ED7375AF90308F00007FF60AB71E2EF785D49CA99
                              APIs
                              • _wcslen.LIBCMT ref: 00416330
                                • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                • Part of subcall function 004138B2: RegSetValueExA.KERNELBASE(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                • Part of subcall function 004138B2: RegCloseKey.KERNELBASE(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: _wcslen$CloseCreateValue
                              • String ID: !D@$okmode$PG
                              • API String ID: 3411444782-3370592832
                              • Opcode ID: 50d7f224604995de7932f13bdbb4ac3c37bb3cd1c02c4f4e4008cb23dd2e85ed
                              • Instruction ID: 097cdf197a66b89fefcd85ce8a19d7acc75244c7017ebd4eb32b8c3ef24b572d
                              • Opcode Fuzzy Hash: 50d7f224604995de7932f13bdbb4ac3c37bb3cd1c02c4f4e4008cb23dd2e85ed
                              • Instruction Fuzzy Hash: 1E11A571B442011BDA187B32D862BBD22969F84348F80843FF546AF2E2DFBD4C51975D
                              APIs
                                • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                              • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                              • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C6C3
                              Strings
                              • User Data\Default\Network\Cookies, xrefs: 0040C63E
                              • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                              • API String ID: 1174141254-1980882731
                              • Opcode ID: 94e3019874633fdbfa545aa7663ce5ff9a408d6cc8816db895689c957fef93bc
                              • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                              • Opcode Fuzzy Hash: 94e3019874633fdbfa545aa7663ce5ff9a408d6cc8816db895689c957fef93bc
                              • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                              APIs
                                • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                              • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                              • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C792
                              Strings
                              • User Data\Default\Network\Cookies, xrefs: 0040C70D
                              • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                              • API String ID: 1174141254-1980882731
                              • Opcode ID: cd02b2d6f0091136f3bd33ffae0826dfdd9dcae469dd48ae7039cc879f52ebfc
                              • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                              • Opcode Fuzzy Hash: cd02b2d6f0091136f3bd33ffae0826dfdd9dcae469dd48ae7039cc879f52ebfc
                              • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                              APIs
                              • CreateThread.KERNEL32(00000000,00000000,0040A2B8,004750F0,00000000,00000000), ref: 0040A239
                              • CreateThread.KERNEL32(00000000,00000000,0040A2A2,004750F0,00000000,00000000), ref: 0040A249
                              • CreateThread.KERNEL32(00000000,00000000,0040A2C4,004750F0,00000000,00000000), ref: 0040A255
                                • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateThread$LocalTimewsprintf
                              • String ID: Offline Keylogger Started
                              • API String ID: 465354869-4114347211
                              • Opcode ID: 460aeebbd05c9109f8f1e9d4cf1c4a7c90257216c04fbe0fa29816e89daae231
                              • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                              • Opcode Fuzzy Hash: 460aeebbd05c9109f8f1e9d4cf1c4a7c90257216c04fbe0fa29816e89daae231
                              • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                              APIs
                                • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • CreateThread.KERNEL32(00000000,00000000,0040A2A2,?,00000000,00000000), ref: 0040AFA9
                              • CreateThread.KERNEL32(00000000,00000000,0040A2C4,?,00000000,00000000), ref: 0040AFB5
                              • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateThread$LocalTime$wsprintf
                              • String ID: Online Keylogger Started
                              • API String ID: 112202259-1258561607
                              • Opcode ID: 77df2eb5e9a30333ff56a104ce6f74fac6c8f24925e0e44ba138bd3ce2eab701
                              • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                              • Opcode Fuzzy Hash: 77df2eb5e9a30333ff56a104ce6f74fac6c8f24925e0e44ba138bd3ce2eab701
                              • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                              APIs
                              • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime
                              • String ID: | $%02i:%02i:%02i:%03i $PkGNG
                              • API String ID: 481472006-3277280411
                              • Opcode ID: d9bff088cb76c426919b24c8266bea5d45f0a8ea700e32831e669085e32f1d03
                              • Instruction ID: 036da7e0cd4114b6fa9428aab3af546923e8b827a5fb64715830670d2b1b9b5a
                              • Opcode Fuzzy Hash: d9bff088cb76c426919b24c8266bea5d45f0a8ea700e32831e669085e32f1d03
                              • Instruction Fuzzy Hash: 091190714082455AC304FB62D8519FFB3E9AB84348F50093FF88AA21E1EF3CDA45C69E
                              APIs
                              • GetLocalTime.KERNEL32(?), ref: 00404F81
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FCD
                              • CreateThread.KERNEL32(00000000,00000000,00405150,?,00000000,00000000), ref: 00404FE0
                              Strings
                              • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$EventLocalThreadTime
                              • String ID: KeepAlive | Enabled | Timeout:
                              • API String ID: 2532271599-1507639952
                              • Opcode ID: a02ae91ac195284b5da0ea0fcd2ef2636c7927f14dee073a7222123f061fd718
                              • Instruction ID: 41fa32a9fb91b1633a7afb8999ae97baef60c60c8d6252053b050d354fdafbcf
                              • Opcode Fuzzy Hash: a02ae91ac195284b5da0ea0fcd2ef2636c7927f14dee073a7222123f061fd718
                              • Instruction Fuzzy Hash: 82110A71800385BAC720A7779C0DEAB7FACDBD2714F04046FF54162291D6B89445CBBA
                              APIs
                              • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406ABD
                              • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: CryptUnprotectData$crypt32
                              • API String ID: 2574300362-2380590389
                              • Opcode ID: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                              • Instruction ID: 59ed3cbb63f31e38ea488d6bd85f24bb9ff1ce5495ed4d1509158228521d53cd
                              • Opcode Fuzzy Hash: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                              • Instruction Fuzzy Hash: 2C01B975604216BBCB18CFAD9D449AF7BB4AB45300B00417EE956E3381DA74E9008B95
                              APIs
                              • SetFilePointerEx.KERNEL32(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,10558B1C,10558B1C,PkGNG,0044C382,FF8BC369,00000000,00000002,00000000,PkGNG), ref: 0044C30C
                              • GetLastError.KERNEL32 ref: 0044C316
                              • __dosmaperr.LIBCMT ref: 0044C31D
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorFileLastPointer__dosmaperr
                              • String ID: PkGNG
                              • API String ID: 2336955059-263838557
                              • Opcode ID: 97215d8b8c2dce734124090270f13308d8b04423b03663272671d6b8c31aea6f
                              • Instruction ID: 8193a85edd99f1e073baf55791db2896ff72ac9ff19ac05387a69161c0de0417
                              • Opcode Fuzzy Hash: 97215d8b8c2dce734124090270f13308d8b04423b03663272671d6b8c31aea6f
                              • Instruction Fuzzy Hash: FB019032A11108BBDB01DFDDDC4586E7B19EB81320B28034EFD2097280EAB4DD119794
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                              • CloseHandle.KERNEL32(?), ref: 004051CA
                              • SetEvent.KERNEL32(?), ref: 004051D9
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandleObjectSingleWait
                              • String ID: Connection Timeout
                              • API String ID: 2055531096-499159329
                              • Opcode ID: 638b915a1fb33ffee36d9cd6321bbf62091d502496d276d1835a730be56b6213
                              • Instruction ID: b176daa04f7f78a72cd0d213bf0bcd41e0e3849ccec9e2477ca34bbc74fb9340
                              • Opcode Fuzzy Hash: 638b915a1fb33ffee36d9cd6321bbf62091d502496d276d1835a730be56b6213
                              • Instruction Fuzzy Hash: C901F530940F00AFD7216B368D8642BBFE0EF00306704093EE68356AE2D6789800CF89
                              APIs
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Exception@8Throw
                              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                              • API String ID: 2005118841-1866435925
                              • Opcode ID: e1bdae5122e534e22181349a294e5dd283a76e5484cb2b4dd901af9da0e19607
                              • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                              • Opcode Fuzzy Hash: e1bdae5122e534e22181349a294e5dd283a76e5484cb2b4dd901af9da0e19607
                              • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                              APIs
                              • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000,00474EF8,00474EF8,PkGNG,00404A40), ref: 0041CB9A
                              • LocalFree.KERNEL32(?,?), ref: 0041CBC0
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: FormatFreeLocalMessage
                              • String ID: @J@$PkGNG
                              • API String ID: 1427518018-1416487119
                              • Opcode ID: 43e67b6722ad7e97e4d7411bd93802a0b45ac2c2c041eafaafa940aa2d942fec
                              • Instruction ID: 923000db8f6a2d31ebee0df48ef62036c6bc2ff20d3f060cbaedccf048ea6ec3
                              • Opcode Fuzzy Hash: 43e67b6722ad7e97e4d7411bd93802a0b45ac2c2c041eafaafa940aa2d942fec
                              • Instruction Fuzzy Hash: 34F0A930B00219A6DF14A766DC4ADFF772DDB44305B10407FB605B21D1DE785D059659
                              APIs
                              • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041385A
                              • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004752D8,774D37E0,?), ref: 00413888
                              • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004752D8,774D37E0,?,?,?,?,?,0040CFE5,?,00000000), ref: 00413893
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413858
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                              • API String ID: 1818849710-1051519024
                              • Opcode ID: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                              • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                              • Opcode Fuzzy Hash: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                              • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                                • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                                • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                              • String ID: bad locale name
                              • API String ID: 3628047217-1405518554
                              • Opcode ID: 0e967f5f4c551f764c071b3c3fecd2d0a166eebc37c8bba363630da575d49789
                              • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                              • Opcode Fuzzy Hash: 0e967f5f4c551f764c071b3c3fecd2d0a166eebc37c8bba363630da575d49789
                              • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                              APIs
                              • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                              • ShowWindow.USER32(00000009), ref: 00416C9C
                              • SetForegroundWindow.USER32 ref: 00416CA8
                                • Part of subcall function 0041CE2C: AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                              • String ID: !D@
                              • API String ID: 3446828153-604454484
                              • Opcode ID: 4d9bf94020eca6f9e295162147b2deb229949cce80f8bc9c3a6d36dbd144fb99
                              • Instruction ID: 9f5213224becab59645eda34593d96b16d6ada18beeab21aaf628210512d7754
                              • Opcode Fuzzy Hash: 4d9bf94020eca6f9e295162147b2deb229949cce80f8bc9c3a6d36dbd144fb99
                              • Instruction Fuzzy Hash: ECF05E70149340EAD720AB62ED45AFA7B69EB54341F01487BF909C20F2DB389C94865E
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExecuteShell
                              • String ID: /C $cmd.exe$open
                              • API String ID: 587946157-3896048727
                              • Opcode ID: df79394fdd2e8ac4c6a51a4d6bf5cb7422c6ad95fc7d3df390015c01fd08e55b
                              • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                              • Opcode Fuzzy Hash: df79394fdd2e8ac4c6a51a4d6bf5cb7422c6ad95fc7d3df390015c01fd08e55b
                              • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                              APIs
                              • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                              • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetLastInputInfo$User32.dll
                              • API String ID: 2574300362-1519888992
                              • Opcode ID: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                              • Instruction ID: d02e03e3b89f99dad65f23c179d95e13f318a7fd709defe56253aab8848571e2
                              • Opcode Fuzzy Hash: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                              • Instruction Fuzzy Hash: EFB092B8580300FBCB102FA0AD4E91E3A68AA18703B1008A7F441C21A1EBB888009F5F
                              APIs
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                              • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                              • Opcode Fuzzy Hash: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                              • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                              APIs
                              Strings
                              • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                              • Cleared browsers logins and cookies., xrefs: 0040C130
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep
                              • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                              • API String ID: 3472027048-1236744412
                              • Opcode ID: a3f0c992227adaa6d9cd66a901dd32694b668b89f8b487eaa10a17efeb8be6c7
                              • Instruction ID: 5a72b8a34604a64e244bad04561a930bad76f77e78bf22f3e088d6afb7384554
                              • Opcode Fuzzy Hash: a3f0c992227adaa6d9cd66a901dd32694b668b89f8b487eaa10a17efeb8be6c7
                              • Instruction Fuzzy Hash: A431A805648381EDD6116BF514967AB7B824A53748F0882BFB8C4373C3DA7A4808C79F
                              APIs
                                • Part of subcall function 0041C5E2: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C5F2
                                • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                                • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C625
                              • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                              • Sleep.KERNEL32(00000064), ref: 0040A638
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$SleepText$ForegroundLength
                              • String ID: [ $ ]
                              • API String ID: 3309952895-93608704
                              • Opcode ID: 0877f6620f6187a1062b87b3f34e88cc83cbee9ae63c8039862e0d8bb1bff125
                              • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                              • Opcode Fuzzy Hash: 0877f6620f6187a1062b87b3f34e88cc83cbee9ae63c8039862e0d8bb1bff125
                              • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                              • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                              • Opcode Fuzzy Hash: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                              • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                              • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                              • Opcode Fuzzy Hash: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                              • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                              APIs
                              • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                                • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                              • _UnwindNestedFrames.LIBCMT ref: 00439911
                              • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                              • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                              • String ID:
                              • API String ID: 2633735394-0
                              • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                              • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                              • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                              • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                              APIs
                              • GetSystemMetrics.USER32(0000004C), ref: 0041942B
                              • GetSystemMetrics.USER32(0000004D), ref: 00419431
                              • GetSystemMetrics.USER32(0000004E), ref: 00419437
                              • GetSystemMetrics.USER32(0000004F), ref: 0041943D
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: MetricsSystem
                              • String ID:
                              • API String ID: 4116985748-0
                              • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                              • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                              • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                              • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                              APIs
                              • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                              • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                              • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                                • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                              • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                              • String ID:
                              • API String ID: 1761009282-0
                              • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                              • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                              • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                              • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                              APIs
                              • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorHandling__start
                              • String ID: pow
                              • API String ID: 3213639722-2276729525
                              • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                              • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                              • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                              • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                              APIs
                              • WideCharToMultiByte.KERNEL32(000000FF,00000000,00000006,00000001,?,?,00000000,?,00000000,?,?,00000000,00000006,?,?,?), ref: 00449F8F
                              • GetLastError.KERNEL32 ref: 00449FAB
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharErrorLastMultiWide
                              • String ID: PkGNG
                              • API String ID: 203985260-263838557
                              • Opcode ID: d1185fb95bfff78fff583c453b007e19375680cfc0f7d37f8e74ebb942ffdfee
                              • Instruction ID: e4919e29a80df6b7ced925805d10dfcffaa1b378e184719e11b938f1b8f94c7b
                              • Opcode Fuzzy Hash: d1185fb95bfff78fff583c453b007e19375680cfc0f7d37f8e74ebb942ffdfee
                              • Instruction Fuzzy Hash: 2331E430200201ABFB21EF56C845BAB7768EF45721F15016BF815C7391DB38CD45E7A9
                              APIs
                                • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                              • __Init_thread_footer.LIBCMT ref: 0040B7D2
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Init_thread_footer__onexit
                              • String ID: [End of clipboard]$[Text copied to clipboard]
                              • API String ID: 1881088180-3686566968
                              • Opcode ID: 7be63757e29b9f91be4cc1fce50211db745ac7e2ddcf3fa0e25e131e1c8bf245
                              • Instruction ID: 844f446031992ee5170c212df839aebd4a436c67f2956c9e8fe8aff684c3a130
                              • Opcode Fuzzy Hash: 7be63757e29b9f91be4cc1fce50211db745ac7e2ddcf3fa0e25e131e1c8bf245
                              • Instruction Fuzzy Hash: 30217131A102198ACB14FBA6D8929EDB375AF54318F10443FE505771D2EF786D4ACA8C
                              APIs
                              • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451E12,?,00000050,?,?,?,?,?), ref: 00451C92
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: ACP$OCP
                              • API String ID: 0-711371036
                              • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                              • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                              • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                              • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                              APIs
                              • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BBEE,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B85B
                              • GetLastError.KERNEL32 ref: 0044B884
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID: PkGNG
                              • API String ID: 442123175-263838557
                              • Opcode ID: 9f33f136d580808b36a549075194831cac44b680ed95d57240af363647088f83
                              • Instruction ID: 9972a58bdd01e134d13becd973f3089a2f7b3635eb9ddb95e5d59f4384582b5e
                              • Opcode Fuzzy Hash: 9f33f136d580808b36a549075194831cac44b680ed95d57240af363647088f83
                              • Instruction Fuzzy Hash: B2316F31A00619DBCB24DF59DD8099AF3F9FF48301B1485AAE909D7261E734ED81CBA8
                              APIs
                              • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BC0E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B76D
                              • GetLastError.KERNEL32 ref: 0044B796
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID: PkGNG
                              • API String ID: 442123175-263838557
                              • Opcode ID: 482fa6ac77512a0fc819500aa413458c203250297fd7de672378db3e029a087c
                              • Instruction ID: c865f2f287ade0309940dd9d446f9ab1351fd896516eb6f8948e0fb5ca6ebdce
                              • Opcode Fuzzy Hash: 482fa6ac77512a0fc819500aa413458c203250297fd7de672378db3e029a087c
                              • Instruction Fuzzy Hash: 69219435600219DFDB14CF69D980BEAB3F9EB48312F1048AAE94AD7251D734ED85CB64
                              APIs
                              • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                              Strings
                              • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime
                              • String ID: KeepAlive | Enabled | Timeout:
                              • API String ID: 481472006-1507639952
                              • Opcode ID: 145f269d181a8435875c36411829170d0c63d951855ea4e88e6edb1186bb4574
                              • Instruction ID: e3b05ee6596aa2f5bef7afedc99ae4e94a3de8d8e2082a6dce2ef35069f0368d
                              • Opcode Fuzzy Hash: 145f269d181a8435875c36411829170d0c63d951855ea4e88e6edb1186bb4574
                              • Instruction Fuzzy Hash: 8D2104719107806BD700B736980A76F7B64E751308F44097EE8491B2E2EB7D5A88CBEF
                              APIs
                              • Sleep.KERNEL32 ref: 0041667B
                              • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: DownloadFileSleep
                              • String ID: !D@
                              • API String ID: 1931167962-604454484
                              • Opcode ID: 55e5d64e7b98f77c9516b1aa3147275b9d54505b18039c208d99df416d007d74
                              • Instruction ID: 05e88009b36717a37a8ab5ea381c0ce1ab0270976c353b8abb87c8adb32aa340
                              • Opcode Fuzzy Hash: 55e5d64e7b98f77c9516b1aa3147275b9d54505b18039c208d99df416d007d74
                              • Instruction Fuzzy Hash: F21142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: alarm.wav$hYG
                              • API String ID: 1174141254-2782910960
                              • Opcode ID: b1264f66081e357ea998da1c4a3710e4054d322a9d90202bb867bf05cfcdbcb2
                              • Instruction ID: 4122455f09fb97d0238bc6f6df8f07100adf7eded08faacdf9dae369850c3b42
                              • Opcode Fuzzy Hash: b1264f66081e357ea998da1c4a3710e4054d322a9d90202bb867bf05cfcdbcb2
                              • Instruction Fuzzy Hash: 6401B57078831156CA04F77688166EE77959B80718F00847FF64A162E2EFBC9E59C6CF
                              APIs
                                • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • CloseHandle.KERNEL32(?), ref: 0040B0EF
                              • UnhookWindowsHookEx.USER32 ref: 0040B102
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                              • String ID: Online Keylogger Stopped
                              • API String ID: 1623830855-1496645233
                              • Opcode ID: d2011962e6819f9b37a51f0e1cf8c7d5879c21619fea64d9aec53d325501bd1f
                              • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                              • Opcode Fuzzy Hash: d2011962e6819f9b37a51f0e1cf8c7d5879c21619fea64d9aec53d325501bd1f
                              • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                              APIs
                              • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,A4E85006,00000001,?,0043CEA5), ref: 00448CA4
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: String
                              • String ID: LCMapStringEx$PkGNG
                              • API String ID: 2568140703-1065776982
                              • Opcode ID: 1885f0d73e679dc43364bca4b79527da2e22ca333ca41b5935a1c787a3402146
                              • Instruction ID: c3f282dcf0fd97a5c368a601407465e3bede0a00add2935535d0592c00eac712
                              • Opcode Fuzzy Hash: 1885f0d73e679dc43364bca4b79527da2e22ca333ca41b5935a1c787a3402146
                              • Instruction Fuzzy Hash: 3001253254120CFBCF02AF91DD02EEE7F66EF08751F04416AFE1965161CA3A8971EB99
                              APIs
                              • waveInPrepareHeader.WINMM(?,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                              • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401A15), ref: 0040185F
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$BufferHeaderPrepare
                              • String ID: XMG
                              • API String ID: 2315374483-813777761
                              • Opcode ID: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                              • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                              • Opcode Fuzzy Hash: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                              • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                              APIs
                              • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocaleValid
                              • String ID: IsValidLocaleName$kKD
                              • API String ID: 1901932003-3269126172
                              • Opcode ID: 04660431652152feee489ab769ffb62c2764274a72e4b83c9e76caadb00853e6
                              • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                              • Opcode Fuzzy Hash: 04660431652152feee489ab769ffb62c2764274a72e4b83c9e76caadb00853e6
                              • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: UserProfile$\AppData\Local\Google\Chrome\
                              • API String ID: 1174141254-4188645398
                              • Opcode ID: 436aaf2f4919e8db7ac4fc258f207b39b4a1c8f6fc7c84df28bf50f08fcb3653
                              • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                              • Opcode Fuzzy Hash: 436aaf2f4919e8db7ac4fc258f207b39b4a1c8f6fc7c84df28bf50f08fcb3653
                              • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                              • API String ID: 1174141254-2800177040
                              • Opcode ID: 08b04822ed6971428f4ee0f1b5576531b1655caf3e2843dc1830a10d440ec58d
                              • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                              • Opcode Fuzzy Hash: 08b04822ed6971428f4ee0f1b5576531b1655caf3e2843dc1830a10d440ec58d
                              • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5F7
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: AppData$\Opera Software\Opera Stable\
                              • API String ID: 1174141254-1629609700
                              • Opcode ID: 9b1d6074b97f50ec4858c5e648a4d0042a555a00805eb6ed81dbd0ba111bcdaf
                              • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                              • Opcode Fuzzy Hash: 9b1d6074b97f50ec4858c5e648a4d0042a555a00805eb6ed81dbd0ba111bcdaf
                              • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                              APIs
                              • GetKeyState.USER32(00000011), ref: 0040B686
                                • Part of subcall function 0040A41B: GetForegroundWindow.USER32 ref: 0040A451
                                • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                • Part of subcall function 0040A41B: GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                                • Part of subcall function 0040A41B: GetKeyboardState.USER32(?), ref: 0040A479
                                • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                                • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                              • String ID: [AltL]$[AltR]
                              • API String ID: 2738857842-2658077756
                              • Opcode ID: 973633859d93ff8360b83ac9e1d77558cdb0b7c4d5bdbb5f5e50dc46d20ac961
                              • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                              • Opcode Fuzzy Hash: 973633859d93ff8360b83ac9e1d77558cdb0b7c4d5bdbb5f5e50dc46d20ac961
                              • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                              APIs
                              • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AB37), ref: 00448A16
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Time$FileSystem
                              • String ID: GetSystemTimePreciseAsFileTime$PkGNG
                              • API String ID: 2086374402-949981407
                              • Opcode ID: b67c042d7bc2b84d65cb935a06f544084891d6a740928cef279651ffc9d800ce
                              • Instruction ID: bacba389ed7ed90706db716b221aab5ed2509560655679cc0f09f15d90276a03
                              • Opcode Fuzzy Hash: b67c042d7bc2b84d65cb935a06f544084891d6a740928cef279651ffc9d800ce
                              • Instruction Fuzzy Hash: 79E0E531A81618FBD7116B25EC02E7EBB50DB08B02B10027FFC05A7292EE754D14D6DE
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExecuteShell
                              • String ID: !D@$open
                              • API String ID: 587946157-1586967515
                              • Opcode ID: 30a1d241cab23d886832e5a2cf84020a5ff996eade7e739dca91f4d882a6cfc9
                              • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                              • Opcode Fuzzy Hash: 30a1d241cab23d886832e5a2cf84020a5ff996eade7e739dca91f4d882a6cfc9
                              • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                              APIs
                              • ___initconout.LIBCMT ref: 004555DB
                                • Part of subcall function 00456B9D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004555E0,00000000,PkGNG,0044B61D,?,FF8BC35D,00000000,?,00000000), ref: 00456BB0
                              • WriteConsoleW.KERNEL32(FFFFFFFE,FF8BC369,00000001,00000000,00000000,00000000,PkGNG,0044B61D,?,FF8BC35D,00000000,?,00000000,PkGNG,0044BB99,?), ref: 004555FE
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ConsoleCreateFileWrite___initconout
                              • String ID: PkGNG
                              • API String ID: 3087715906-263838557
                              • Opcode ID: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                              • Instruction ID: 53f4b2898eb153bde3bf118a85e4039abf363423ff24ad7888d91dc13aa78fd6
                              • Opcode Fuzzy Hash: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                              • Instruction Fuzzy Hash: C5E0EDB0100548BBDA208B69DC29EBA3328EB00331F500369FE29C62D2EB34EC44C769
                              APIs
                              • GetKeyState.USER32(00000012), ref: 0040B6E0
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: State
                              • String ID: [CtrlL]$[CtrlR]
                              • API String ID: 1649606143-2446555240
                              • Opcode ID: 1321bbb6cc8174ef42da852326f734558715e41d50b56193fb2d1a3bfc871e5f
                              • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                              • Opcode Fuzzy Hash: 1321bbb6cc8174ef42da852326f734558715e41d50b56193fb2d1a3bfc871e5f
                              • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                              APIs
                                • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                              • __Init_thread_footer.LIBCMT ref: 00410F64
                              Strings
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: Init_thread_footer__onexit
                              • String ID: ,kG$0kG
                              • API String ID: 1881088180-2015055088
                              • Opcode ID: 9b05eae692bf82ff893255be440f7f21efe509fead0387458dc7709882e6db21
                              • Instruction ID: 52a075922dd803dc3791164d579436726ad124eb3de8ddc986de269a183bf650
                              • Opcode Fuzzy Hash: 9b05eae692bf82ff893255be440f7f21efe509fead0387458dc7709882e6db21
                              • Instruction Fuzzy Hash: A8E0D8315149208EC514B729E542AC53395DB0E324B21907BF014D72D2CBAE78C28E5D
                              APIs
                              • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D509,00000000,?,00000000), ref: 00413A6C
                              • RegDeleteValueW.ADVAPI32(?,?,?,00000000), ref: 00413A80
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteOpenValue
                              • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                              • API String ID: 2654517830-1051519024
                              • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                              • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                              • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                              • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D77
                              • GetLastError.KERNEL32 ref: 00440D85
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLast
                              • String ID:
                              • API String ID: 1717984340-0
                              • Opcode ID: aa9c90e467390f2e0f6591fe7c9965b03d9b59885bed7a4237b1e33e934d31eb
                              • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                              • Opcode Fuzzy Hash: aa9c90e467390f2e0f6591fe7c9965b03d9b59885bed7a4237b1e33e934d31eb
                              • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                              APIs
                              • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411BC7
                              • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C93
                              • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00411CB5
                              • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                              Memory Dump Source
                              • Source File: 00000009.00000002.1399037494.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_9_2_400000_1evAkYZpwDV0N4v.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastRead
                              • String ID:
                              • API String ID: 4100373531-0
                              • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                              • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                              • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                              • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99

                              Execution Graph

                              Execution Coverage:13.4%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:208
                              Total number of Limit Nodes:16
                              execution_graph 22518 9501fe0 22519 950201a 22518->22519 22520 9502096 22519->22520 22521 95020ab 22519->22521 22526 9501bcc 22520->22526 22522 9501bcc 2 API calls 22521->22522 22524 95020ba 22522->22524 22527 9501bd7 22526->22527 22528 95020a1 22527->22528 22530 9502ae8 22527->22530 22536 9501c14 22530->22536 22533 9502b0f 22533->22528 22534 9502b27 CreateIconFromResourceEx 22535 9502c0d 22534->22535 22535->22528 22537 9502b38 CreateIconFromResourceEx 22536->22537 22538 9502b02 22537->22538 22538->22533 22538->22534 22308 b9a868 22309 b9a8ad CloseHandle 22308->22309 22310 b9a8f8 22309->22310 22311 b983e8 22312 b98435 VirtualProtect 22311->22312 22313 b984a1 22312->22313 22539 b90848 22540 b9085c 22539->22540 22541 b9089e 22540->22541 22543 b984e7 22540->22543 22544 b98514 22543->22544 22545 b985a9 22544->22545 22548 b99458 22544->22548 22552 b99400 22544->22552 22545->22540 22549 b9946f 22548->22549 22556 b99491 22549->22556 22553 b9946f 22552->22553 22555 b99491 NtQueryInformationProcess 22553->22555 22554 b99483 22554->22544 22555->22554 22557 b994c0 22556->22557 22561 b99500 22557->22561 22565 b994f0 22557->22565 22558 b99483 22558->22544 22562 b99524 22561->22562 22563 b99658 22562->22563 22569 b907f4 22562->22569 22563->22558 22566 b99524 22565->22566 22567 b99658 22566->22567 22568 b907f4 NtQueryInformationProcess 22566->22568 22567->22558 22568->22566 22570 b996c0 NtQueryInformationProcess 22569->22570 22572 b99787 22570->22572 22572->22562 22304 b9a770 22305 b9a7ba OutputDebugStringW 22304->22305 22307 b9a81c 22305->22307 22314 9727d2b 22319 9729798 22314->22319 22323 97297fe 22314->22323 22328 9729788 22314->22328 22315 9727d3a 22320 97297b2 22319->22320 22332 9729ab0 22320->22332 22321 97297ba 22321->22315 22324 972978c 22323->22324 22326 9729801 22323->22326 22327 9729ab0 12 API calls 22324->22327 22325 97297ba 22325->22315 22326->22315 22327->22325 22329 97297b2 22328->22329 22331 9729ab0 12 API calls 22329->22331 22330 97297ba 22330->22315 22331->22330 22333 9729ad5 22332->22333 22334 9729ae7 22333->22334 22352 9729d73 22333->22352 22358 9729db3 22333->22358 22363 9729cad 22333->22363 22372 972a2af 22333->22372 22377 9729c09 22333->22377 22386 972a28a 22333->22386 22392 972a1aa 22333->22392 22397 972a5a5 22333->22397 22402 972a2dd 22333->22402 22407 9729e3f 22333->22407 22417 9729f3e 22333->22417 22421 9729f78 22333->22421 22431 9729d38 22333->22431 22437 972a65b 22333->22437 22441 9729d5a 22333->22441 22447 972a337 22333->22447 22451 9729fd1 22333->22451 22334->22321 22353 9729d41 22352->22353 22354 9729d53 22353->22354 22455 9727410 22353->22455 22459 9727408 22353->22459 22354->22334 22355 972a318 22359 9729dd6 22358->22359 22361 9727410 WriteProcessMemory 22359->22361 22362 9727408 WriteProcessMemory 22359->22362 22360 972a5e9 22361->22360 22362->22360 22364 9729cba 22363->22364 22365 9729ce8 22364->22365 22463 9727798 22364->22463 22467 972778c 22364->22467 22366 9729d53 22365->22366 22368 9727410 WriteProcessMemory 22365->22368 22369 9727408 WriteProcessMemory 22365->22369 22366->22334 22367 972a318 22368->22367 22369->22367 22373 972a2b5 22372->22373 22471 97272f0 22373->22471 22475 97272e8 22373->22475 22374 972a6c0 22378 9729c13 22377->22378 22382 9727798 CreateProcessA 22378->22382 22383 972778c CreateProcessA 22378->22383 22379 9729ce8 22380 9729d53 22379->22380 22384 9727410 WriteProcessMemory 22379->22384 22385 9727408 WriteProcessMemory 22379->22385 22380->22334 22381 972a318 22382->22379 22383->22379 22384->22381 22385->22381 22388 9729d41 22386->22388 22387 972a318 22388->22386 22389 9729d53 22388->22389 22390 9727410 WriteProcessMemory 22388->22390 22391 9727408 WriteProcessMemory 22388->22391 22389->22334 22390->22387 22391->22387 22393 972a1b6 22392->22393 22395 9727410 WriteProcessMemory 22393->22395 22396 9727408 WriteProcessMemory 22393->22396 22394 972a683 22395->22394 22396->22394 22398 972a5ab 22397->22398 22400 9727410 WriteProcessMemory 22398->22400 22401 9727408 WriteProcessMemory 22398->22401 22399 972a5e9 22400->22399 22401->22399 22403 972a2e3 22402->22403 22405 9727410 WriteProcessMemory 22403->22405 22406 9727408 WriteProcessMemory 22403->22406 22404 972a318 22405->22404 22406->22404 22408 9729e4c 22407->22408 22409 972a19a 22408->22409 22410 9729d41 22408->22410 22479 9726c98 22408->22479 22483 9726ca0 22408->22483 22409->22334 22411 9729d53 22410->22411 22413 9727410 WriteProcessMemory 22410->22413 22414 9727408 WriteProcessMemory 22410->22414 22411->22334 22412 972a318 22413->22412 22414->22412 22487 97271c2 22417->22487 22491 97271c8 22417->22491 22418 9729f58 22422 9729e64 22421->22422 22423 972a19a 22422->22423 22424 9729d41 22422->22424 22427 9726ca0 ResumeThread 22422->22427 22428 9726c98 ResumeThread 22422->22428 22423->22334 22425 9729d53 22424->22425 22429 9727410 WriteProcessMemory 22424->22429 22430 9727408 WriteProcessMemory 22424->22430 22425->22334 22426 972a318 22427->22422 22428->22422 22429->22426 22430->22426 22432 9729d41 22431->22432 22433 9729d53 22432->22433 22435 9727410 WriteProcessMemory 22432->22435 22436 9727408 WriteProcessMemory 22432->22436 22433->22334 22434 972a318 22435->22434 22436->22434 22438 972a683 22437->22438 22439 9727410 WriteProcessMemory 22437->22439 22440 9727408 WriteProcessMemory 22437->22440 22439->22438 22440->22438 22442 9729d41 22441->22442 22444 9729d53 22442->22444 22445 9727410 WriteProcessMemory 22442->22445 22446 9727408 WriteProcessMemory 22442->22446 22443 972a318 22444->22334 22445->22443 22446->22443 22495 9727560 22447->22495 22499 9727568 22447->22499 22448 972a359 22453 97271c2 Wow64SetThreadContext 22451->22453 22454 97271c8 Wow64SetThreadContext 22451->22454 22452 9729ff4 22452->22334 22453->22452 22454->22452 22456 972745c WriteProcessMemory 22455->22456 22458 97274f5 22456->22458 22458->22355 22460 972745c WriteProcessMemory 22459->22460 22462 97274f5 22460->22462 22462->22355 22464 972781f 22463->22464 22464->22464 22465 9727a0a CreateProcessA 22464->22465 22466 9727a74 22465->22466 22468 972781f 22467->22468 22468->22468 22469 9727a0a CreateProcessA 22468->22469 22470 9727a74 22469->22470 22470->22470 22472 9727334 VirtualAllocEx 22471->22472 22474 97273ac 22472->22474 22474->22374 22476 9727334 VirtualAllocEx 22475->22476 22478 97273ac 22476->22478 22478->22374 22480 9726c9f ResumeThread 22479->22480 22482 9726d30 22480->22482 22482->22408 22484 9726ce4 ResumeThread 22483->22484 22486 9726d30 22484->22486 22486->22408 22488 9727211 Wow64SetThreadContext 22487->22488 22490 9727289 22488->22490 22490->22418 22492 9727211 Wow64SetThreadContext 22491->22492 22494 9727289 22492->22494 22494->22418 22496 97275b4 ReadProcessMemory 22495->22496 22498 972762c 22496->22498 22498->22448 22500 97275b4 ReadProcessMemory 22499->22500 22502 972762c 22500->22502 22502->22448 22510 b9ea50 22511 b9ea77 22510->22511 22512 b9eb54 22511->22512 22514 b9e614 22511->22514 22515 b9fb08 CreateActCtxA 22514->22515 22517 b9fc0e 22515->22517 22503 972aa68 22505 972aa8e 22503->22505 22506 972abf3 22503->22506 22505->22506 22507 9723f1c 22505->22507 22508 972ad40 PostMessageW 22507->22508 22509 972aded 22508->22509 22509->22505
                              APIs
                              • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 00B99775
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1463154717.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_b90000_gorfVgTf.jbxd
                              Similarity
                              • API ID: InformationProcessQuery
                              • String ID:
                              • API String ID: 1778838933-0
                              • Opcode ID: 5108e64338ccc455a9c519828ed599c682bd2a4c5e277112c2f380cd7a6f9a72
                              • Instruction ID: 53ad35a4b13786c2cd7a46c29c866fecfc09d217ca88d594f0954413101db7c3
                              • Opcode Fuzzy Hash: 5108e64338ccc455a9c519828ed599c682bd2a4c5e277112c2f380cd7a6f9a72
                              • Instruction Fuzzy Hash: 024166B9D042589FCF10CFAAD980A9EFBF5BB09310F20906AE914B7310D735A945CF69
                              APIs
                              • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 00B99775
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1463154717.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_b90000_gorfVgTf.jbxd
                              Similarity
                              • API ID: InformationProcessQuery
                              • String ID:
                              • API String ID: 1778838933-0
                              • Opcode ID: 177a04ebb700910a049e0268ddf1a407b7a94a6a0bfea6a93e2575901a8eca84
                              • Instruction ID: 291114ec90e4d1f75c172c940d5906a793acaebe522658aa788e271c747b5fc2
                              • Opcode Fuzzy Hash: 177a04ebb700910a049e0268ddf1a407b7a94a6a0bfea6a93e2575901a8eca84
                              • Instruction Fuzzy Hash: F14166B9D042589FCF10CFA9D984A9EFBB1BB09310F20906AE818B7310D335A945CF65

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 163 b983b2-b983b9 164 b983bb-b983bd 163->164 165 b98374-b98376 163->165 167 b98378-b9837f 164->167 168 b983bf-b983c1 164->168 165->167 170 b98380-b98381 167->170 169 b983c4-b983c5 168->169 169->170 171 b983c7-b983d1 169->171 172 b9833c-b9833d 170->172 173 b98382-b9838a 170->173 176 b9838c 171->176 177 b983d3-b983f1 171->177 174 b982f8-b98301 172->174 175 b9833f-b9834e 172->175 173->176 181 b982bc-b982c3 174->181 182 b98303-b98309 174->182 178 b98350 175->178 179 b983f2-b9849f VirtualProtect 176->179 180 b9838e-b98395 176->180 177->179 178->169 183 b98352-b98371 178->183 194 b984a8-b984e4 179->194 195 b984a1-b984a7 179->195 180->178 185 b98397-b983b1 180->185 184 b982c4-b982c9 181->184 182->184 186 b9830b-b98327 182->186 187 b9832c-b9833b 183->187 188 b98373 183->188 190 b982ca-b982d5 184->190 191 b98284-b98285 184->191 185->163 186->187 187->172 188->165 196 b98290 190->196 197 b982d7-b982d9 190->197 192 b98240-b98249 191->192 193 b98287-b9828f 191->193 199 b9824b-b9824d 192->199 200 b98204-b98205 192->200 193->196 195->194 198 b98294-b982b1 196->198 197->198 202 b982db-b982ea 197->202 205 b9826c-b9826d 198->205 206 b982b3-b982b9 198->206 208 b98208-b98223 199->208 209 b9824f-b98251 199->209 203 b981c0-b981c1 200->203 204 b98207 200->204 210 b982ee-b982f7 202->210 214 b9817c-b9817f 203->214 215 b981c2-b981c5 203->215 204->208 213 b98228-b98229 205->213 217 b9826f-b98271 205->217 211 b982bb 206->211 212 b98274-b98278 206->212 208->213 216 b98256-b98267 209->216 210->174 211->181 212->210 222 b9827a-b9827f 212->222 219 b9822b-b98239 213->219 220 b981e4-b981e9 213->220 218 b98180-b98181 214->218 215->218 221 b981c7-b981e2 215->221 216->205 217->212 223 b9813c-b98155 218->223 224 b98183-b981a3 218->224 225 b9823b-b9823d 219->225 226 b981f4 219->226 228 b981a4-b981a9 220->228 235 b981eb-b981f1 220->235 221->220 222->191 229 b98110-b9813b 223->229 230 b98157-b98163 223->230 224->228 225->192 226->216 227 b981f6-b981ff 226->227 227->200 233 b981ab 228->233 234 b98164-b9816f 228->234 229->223 230->234 236 b981ac-b981b9 233->236 240 b98174-b9817b 234->240 235->236 238 b981f3 235->238 239 b981bb 236->239 236->240 238->226 239->203 240->214
                              APIs
                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 00B9848F
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1463154717.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_b90000_gorfVgTf.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 1b0d65122e8e7cbf12d0b893c7e59428b5fe4cadc7ee8f713842213de72dd92f
                              • Instruction ID: 10e2bbf04f07b199c36925b09e55c909421d053de41132216ff0f2211c090e03
                              • Opcode Fuzzy Hash: 1b0d65122e8e7cbf12d0b893c7e59428b5fe4cadc7ee8f713842213de72dd92f
                              • Instruction Fuzzy Hash: 14D10AF6D0E6D45FDF168F6864782A8BFE66F73208B1900DFD4816B2D3DA604805C746

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 242 972778c-9727831 244 9727833-972784a 242->244 245 972787a-97278a2 242->245 244->245 250 972784c-9727851 244->250 248 97278a4-97278b8 245->248 249 97278e8-972793e 245->249 248->249 257 97278ba-97278bf 248->257 259 9727940-9727954 249->259 260 9727984-9727a72 CreateProcessA 249->260 251 9727853-972785d 250->251 252 9727874-9727877 250->252 254 9727861-9727870 251->254 255 972785f 251->255 252->245 254->254 258 9727872 254->258 255->254 261 97278e2-97278e5 257->261 262 97278c1-97278cb 257->262 258->252 259->260 267 9727956-972795b 259->267 278 9727a74-9727a7a 260->278 279 9727a7b-9727b60 260->279 261->249 263 97278cf-97278de 262->263 264 97278cd 262->264 263->263 268 97278e0 263->268 264->263 269 972797e-9727981 267->269 270 972795d-9727967 267->270 268->261 269->260 272 972796b-972797a 270->272 273 9727969 270->273 272->272 274 972797c 272->274 273->272 274->269 278->279 291 9727b62-9727b66 279->291 292 9727b70-9727b74 279->292 291->292 293 9727b68 291->293 294 9727b76-9727b7a 292->294 295 9727b84-9727b88 292->295 293->292 294->295 298 9727b7c 294->298 296 9727b8a-9727b8e 295->296 297 9727b98-9727b9c 295->297 296->297 299 9727b90 296->299 300 9727bd2-9727bdd 297->300 301 9727b9e-9727bc7 297->301 298->295 299->297 305 9727bde 300->305 301->300 305->305
                              APIs
                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 09727A5F
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1482604075.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9720000_gorfVgTf.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: 52c0c0f8edad1cdfe71168ac4070261eba8b4b2fe96d3f34a1083146876266ad
                              • Instruction ID: fa3a2b3af2e4fe023783c7c972da5cf918b9149703816e38a21c58563bfabb36
                              • Opcode Fuzzy Hash: 52c0c0f8edad1cdfe71168ac4070261eba8b4b2fe96d3f34a1083146876266ad
                              • Instruction Fuzzy Hash: E2C12671D102298FDF24CFA8C941BEDBBB1BF09300F1095A9E849B7250EB749A85CF95

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 306 9727798-9727831 308 9727833-972784a 306->308 309 972787a-97278a2 306->309 308->309 314 972784c-9727851 308->314 312 97278a4-97278b8 309->312 313 97278e8-972793e 309->313 312->313 321 97278ba-97278bf 312->321 323 9727940-9727954 313->323 324 9727984-9727a72 CreateProcessA 313->324 315 9727853-972785d 314->315 316 9727874-9727877 314->316 318 9727861-9727870 315->318 319 972785f 315->319 316->309 318->318 322 9727872 318->322 319->318 325 97278e2-97278e5 321->325 326 97278c1-97278cb 321->326 322->316 323->324 331 9727956-972795b 323->331 342 9727a74-9727a7a 324->342 343 9727a7b-9727b60 324->343 325->313 327 97278cf-97278de 326->327 328 97278cd 326->328 327->327 332 97278e0 327->332 328->327 333 972797e-9727981 331->333 334 972795d-9727967 331->334 332->325 333->324 336 972796b-972797a 334->336 337 9727969 334->337 336->336 338 972797c 336->338 337->336 338->333 342->343 355 9727b62-9727b66 343->355 356 9727b70-9727b74 343->356 355->356 357 9727b68 355->357 358 9727b76-9727b7a 356->358 359 9727b84-9727b88 356->359 357->356 358->359 362 9727b7c 358->362 360 9727b8a-9727b8e 359->360 361 9727b98-9727b9c 359->361 360->361 363 9727b90 360->363 364 9727bd2-9727bdd 361->364 365 9727b9e-9727bc7 361->365 362->359 363->361 369 9727bde 364->369 365->364 369->369
                              APIs
                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 09727A5F
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1482604075.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9720000_gorfVgTf.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: befe802ee55b64fabffda9934c916e5f64e5eadd23517271f7e106e25cae3d82
                              • Instruction ID: 47acc14c7476c2d6c1046c71ff30a8e0d3f77345606a65b954eae924afdae724
                              • Opcode Fuzzy Hash: befe802ee55b64fabffda9934c916e5f64e5eadd23517271f7e106e25cae3d82
                              • Instruction Fuzzy Hash: AAC11571D102299FDF24CFA8C941BEDBBB1BF09300F1095A9E849B7250EB749A85CF95

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 470 9502ae8-9502b0d call 9501c14 473 9502b22-9502c0b CreateIconFromResourceEx 470->473 474 9502b0f-9502b1f 470->474 477 9502c14-9502c5a 473->477 478 9502c0d-9502c13 473->478 478->477
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1482117040.0000000009500000.00000040.00000800.00020000.00000000.sdmp, Offset: 09500000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9500000_gorfVgTf.jbxd
                              Similarity
                              • API ID: CreateFromIconResource
                              • String ID:
                              • API String ID: 3668623891-0
                              • Opcode ID: b6f979d07800e4bfcccf16b4d8919aeab0b3b0dd89fe42503c62af3ac5bbe96d
                              • Instruction ID: ed80ee4d2fe2d996bb6331e6455c35cdefb7577862c54b37bc79df422b3d74f5
                              • Opcode Fuzzy Hash: b6f979d07800e4bfcccf16b4d8919aeab0b3b0dd89fe42503c62af3ac5bbe96d
                              • Instruction Fuzzy Hash: E851DBB5D042589FCF01CFA9D880A9EFBB5FF0A310F14906AE914BB261D335A951CF64

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 482 b9e614-b9fc0c CreateActCtxA 487 b9fc0e-b9fc14 482->487 488 b9fc15-b9fc9a 482->488 487->488 497 b9fc9c-b9fcbf 488->497 498 b9fcc7-b9fccf 488->498 497->498
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 00B9FBF9
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1463154717.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_b90000_gorfVgTf.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: a8ac26a5efef595d5cf026531dbcd3e8699adc319de18b277ce7d78418ece02d
                              • Instruction ID: 2a5c0e1e757ecc522b30cd9c7053a71d1d271276517c4b271ecacefe7b1cef65
                              • Opcode Fuzzy Hash: a8ac26a5efef595d5cf026531dbcd3e8699adc319de18b277ce7d78418ece02d
                              • Instruction Fuzzy Hash: 4C51E371D0061D9FEB20DFA4C940BDEBBF5AF49304F2084AAD509BB251DB716A89CF91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 502 9501c08-9501c1b 504 9502b38-9502c0b CreateIconFromResourceEx 502->504 505 9502c14-9502c5a 504->505 506 9502c0d-9502c13 504->506 506->505
                              APIs
                              • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 09502BFB
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1482117040.0000000009500000.00000040.00000800.00020000.00000000.sdmp, Offset: 09500000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9500000_gorfVgTf.jbxd
                              Similarity
                              • API ID: CreateFromIconResource
                              • String ID:
                              • API String ID: 3668623891-0
                              • Opcode ID: bbf51a9391817b49323d26dacb99f212b3667a9b1fdb526038eafb17e4bfe7ae
                              • Instruction ID: 4dd7c8b3b51e661efebaf270ae33b092301f23d805922525f7441678066064dc
                              • Opcode Fuzzy Hash: bbf51a9391817b49323d26dacb99f212b3667a9b1fdb526038eafb17e4bfe7ae
                              • Instruction Fuzzy Hash: 40419AB9D042599FCF10CFA9D584ADEFBF0BB1A310F14901AE814BB250D375A955CF68

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 510 9727408-972747b 512 9727492-97274f3 WriteProcessMemory 510->512 513 972747d-972748f 510->513 515 97274f5-97274fb 512->515 516 97274fc-972754e 512->516 513->512 515->516
                              APIs
                              • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 097274E3
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1482604075.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9720000_gorfVgTf.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: 6680ae9107cf6164c15c59d7e691f488c129b76ad3de57719d640e437e94e026
                              • Instruction ID: ab272de6f5077950e65af95eb0ca0d1ad7e8f30651f9c2a217839046f0e43858
                              • Opcode Fuzzy Hash: 6680ae9107cf6164c15c59d7e691f488c129b76ad3de57719d640e437e94e026
                              • Instruction Fuzzy Hash: 8541AAB5D012589FCF14CFA9D980AEEFBF1BB49310F24902AE815B7210D775AA45CF64

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 521 9501c14-9502c0b CreateIconFromResourceEx 523 9502c14-9502c5a 521->523 524 9502c0d-9502c13 521->524 524->523
                              APIs
                              • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 09502BFB
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1482117040.0000000009500000.00000040.00000800.00020000.00000000.sdmp, Offset: 09500000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9500000_gorfVgTf.jbxd
                              Similarity
                              • API ID: CreateFromIconResource
                              • String ID:
                              • API String ID: 3668623891-0
                              • Opcode ID: e73de55a851e928cc95a4ce32b0b55362723c4acccf02d893ee51b9601bad169
                              • Instruction ID: d0b865fb8acfab1e73feb542faf9934036ab2bb75ef79eef463004f423edfa72
                              • Opcode Fuzzy Hash: e73de55a851e928cc95a4ce32b0b55362723c4acccf02d893ee51b9601bad169
                              • Instruction Fuzzy Hash: 9A417AB9D042589FCF10CFA9D584ADEFBF5BB19310F14901AE814B7250D375A941CF64

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 528 9727410-972747b 530 9727492-97274f3 WriteProcessMemory 528->530 531 972747d-972748f 528->531 533 97274f5-97274fb 530->533 534 97274fc-972754e 530->534 531->530 533->534
                              APIs
                              • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 097274E3
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1482604075.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9720000_gorfVgTf.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: cd697e49dcc6b7f41a1e5fc67c199db083ae0b287c42247a8936b7be789246d4
                              • Instruction ID: 2f9dbe9292a5204642cd2ac8ff72ee919be95c5a96c6db36fa0d9583fcbb3a3a
                              • Opcode Fuzzy Hash: cd697e49dcc6b7f41a1e5fc67c199db083ae0b287c42247a8936b7be789246d4
                              • Instruction Fuzzy Hash: 8A41BBB5D012589FCF14CFA9D980ADEFBF1BB49310F24902AE814B7210D734AA45CF64

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 539 9727560-972762a ReadProcessMemory 542 9727633-9727685 539->542 543 972762c-9727632 539->543 543->542
                              APIs
                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0972761A
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1482604075.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9720000_gorfVgTf.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: 9b05ae76dbc51aa00fce82ed045b970560077222a6b66ae85adc0c6f1cb2a9f9
                              • Instruction ID: e401478baaddbc32ad821d051980aa31bc017a12326d4759965ee50c7ccac4c7
                              • Opcode Fuzzy Hash: 9b05ae76dbc51aa00fce82ed045b970560077222a6b66ae85adc0c6f1cb2a9f9
                              • Instruction Fuzzy Hash: 7541B8B9D04258DFCF14CFAAD980AEEFBB1BB49310F14942AE815B7210C735A945CF68

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 548 9727568-972762a ReadProcessMemory 551 9727633-9727685 548->551 552 972762c-9727632 548->552 552->551
                              APIs
                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0972761A
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1482604075.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9720000_gorfVgTf.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: e28e60a243f6303dbd36908acdd6e66210fd0d7dcc6efc7b6eba1d3650f31b97
                              • Instruction ID: a723a223632c062659878e4cff7dc3fe04371ad8ad6604320d1acd8e263bb95c
                              • Opcode Fuzzy Hash: e28e60a243f6303dbd36908acdd6e66210fd0d7dcc6efc7b6eba1d3650f31b97
                              • Instruction Fuzzy Hash: D141A7B9D04258DFCF14CFAAD980AEEFBB1BB49310F14942AE814B7210D735A945CF68
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0972739A
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1482604075.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9720000_gorfVgTf.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 87cd4c2ea91fa523e6342ea85f5a3a04bce4bbe7d3e7828552c207a47166899a
                              • Instruction ID: bd59f422cb09ebde048482ce35ece0d5ddcc491ab6f5467c9bb52b488510770f
                              • Opcode Fuzzy Hash: 87cd4c2ea91fa523e6342ea85f5a3a04bce4bbe7d3e7828552c207a47166899a
                              • Instruction Fuzzy Hash: D24199B5D012589FCF14CFA9D980AEEBBB1FB49310F20942AE815B7210D735A945CF54
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0972739A
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1482604075.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9720000_gorfVgTf.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 2c9e76e34d5d77583fb151cbfbc1210e856aa7889ded3225a99f2e4f00db8000
                              • Instruction ID: 9d0e2e102272727344652cb68780f029470cd709979d910b0e7db75b5604e79f
                              • Opcode Fuzzy Hash: 2c9e76e34d5d77583fb151cbfbc1210e856aa7889ded3225a99f2e4f00db8000
                              • Instruction Fuzzy Hash: ED3187B9D042589FCF14CFA9D980ADEFBB1FB49310F20942AE815B7210D735A946CF68
                              APIs
                              • Wow64SetThreadContext.KERNEL32(?,?), ref: 09727277
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1482604075.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9720000_gorfVgTf.jbxd
                              Similarity
                              • API ID: ContextThreadWow64
                              • String ID:
                              • API String ID: 983334009-0
                              • Opcode ID: 0788604f72721499cebb1d42e4a6dd4d38739c92cbb366520dbb542d783eb409
                              • Instruction ID: 9361dfeab57403f962e9221d12457210d3af31c9aff774f23611c56ddb9880f0
                              • Opcode Fuzzy Hash: 0788604f72721499cebb1d42e4a6dd4d38739c92cbb366520dbb542d783eb409
                              • Instruction Fuzzy Hash: 9E41A9B5D112589FDB14CFAAD984AEEBBF1BB49310F24802AE418B7250C778A985CF54
                              APIs
                              • Wow64SetThreadContext.KERNEL32(?,?), ref: 09727277
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1482604075.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9720000_gorfVgTf.jbxd
                              Similarity
                              • API ID: ContextThreadWow64
                              • String ID:
                              • API String ID: 983334009-0
                              • Opcode ID: 6f831605a6b4c59d770bba0d6586d196c27c49dd048ef1e9b20a9903c1530d3a
                              • Instruction ID: ba94cdb5a17e74b0992a570a80a02acd92eb0a2f7ef6f1fd8a5e8fe6b8d59f8a
                              • Opcode Fuzzy Hash: 6f831605a6b4c59d770bba0d6586d196c27c49dd048ef1e9b20a9903c1530d3a
                              • Instruction Fuzzy Hash: FB31CAB5D012189FDB14CFAAD984AEEBBF1BB49310F24802AE418B7200C738A985CF54
                              APIs
                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 00B9848F
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1463154717.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_b90000_gorfVgTf.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 95270a887a2f5ae69de4286d72baca35de4fe0d22f63fcb365f7b327d7bea25c
                              • Instruction ID: 7defbddaa3def3389f44623006c4d0416862b4a5636eea2ef172d286a1828990
                              • Opcode Fuzzy Hash: 95270a887a2f5ae69de4286d72baca35de4fe0d22f63fcb365f7b327d7bea25c
                              • Instruction Fuzzy Hash: 4C3176B9D042589FCB10CFAAD984ADEFBF1AF19310F24906AE814B7310D775A945CF64
                              APIs
                              • PostMessageW.USER32(?,?,?,00000000), ref: 0972ADDB
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1482604075.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9720000_gorfVgTf.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: 30ca5d86a4fc2cb916e119f4ee6d3241ff59d57dd5c4475935e72ab628ff68f7
                              • Instruction ID: 0aecd0b96a391b5fa1331c81527f5b725cd721023153e36f7d5bc1ba6f280118
                              • Opcode Fuzzy Hash: 30ca5d86a4fc2cb916e119f4ee6d3241ff59d57dd5c4475935e72ab628ff68f7
                              • Instruction Fuzzy Hash: 463176B9D052589FCB14CFA9E580ADEFBF1AB49310F24902AE818BB314D335A9458F64
                              APIs
                              • PostMessageW.USER32(?,?,?,00000000), ref: 0972ADDB
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1482604075.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9720000_gorfVgTf.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: 114dff4ca65661e4e276ef724b4345b34efb5a8f79535d92b3edb2970cd6593f
                              • Instruction ID: a26421a843ccfcdea035b627f50963b42eff8c54fe0411b0810c4f208b35959b
                              • Opcode Fuzzy Hash: 114dff4ca65661e4e276ef724b4345b34efb5a8f79535d92b3edb2970cd6593f
                              • Instruction Fuzzy Hash: 613197B9D052589FCB14CFA9D580A9EFBF1BB09310F14902AE814BB310D375A945CF64
                              APIs
                              • ResumeThread.KERNELBASE(?), ref: 09726D1E
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1482604075.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9720000_gorfVgTf.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: 996f728259bccb91885fbc942d5972862a406d92809aeaa9a3dd9721a04b50b2
                              • Instruction ID: 200037bc2b1ad85603793a7c141e927afd728101bad14c951383370060ce3845
                              • Opcode Fuzzy Hash: 996f728259bccb91885fbc942d5972862a406d92809aeaa9a3dd9721a04b50b2
                              • Instruction Fuzzy Hash: 8731EAB5D103589FCB24CFA9D581AEEFBB1FB49310F20852AE815B3250C734A941CF54
                              APIs
                              • OutputDebugStringW.KERNELBASE(?), ref: 00B9A80A
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1463154717.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_b90000_gorfVgTf.jbxd
                              Similarity
                              • API ID: DebugOutputString
                              • String ID:
                              • API String ID: 1166629820-0
                              • Opcode ID: df3f10d1445e5c86cef1dfc0216055f8400a926f82c3778de5c3240a109d809b
                              • Instruction ID: be0b1e1f45ee9c9ca86eef45bffbb4a854bb3b3db2885af914bc6fd2f9e5ff65
                              • Opcode Fuzzy Hash: df3f10d1445e5c86cef1dfc0216055f8400a926f82c3778de5c3240a109d809b
                              • Instruction Fuzzy Hash: C4319AB5D012189FCB14CFAAD584ADEFBF5EB49314F14806AE818B7320D734A945CFA5
                              APIs
                              • ResumeThread.KERNELBASE(?), ref: 09726D1E
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1482604075.0000000009720000.00000040.00000800.00020000.00000000.sdmp, Offset: 09720000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9720000_gorfVgTf.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: ec9a02510e2ad863897b912757d26f165026eff64076b3f68c36b4e786129447
                              • Instruction ID: 41b3e578a5621f1bf6fc46463e37ae6a044dfdf1457720cc4b92fa597b3eb69a
                              • Opcode Fuzzy Hash: ec9a02510e2ad863897b912757d26f165026eff64076b3f68c36b4e786129447
                              • Instruction Fuzzy Hash: 6531CBB5D113189FCF14CFAAD580A9EFBB5BB49310F14942AE814B7200C735A941CF54
                              APIs
                              • CloseHandle.KERNELBASE(?), ref: 00B9A8E6
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1463154717.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_b90000_gorfVgTf.jbxd
                              Similarity
                              • API ID: CloseHandle
                              • String ID:
                              • API String ID: 2962429428-0
                              • Opcode ID: f7a226b6f07bca9ade11c9fd2e020badfa0ef116ba796d5f794b923d8ad72fd5
                              • Instruction ID: ec37f29e5d7294a03df29cc8d8aa5cc27cb088de58039f3ace1b08a6c2902e89
                              • Opcode Fuzzy Hash: f7a226b6f07bca9ade11c9fd2e020badfa0ef116ba796d5f794b923d8ad72fd5
                              • Instruction Fuzzy Hash: CB21CAB9D042189FCF10CFA9E484AEEFBF4AB09310F24906AE814B3310D334A945CFA5
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1462795095.00000000009DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009DD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9dd000_gorfVgTf.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3023390d5c45350853f1804f9e0dd76a88d848201706fcfe738868ab5fce3858
                              • Instruction ID: 28b5a9545a16aee9fc8051381a01ff93d4f5dd9772424df04841c162ea8a974c
                              • Opcode Fuzzy Hash: 3023390d5c45350853f1804f9e0dd76a88d848201706fcfe738868ab5fce3858
                              • Instruction Fuzzy Hash: 40212871544304DFDB15DF14E9C0B26BB69FB98318F24C56AE9090B35AC33AD856CBA2
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1462922569.0000000000AFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AFD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_afd000_gorfVgTf.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f182769bd75a5cbd8e850e0ce4235a73d68ee7817722d0553cae92fa5d9cec3b
                              • Instruction ID: 7fe5073ca459626e539214f9cefcaf88b224aca56d1ef98f7d575a9fcfac4c8d
                              • Opcode Fuzzy Hash: f182769bd75a5cbd8e850e0ce4235a73d68ee7817722d0553cae92fa5d9cec3b
                              • Instruction Fuzzy Hash: 00212571504308DFDB16DF50D480B26BB62FB84314F24C56DEA0B4B246CB36D847CA62
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1462922569.0000000000AFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AFD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_afd000_gorfVgTf.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 192f86d528c18bfc58241bb34e792e91a68ae7f85d7c8f9039c5963f7f4fba6d
                              • Instruction ID: 930d7451e06748861c29e765cdbf2d8f4c51dbb754c8bf069dc8301afcf15995
                              • Opcode Fuzzy Hash: 192f86d528c18bfc58241bb34e792e91a68ae7f85d7c8f9039c5963f7f4fba6d
                              • Instruction Fuzzy Hash: 3B2107B1504308EFDB06DF90D5C0B76BBA6FB84314F24C56DEA094B256C376D846CAA1
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1462922569.0000000000AFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AFD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_afd000_gorfVgTf.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d6ce97a3d319280ada81c22873a536790ee66b516be25d3713bfe00d1272aa37
                              • Instruction ID: 8cb2d284d5ffe7a997a57e4581b15aec46657e93b550587985d2a20f81dd1659
                              • Opcode Fuzzy Hash: d6ce97a3d319280ada81c22873a536790ee66b516be25d3713bfe00d1272aa37
                              • Instruction Fuzzy Hash: 662180755093848FCB13CF20D990715BF72EB46314F28C5EAD9498F6A7C33A980ACB62
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1462795095.00000000009DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009DD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9dd000_gorfVgTf.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                              • Instruction ID: 577dcece135e62a2e7ea6777aa1b6d8179d4fedcd3dcd518b8dc5803f1793cc0
                              • Opcode Fuzzy Hash: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                              • Instruction Fuzzy Hash: 8711D376544240DFDB16CF10D5C4B16BF71FB94314F24C6AAE8090B75AC33AD956CBA1
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1462922569.0000000000AFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AFD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_afd000_gorfVgTf.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                              • Instruction ID: bc6c46a44452096ff604e537141ca5869a1752c5e3effcb85510798de2eb24d7
                              • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                              • Instruction Fuzzy Hash: 8111D075504244DFCB12CF50C5C0B65FB72FB84314F24C6AEE9494B656C33AD80ACB91
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1462795095.00000000009DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009DD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9dd000_gorfVgTf.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dcadff50bf02db47e661b096346ee3f20c85c62406f5fa1246d1bb1e6388952b
                              • Instruction ID: ecb49142bee24d1525eac76592d701de7b5154b368a38299d37e5a5372132d22
                              • Opcode Fuzzy Hash: dcadff50bf02db47e661b096346ee3f20c85c62406f5fa1246d1bb1e6388952b
                              • Instruction Fuzzy Hash: D7012BB14463409BF7204F21CD84B66BBDCDF42364F18C99BED094F382D2799840CAB1
                              Memory Dump Source
                              • Source File: 0000000B.00000002.1462795095.00000000009DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009DD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_9dd000_gorfVgTf.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8a2ff012da8decb348780fb5959aa031c6d946b29a96b08070a9828f401fe287
                              • Instruction ID: 17585ab7903776980738ba20699e882d4d4ae7bc68051af68dad885134d20918
                              • Opcode Fuzzy Hash: 8a2ff012da8decb348780fb5959aa031c6d946b29a96b08070a9828f401fe287
                              • Instruction Fuzzy Hash: 44F062B14053449FE7208E15C984B62FB9CEB91774F18C45BED485F286C2799844CBB1